Cisco 4700M Configuration Manual page 177

Application control engine appliance security
Hide thumbs Also See for 4700M:
Table of Contents

Advertisement

Chapter 3
Configuring Application Protocol Inspection
Defining a Header MIME-Type Messages for Inspection
OL-16202-01
eq bytes—Specifies a value for the entity-body in an HTTP message received
by the ACE. Based on the policy map action, the ACE allows or denies
messages with an entity-body size equal to the specified value. Valid entries
are from 1 to 65535 bytes.
gt bytes—Specifies a minimum value for the entity-body in an HTTP
message received by the ACE. Based on the policy map action, the ACE
allows or denies messages with an entity-body size greater than the specified
value. Valid entries are from 1 to 65535 bytes.
lt bytes—Specifies a maximum value for the entity-body in an HTTP
message received by the ACE. Based on the policy map action, the ACE
allows or denies messages with an entity-body size less than the specified
value. Valid entries are from 1 to 65535 bytes.
range bytes1 bytes2—Specifies a size range for the entity-body in an HTTP
message received by the ACE. Based on the policy map action, the ACE
allows or denies messages with a entity-body size within this range. The
range is from 1 to 65535 bytes.
For example, to specify that the class map is to match on HTTP traffic received
with a length less than or equal to 3600 bytes in the entity-body of the HTTP
message, enter:
host1/Admin(config)# class-map type http inspect HTTP_INSPECT_L7CLASS
host1/Admin(config-cmap-http-insp)# match header length request eq
3600
To clear the maximum HTTP header length match criteria from the class map,
enter:
host1/Admin(config-cmap-http-insp)# no match header length request eq
3600
You can use the match header mime-type command to specify a subset of the
Multipurpose Internet Mail Extension (MIME)-type messages that the ACE
permits or denies based on the actions in the policy map. MIME-type validation
extends the format of Internet mail to allow non-US-ASCII textual messages,
nontextual messages, multipart message bodies, and non-US-ASCII information
in message headers.
Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide
Configuring a Layer 7 HTTP Deep Inspection Policy
3-53

Advertisement

Table of Contents
loading

This manual is also suitable for:

4700 series

Table of Contents