Cisco 4700M Configuration Manual page 255

Application control engine appliance security
Hide thumbs Also See for 4700M:
Table of Contents

Advertisement

Chapter 3
Configuring Application Protocol Inspection
The ACE updates the counters that the show service-policy command displays
Note
after the applicable connections are closed.
For example, to display service policy statistics for the
HTTP_INSPECT_L4POLICY policy map, enter:
host1/Admin# show service-policy HTTP_INSPECT_L4POLICY
Status
Description: HTTP protocol deep inspection of incoming traffic
-----------------------------------------
Interface: vlan 40
For example, to display service policy statistics for the
FTP_INSPECT_L4POLICY policy map, enter:
host1/Admin# show service-policy FTP_INSPECT_L4POLICY
Status
Description: FTP command inspection of incoming traffic
-----------------------------------------
Context Global Policy:
Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide
OL-16202-01
Viewing Application Protocol Inspection Statistics and Service Policy Information
: ACTIVE
service-policy: HTTP_INSPECT_L4POLICY
class: HTTP_INSPECT_L4CLASS
inspect http:
curr conns
dropped conns
client pkt count : 0
server pkt count : 0
L4 policy stats:
TotalReq/Resp: 0
TotalDropped : 0
L7 policy: HTTP_INSPECT_L7POLICY, url logging: disabled
L7 policy stats: Total number of L7 rules 1
L7 class/match HTTP_INSPECT_L7CLASS: reset
TotalInspected
TotalDroppedOnError: 0
: ACTIVE
service-policy: FTP_INSPECT_L4POLICY
class: class-default
inspect ftp:
strict ftp: ENABLED
curr conns
dropped conns
client pkt count : 0
server pkt count : 0
L7 policy: FTP_INSPECT_L4POLICY
TotalReplyMasked : 0
: 0
, hit count
: 0
, client byte count: 0
, server byte count: 0
TotalAllowed: 0
TotalLogged : 0
: 0
TotalMatched: 0
TotalLogged : 0
: 0
, hit count
: 0
, client byte count: 0
, server byte count: 0
TotalDropped: 0
: 0
: 0
3-131

Advertisement

Table of Contents
loading

This manual is also suitable for:

4700 series

Table of Contents