index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
297
b) Set one or more parameters. You can set the following options; use theno form of the command to disable the option: • timeout pinhole hh:mm:ss—Configures the timeout for DCERPC pinholes and override the global system pinhole timeout of two minutes. The timeout can be from 00:00:01 to 119:00:00. • endpoint-mapper [ep...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
298
• DNS Guard is enabled, so the ASA tears down the DNS session associated with a DNS query as soon as the DNS reply is forwarded by the ASA. The ASA also monitors the message exchange to ensure that the ID of the DNS reply matches the ID of the DNS query. • Translation of the DNS record based on the NAT configuration is...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
299
a) Create the class map: class-map type inspect dns [match-all | match-any] class_map_name Where class_map_name isthe name of the class map. The match-all keyword isthe default, and specifies that traffic must match all criteria to match the class map. The match-any keyword specifiesthat the traffic matches the class m...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
300
• Specify traffic directly in the policy map using one of the matchcommands described for DNSclass maps. If you use a match not command, then any traffic that does not match the criterion in the match not command has the action applied. b) Specify the action you want to perform on the matching traffic by entering one o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
301
• nat-rewrite—Translates the DNS record based on the NAT configuration. • protocol-enforcement—Enables DNS message format check, including domain name length of no more than 255 characters, label length of 63 characters, compression, and looped pointer check. • tcp-inspection—Enables inspection of DNS over TCP traffic....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
302
What to do next You can now configure an inspection policy to use the map. See Configure Application Layer Protocol Inspection, on page 261. FTP Inspection FTP inspection is enabled by default. You need to configure it only if you want non-default processing. The following sections describe the FTP inspection engine. F...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
303
Caution Using strict FTP may cause the failure of FTP clients that are not strictly compliant with FTP RFCs. With strictFTPinspection, eachFTPcommand and response sequence istracked for the following anomalous activity: • Truncated command—Number of commas in the PORT and PASV reply command is checked to see if it is f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
304
Before you begin Some traffic matching options use regular expressions for matching purposes. If you intend to use one of those techniques, first create the regular expression or regular expression class map. Procedure Step 1 (Optional) Create an FTP inspection class map by performing the following steps. A class map g...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
305
• PUT—Sends a file to the server. • RMD—Deletes a directory on the server. • RNFR—Specifies the “rename-from” filename. • RNTO—Specifies the “rename-to” filename. • SITE—Used to specify a server-specific command. This is usually used for remote administration. • STOU—Stores a file using a unique file name. • match [not...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
306
• mask-syst-reply—Masks the reply to syst command. Example Before submitting a username and password, all FTP users are presented with a greeting banner. By default, this banner includes version information useful to hackers trying to identify weaknesses in a system. The following example shows how to mask this banner:...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
307
HTTP Inspection Overview You can install a service module that performs application and URL filtering, which includes HTTPinspection, such as ASA FirePOWER. The HTTP inspection running on the ASA is not compatible with these modules. Note that it is far easier to configure application filtering using a purpose-built mo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
308
To specify traffic thatshould not match the class map, use the matchnot command.For example, if the match not command specifies the string “example.com,” then any traffic that includes “example.com” does not match the class map. For the traffic that you identify in this class map, you specify actions to take on the tra...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
309
expression or regular expression class. Methods are: bcopy, bdelete, bmove, bpropfind, bproppatch, connect, copy, delete, edit, get, getattribute, getattributenames, getproperties, head, index, lock, mkcol, mkdir, move, notify, options, poll, post, propfind, proppatch, put, revadd, revlabel, revlog, revnum, save, searc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
310
• Specify traffic directly in the policy map using one of the match commands described for HTTP class maps. If you use a match not command, then any traffic that does not match the criterion in the match not command has the action applied. b) Specify the action you want to perform on the matching traffic by entering on...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
311
hostname(config-cmap)# match regex get hostname(config-cmap)# match regex put hostname(config-cmap)# exit hostname(config)# class-map type inspect http http_url_policy hostname(config-cmap)# match request uri regex class url_to_log hostname(config-cmap)# match request method regex class methods_to_log hostname(config-c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
312
ILS Inspection The Internet Locator Service (ILS) inspection engine provides NAT support for Microsoft NetMeeting, SiteServer, and Active Directory products that use LDAP to exchange directory information with an ILS server. You cannot use PAT with ILS inspection because only IP addresses are stored by an LDAP database...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
313
Procedure Step 1 (Optional) Create an IM inspection class map by performing the following steps. A class map groups multiple traffic matches. You can alternatively identify match commands directly in the policy map. The difference between creating a class map and defining the traffic match directly in the inspection po...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
314
d) Enter exit to leave class map configuration mode. Step 2 Create an IM inspection policy map: policy-map type inspect im policy_map_name Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration mode. Step 3 (Optional) Add a description to the policy map: description string Step...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
315
hostname(config-cmap)# match version regex yahoo_version_regex hostname(config)# class-map im_inspect_class_map hostname(config-cmap)# match default-inspection-traffic hostname(config)# policy-map type inspect im im_policy_all hostname(config-pmap)# class yahoo_file_block_list hostname(config-pmap-c)# match service fil...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
316
require relatively complex processing from the routers along the packet’s delivery path. Dropping RSVP packets containing the Router Alert option can cause problems in VoIP implementations. • Packets that contain any other options are dropped. Each time a packet is dropped due to inspection, syslog 106012 is issued. Th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
317
• exp-flow-control action {allow | clear}—Allows or clears the Experimental Flow Control (FINN) option. • exp-measurement action {allow | clear}—Allows or clears the Experimental Measurement (ZSU) option. • extended-security action {allow | clear}—Allows or clears the Extended Security (E-SEC) option. • imi-traffic-des...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
318
NAT and non-NAT traffic is permitted. However, PAT is not supported. Configure an IPsec Pass Through Inspection Policy Map An IPsec Pass Through map lets you change the default configuration values used for IPsec Pass Through application inspection. You can use an IPsecPass Through map to permit certain flows without u...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
319
hostname(config-pmap-c)# inspect ipsec-pass-thru iptmap hostname(config)# service-policy inspection_policy interface outside IPv6 Inspection IPv6 inspection lets you selectively log or drop IPv6 traffic based on the extension header. In addition, IPv6 inspection can check conformance to RFC 2460 for type and order of e...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
320
• ah—Matches the IPv6 Authentication extension header. • count gt number—Specifies the maximum number of IPv6 extension headers, from 0 to 255. • destination-option—Matches the IPv6 destination-option extension header. • esp—Matches the IPv6 Encapsulation Security Payload (ESP) extension header. • fragment—Matches the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
321
drop log match header routing-address count gt 0 drop log match header routing-type eq 0 drop log policy-map global_policy class class-default inspect ipv6 ipv6-pm ! service-policy global_policy global What to do next You can now configure an inspection policy to use the map. See Configure Application Layer Protocol In...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
322
hostname(config)# policy-map netbios_policy hostname(config-pmap)# class inspection_default hostname(config-pmap-c)# no inspect netbios hostname(config-pmap-c)# inspect netbios netbios_map What to do next You can now configure an inspection policy to use the map. See Configure Application Layer Protocol Inspection, on ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
323
The following sections describe the ESMTP inspection engine. SMTP and ESMTP Inspection Overview Extended SMTP (ESMTP) application inspection provides improved protection against SMTP-based attacks by restricting the types of SMTP commands that can pass through the ASA and by adding monitoring capabilities. ESMTP is an ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
324
• The server banner is masked. The ESMTP inspection engine changes the characters in the server SMTP banner to asterisks except for the “2”, “0”, “0” characters. Carriage return (CR) and linefeed (LF) characters are ignored. • Encrypted connections are allowed but not inspected. • Special characters in sender and recei...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
325
Procedure Step 1 Create an ESMTP inspection policy map: policy-map type inspect esmtp policy_map_name Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration mode. Step 2 (Optional) Add a description to the policy map: description string Step 3 To apply actions to matching traff...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
326
• mask [log]—Mask out the matching portion of the packet. This action is available for ehlo-reply-parameter and cmd verb only. • reset [log]—Drop the packet, close the connection, and send a TCP reset to the server or client. • log—Send a system log message. You can use this option alone or with one of the other action...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
327
hostname(config-pmap-c)# drop-connection log hostname(config)# policy-map outside_policy hostname(config-pmap)# class inspection_default hostname(config-pmap-c)# inspect esmtp advanced_esmtp_map hostname(config)# service-policy outside_policy interface outside What to do next You can now configure an inspection policy ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
328
SQL*Net Inspection SQL*Net inspection is enabled by default. The inspection engine supports SQL*Net versions 1 and 2, but only the Transparent Network Substrate (TNS) format. Inspection does not support the Tabular Data Stream (TDS) format.SQL*Net messages are scanned for embedded addresses and ports, and NAT rewrite i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
329
sunrpc-server interface_name ip_address mask service service_type protocol {tcp | udp} port[-port] timeout hh:mm:ss Where: • interface_name—The interface through which traffic to the server flows. • ip_address mask—The address of the Sun RPC server. • service service_type —The service type on the server, which is the m...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
330
The inspection engine inspects TFTP read request (RRQ), write request (WRQ), and error notification (ERROR), and dynamically creates connections and translations, if necessary, to permit file transfer between a TFTP client and server. A dynamic secondary channel and a PAT translation, if necessary, are allocated on a r...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
331
History for Basic Internet Protocol Inspection Feature Name Releases Feature Information The ASA started supporting non-EPM DCERPC messages in release 8.3, supporting the ISystemMapper UUID message RemoteCreateInstance opnum4. This change extends support to the RemoteGetClassObject opnum3 message. We did not modify any...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
332
CHAPTER 13 Inspection for Voice and Video Protocols The following topics explain application inspection for voice and video protocols. For basic information on why you need to use inspection for certain protocols, and the overall methods for applying inspection, see Getting Started with Application Layer Protocol Inspe...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
333
Cisco IPSoftPhone requires the Cisco CallManager IPaddress to be specified explicitly in its Cisco TSP configuration on the PC. • When using PAT or Outside PAT, if the Cisco CallManager IP address is to be translated, its TCP port 2748 must be statically mapped to the same port of the PAT (interface) address for Cisco ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
334
Within each H.245 message, the H.323 endpoints exchange port numbers that are used for subsequent UDP data streams. H.323 inspection inspects the H.245 messages to identify these ports and dynamically creates connections for the media exchange. RTP uses the negotiated port number, while RTCP uses the next higher port n...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
335
Limitations for H.323 Inspection H.323 inspection is tested and supported for Cisco Unified Communications Manager (CUCM) 7.0. It is not supported for CUCM 8.0 and higher. H.323 inspection might work with other releases and products. The following are some of the known issues and limitations when using H.323 applicatio...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
336
Where string is the description of the class map (up to 200 characters). c) Specify the traffic on which you want to perform actions using one of the following match commands. If you use a match not command, then any traffic that does not match the criterion in the match not command has the action applied. • match[not]...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
337
for calls based on the RegistrationRequest/RegistrationConfirm (RRQ/RCF) messages. Because these RRQ/RCF messages are sent to and from the Gatekeeper, the calling endpoint's IP address is unknown and the ASA opens a pinhole through source IP address/port 0/0. By default, this option is disabled. • timeout users time—Se...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
338
hostname(config)# policy-map type inspect h323 h323_map hostname(config-pmap)# parameters hostname(config-pmap-p)# class h323_traffic hostname(config-pmap-c)# drop What to do next You can now configure an inspection policy to use the map. See Configure Application Layer Protocol Inspection, on page 261. MGCP Inspection...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
339
Figure 49: Using NAT with MGCP MGCP endpoints are physical or virtual sources and destinations for data. Media gateways contain endpoints on which the call agent can create, modify and delete connections to establish and control media sessions with other multimedia endpoints. Also, the call agent can instruct the endpo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
340
Step 2 (Optional) Add a description to the policy map: description string Step 3 Enter parameters configuration mode. hostname(config-pmap)# parameters hostname(config-pmap-p)# Step 4 Set one or more parameters. You can set the following options; use the no form of the command to disable the option. • call-agent ip_add...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
341
RTSP Inspection RTSP inspection is enabled by default. You need to configure it only if you want non-default processing. The following sections describe RTSP application inspection. RTSP Inspection Overview The RTSP inspection engine lets the ASA pass RTSP packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
342
• The ASA cannot perform NAT on RTSP messages because the embedded IP addresses are contained in the SDP files as part of HTTP or RTSP messages. Packets could be fragmented and the ASA cannot perform NAT on fragmented packets. • With Cisco IP/TV, the number of translates the ASA performs on the SDP part of the message ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
343
• match[not] request-method method—Matches an RTSPrequest method. The methods are: announce, describe, get_parameter, options, pause, play, record, redirect, setup, set_parameter, teardown. • match [not] url-filter regex {regex_name | class class_name}—Matches the URL against the specified regular expression or regular...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
344
hostname(config)# regex badurl1 www.url1.com/rtsp.avi hostname(config)# regex badurl2 www.url2.com/rtsp.rm hostname(config)# regex badurl3 www.url3.com/rtsp.asp hostname(config)# class-map type regex match-any badurl-list hostname(config-cmap)# match regex badurl1 hostname(config-cmap)# match regex badurl2 hostname(con...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
345
To support SIP calls through the ASA, signaling messages for the media connection addresses, media ports, and embryonic connections for the media must be inspected, because while the signaling is sent over a well-known destination port (UDP/TCP5060), the media streams are dynamically allocated. Also,SIPembeds IP addres...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
346
Default SIP Inspection SIP inspection is enabled by default using the default inspection map, which includes the following: • SIP instant messaging (IM) extensions: Enabled. • Non-SIP traffic on SIP port: Permitted. • Hide server’s and endpoint’s IP addresses: Disabled. • Mask software version and non-SIP URIs: Disable...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
347
b) (Optional) Add a description to the class map: description string Where string is the description of the class map (up to 200 characters). c) Specify the traffic on which you want to perform actions using one of the following match commands. If you use a match not command, then any traffic that does not match the cr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
348
• log—Send a system log message. You can use this option alone or with one of the other actions. • rate-limit message_rate—Limits the rate of messages. Rate limiting is available for request method matches to “invite” and “register” only. You can specify multiple class or match commands in the policy map. For informati...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
349
• uri-non-sip action {mask [log] | log}—Identifies the non-SIP URIs present in the Alert-Info and Call-Info header fields. You can mask the information in the SIP messages and optionally log it, or simply log it. Examples The following example shows how to disable instant messaging over SIP: hostname(config)# policy-ma...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
350
The ASA supports PAT and NAT for SCCP. PAT is necessary if you have more IP phones than global IP addressesfor the IPphonesto use. By supporting NAT andPAT ofSCCPSignaling packets,Skinny application inspection ensures that all SCCP signaling and media packets can traverse the ASA. Normal traffic between Cisco CallManag...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
351
• Registration: Not enforced. • Maximum message ID: 0x181. • Minimum prefix length: 4 • Media timeout: 00:05:00 • Signaling timeout: 01:00:00. • RTP conformance: Not enforced. Also note that inspection of encrypted traffic is not enabled. You must configure a TLS proxy to inspect encrypted traffic. Configure a Skinny (...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
352
• enforce-registration—Enforces registration before calls can be placed. • message-ID max hex_value—Sets the maximum SCCP station message ID allowed. The message ID is in hex, and the default maximum is 0x181. • rtp-conformance [enforce-payloadtype]—Checks RTPpacketsflowing on the pinholesfor protocol conformance. The ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
353
When you enableSTUN inspection on the default inspection class, TCP/UDPport 3478 is watched forSTUN traffic. The inspection supports IPv4 addresses and TCP/UDP only. There are some NAT limitations for STUN inspection. For WebRTC traffic, static NAT/PAT44 are supported. Cisco Spark can support additional types of NAT, b...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
354
Feature Name Releases Feature Information You can no longer use Phone Proxy or UC-IME Proxy when configuringSIPinspection. Use TLSProxy to inspect encrypted traffic. We removed the following commands: phone-proxy, uc-ime. We removed the phone-proxy and uc-ime keywords from the inspect sip command. SIP inspection suppor...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
355
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 334 Service Policies and Application Inspection History for Voice and Video Protocol Inspection
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
356
CHAPTER 14 Inspection for Mobile Networks The following topics explain application inspection for protocols used in mobile networks such as LTE. These inspectionsrequire the Carrier license.For information on why you need to use inspection for certain protocols, and the overall methodsfor applying inspection,see Gettin...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
357
GTP Inspection Limitations Following are some limitations on GTP inspection: • GTPv2 piggybacking messages are not supported. They are always dropped. • GTPv2 emergency UE attach is supported only if it contains IMSI (International Mobile Subscriber Identity). • GTP inspection does not inspect early data. That is, data...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
358
SCTP Stateful Inspection Similar to TCP, SCTP traffic is automatically inspected at layer 4 to ensure well-structured traffic and limited RFC 4960 enforcement. The following protocol elements are inspected and enforced: • Chunk types, flags, and length. • Verification tags. • Source and destination ports, to prevent as...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
359
• If you use PPID filtering to drop or rate-limit packets, be aware that the transmitter will resend any dropped packets. Although a packet for a rate-limited PPID might make it through on the next attempt, a packet for a droppedPPID will again be dropped. You might want to evaluate the eventual consequence of these re...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
360
M3UA inspection provides limited protocol conformance. You can optionally apply access policy based on point codes or Service Indicators (SI). You can also apply rate limiting based on message class and type. M3UA Protocol Conformance M3UA inspection provides the following limited protocol enforcement. Inspection drops...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
361
You have the option to configure a secret pre-shared key with the RADIUS server so the ASA can validate the message. If the shared secret is not configured, the ASA will only check that the source IP address is one of the configured addresses allowed to send the RADIUS messages. When using RADIUS accounting inspection ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
362
• The maximum number of requests is 200. • The maximum number of tunnels is 500. This is equivalent to the number of PDP contexts (endpoints). • The GTPendpoint timeout is 30 minutes. Endpointsinclude GSNs(GTPv0,1) andSGW/PGW (GTPv2). • The PDP context timeout is 30 minutes. In GTPv2, this is the bearer context timeout...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
363
Configure a GTP Inspection Policy Map If you want to enforce additional parameters on GTP traffic, and the default map does not meet your needs, create and configure a GTP map. Before you begin Some traffic matching options use regular expressions for matching purposes. If you intend to use one of those techniques, fir...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
364
b) Set one or more parameters. You can set the following options; use theno form of the command to disable the option: • permit errors—Allows invalid GTP packets or packets that otherwise would fail parsing and be dropped. • request-queue max_requests—Sets the maximum number of GTP requests that will be queued waiting ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
365
To configure GSN/PGW pooling and thus support load balancing, create a network object group that specifies the GSN/PGW endpoints and specify this on the from-object-group parameter. Likewise, create a network object group for theSGSN/SGW and select it on the to-object-groupparameter. If the GSN/PGW responding belongs t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
366
PPIDs are in data chunks, and a given packet can have multiple data chunks or even a control chunk. If a packet includes a control chunk or multiple data chunks, the packet will not be dropped even if the assigned action is drop. For example, if you configure an SCTP inspection policy map to drop PPID 26, and a PPID 26...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
367
log policy-map global_policy class inspection_default inspect sctp sctp-pmap ! service-policy global_policy global What to do next You can now configure an inspection policy to use the map. See Configure the Mobile Network Inspection Service Policy , on page 363. Configure a Diameter Inspection Policy Map You can creat...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
368
b) (Optional) Add a description to the class map: description string Where string is the description of the class map (up to 200 characters). c) Specify the traffic on which you want to perform actions using one of the following match commands. If you use a match not command, then any traffic that does not match the cr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
369
• value—The value portion of the AVP. You can configure this only if the data type of the AVP is supported. For example, you can specify an IP address for AVP that have the address data type. Following are the specific syntax of the value option for the supported data types: • Diameter Identity, Diameter URI, Octet Str...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
370
• drop—Drop all packets that match. • drop-connection—Drop the packet and close the connection. • log—Send a system log message. You can specify multiple class or match commands in the policy map. For information about the order of class and match commands, see How Multiple Traffic Classes are Handled, on page 254. Exa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
371
class-map type inspect diameter match-all block_ip match command-code cer-cea match avp host-ip-address 1.1.1.1 policy-map type inspect diameter diameter_map parameters unsupported application-id log class log_app log class block_ip drop-connection policy-map global_policy class inspection_default inspect diameter diam...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
372
• float32—32-bit floating point number. • float64—64-bit floating point number. • int32—32-bit integer. • int64—64-bit integer. • octetstring—Octet string. • time—Time value. • uint32—32-bit unsigned integer. • uint64—64-bit unsigned integer. • vendor-id id_number—(Optional.) The ID number of the vendor who defined the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
373
ASA proxy TLS server • Server identity certificate • CA certificate used to sign the Diameter TLS client's identity certificate Diameter TLS client (MME) 2 • Client identity certificate • CA certificate used to sign the ASA TLSproxy server'sidentity certificate 1 Diameter TLS server (full proxy) • Server identity certi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
374
• You need to import the Certificate Authority (CA) certificate used to sign the ASA’s server certificate into the Diameter client. This might be in the client’s CA certificate store or some other location that the client uses. Consult the client documentation for exact details on certificate usage. • You need to impor...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
375
Enter the base 64 encoded pkcs12. End with a blank line or the word "quit" on a line by itself: [PKCS12 data omitted] quit INFO: Import PKCS12 operation completed successfully ciscoasa (config)# b) Configure the trustpoint. ciscoasa(config)# crypto ca trustpoint tls-proxy-server-tp ciscoasa(ca-trustpoint)# revocation-c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
376
ciscoasa(config)# crypto ca authenticate diameter-server Enter the base 64 encoded CA certificate. End with a blank line or the word "quit" on a line by itself MIIDRTCCAu+gAwIBAgIQKVcqP/KW74VP0NZzL+JbRTANBgkqhkiG9w0BAQUFADCB [certificate data omitted] /7QEM8izy0EOTSErKu7Nd76jwf5e4qttkQ== quit INFO: Certificate has the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
377
d) (Optional.) Define the ciphers that the client can use. client cipher-suite cipher-list Where cipher-list can include any combination of the following: • 3des-sha1 • aes128-sha1 • aes256-sha1 • des-sha1 • null-sha1 • rc4-sha1 Separate multiple options with spaces. If you do not define the ciphers the TLS proxy can u...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
378
• You need to create the LDC trustpoint. You need to export the LDC server’s CA certificate and import it into the Diameter server. The export step is explained below. Consult the Diameter server’s documentation for information on importing certificates. Procedure Step 1 Import the CA certificate that is used to sign t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
379
The proxy-ldc-issuer command defines the local CA role for the trustpoint to issue dynamic certificates for TLS proxy. ciscoasa(config)# crypto ca trustpoint ldc-server ciscoasa(ca-trustpoint)# keypair ldc-signer-key ciscoasa(ca-trustpoint)# subject-name CN=asa3 ciscoasa(ca-trustpoint)# enrollment self ciscoasa(ca-trus...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
380
are available except for NULL-SHA, DES-CBC-SHA, and RC4-MD5. Specify the client cipher-suite command only if you want to use a different suite than the one generally available on the ASA. To set the minimum TLS version for all SSL client connections on the ASA, see the ssl client-version command. The default is TLS v1....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
381
a) Name the TLS proxy and enter TLS proxy configuration mode. tls-proxy name b) Identify the trustpoint used when the ASA acts as the server in relationship to the Diameter clients. server trust-point trustpoint_name For testing purposes, or if you are certain that you can trust the Diameter clients, you can skip thiss...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
382
The default point code format is ITU. If you use a different format, specify the required format in the policy map. If you do not want to apply policy based on point code or message class, you do not need to configure an M3UA policy map. You can enable inspection without a map. Procedure Step 1 Create an M3UA inspectio...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
383
• match[not] service-indicator number—Matches the service indicator number, 0-15.Following are the available service indicators. Consult M3UA RFCs and documentation for detailed information about these service indicators. • 0—Signaling Network Management Messages • 1—Signaling Network Testing and Maintenance Messages •...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
384
• timeout endpoint time—Setsthe idle timeout to remove statisticsfor an M3UA endpoint, in hh:mm:ss format. To have no timeout, specify 0. The default is 30 minutes (00:30:00). Example The following is an example of an M3UA policy map and service policy. hostname(config)# policy-map type inspect m3ua m3ua-map hostname(c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
385
In the default global policy, the inspection_default class map is a special class map that includes default ports for all inspection types (matchdefault-inspection-traffic). If you are using this class map in either the default policy or for a new service policy, you can skip this step. For information on matching stat...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
386
If you are editing the default global policy (or any in-use policy) to use a different inspection policy map, you must remove the inspection with the no inspect version of the command, and then re-add it with the new inspection policy map name. For example, to change the policy map for GTP: hostname(config-class)# no i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
387
hostname(config-pmap)# parameters hostname(config-pmap-p)# Step 4 Set one or more parameters. You can set the following options; use the no form of the command to disable the option. • send response—Instructs the ASA to send Accounting-Request Start and Stop messages to the sender of those messages (which are identifie...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
388
Configure the RADIUS Accounting Inspection Service Policy RADIUS accounting inspection is not enabled in the default inspection policy, so you must enable it if you need this inspection. Because RADIUS accounting inspection is for traffic directed to the ASA, you must configure it as a management inspection rule rather...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
389
Step 5 If you are editing an existing service policy (such as the default global policy called global_policy), you are done. Otherwise, activate the policy map on one or more interfaces. service-policy policymap_name {global | interface interface_name} Example: hostname(config)# service-policy global_policy global The ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
390
total received 1 0 dropped 0 0 forwarded 1 0 Use the show service-policy inspect gtp pdp-context command to display PDP context-related information. For GTPv2, this is the bearer context. For example: ciscoasa(config)# show service-policy inspect gtp pdp-context 4 in use, 5 most used Version v1, TID 050542012151705f, M...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
391
5-min-pkt-rate 0 pkts/sec, v6-fail-close 0, sctp-drop-override 4910 Match ppid 30 35 rate-limit 1000 kbps, chunk 2354, dropped 10, bytes 21408, dropped-bytes 958 Match: ppid 40 drop, chunk 5849 Match: ppid 55 log, chunk 9546 • show sctp [detail] Displays current SCTP cookies and associations. Add the detail keyword to ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
392
• show diameter Displays state information for each Diameter connection. For example: ciscoasa# show diameter Total active diameter sessions: 5 Session 3638 ========== ref_count: 1 val = .; 1096298391; 2461; Protocol : diameter Context id : 0 From inside:211.1.1.10/45169 to outside:212.1.1.10/3868 ... • show conn detai...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
393
History for Mobile Network Inspection Feature Name Releases Feature Information GTP inspection can now handle GTPv2. In addition, GTP inspection for all versions now supports IPv6 addresses. We changed the match message idcommand to match message {v1 | v2} id message_id . We replaced the timeout gsn command with timeou...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
394
Feature Name Releases Feature Information You can now inspect M3UA traffic and also apply actions based on point code, service indicator, and message class and type. We added or modified the following commands: clear service-policy inspect m3ua {drops| endpoint [IP_address]}, inspect m3ua, match dpc, match opc, match s...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
395
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 374 Service Policies and Application Inspection History for Mobile Network Inspection
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
396
P ART IV Connection Management and Threat Detection • Connection Settings, on page 377 • Quality of Service, on page 403 • Threat Detection, on page 417
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf