index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
297 | b) Set one or more parameters. You can set the following options; use theno form of the command to disable
the option:
• timeout pinhole hh:mm:ss—Configures the timeout for DCERPC pinholes and override the global
system pinhole timeout of two minutes. The timeout can be from 00:00:01 to 119:00:00.
• endpoint-mapper [ep... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
298 | • DNS Guard is enabled, so the ASA tears down the DNS session associated with a DNS query as soon
as the DNS reply is forwarded by the ASA. The ASA also monitors the message exchange to ensure that
the ID of the DNS reply matches the ID of the DNS query.
• Translation of the DNS record based on the NAT configuration is... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
299 | a) Create the class map: class-map type inspect dns [match-all | match-any] class_map_name
Where class_map_name isthe name of the class map. The match-all keyword isthe default, and specifies
that traffic must match all criteria to match the class map. The match-any keyword specifiesthat the traffic
matches the class m... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
300 | • Specify traffic directly in the policy map using one of the matchcommands described for DNSclass
maps. If you use a match not command, then any traffic that does not match the criterion in the
match not command has the action applied.
b) Specify the action you want to perform on the matching traffic by entering one o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
301 | • nat-rewrite—Translates the DNS record based on the NAT configuration.
• protocol-enforcement—Enables DNS message format check, including domain name length of no
more than 255 characters, label length of 63 characters, compression, and looped pointer check.
• tcp-inspection—Enables inspection of DNS over TCP traffic.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
302 | What to do next
You can now configure an inspection policy to use the map. See Configure Application Layer Protocol
Inspection, on page 261.
FTP Inspection
FTP inspection is enabled by default. You need to configure it only if you want non-default processing. The
following sections describe the FTP inspection engine.
F... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
303 | Caution Using strict FTP may cause the failure of FTP clients that are not strictly compliant with FTP RFCs.
With strictFTPinspection, eachFTPcommand and response sequence istracked for the following anomalous
activity:
• Truncated command—Number of commas in the PORT and PASV reply command is checked to see if
it is f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
304 | Before you begin
Some traffic matching options use regular expressions for matching purposes. If you intend to use one of
those techniques, first create the regular expression or regular expression class map.
Procedure
Step 1 (Optional) Create an FTP inspection class map by performing the following steps.
A class map g... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
305 | • PUT—Sends a file to the server.
• RMD—Deletes a directory on the server.
• RNFR—Specifies the “rename-from” filename.
• RNTO—Specifies the “rename-to” filename.
• SITE—Used to specify a server-specific command. This is usually used for remote
administration.
• STOU—Stores a file using a unique file name.
• match [not... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
306 | • mask-syst-reply—Masks the reply to syst command.
Example
Before submitting a username and password, all FTP users are presented with a greeting banner. By
default, this banner includes version information useful to hackers trying to identify weaknesses in
a system. The following example shows how to mask this banner:... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
307 | HTTP Inspection Overview
You can install a service module that performs application and URL filtering, which includes HTTPinspection,
such as ASA FirePOWER. The HTTP inspection running on the ASA is not compatible with these modules.
Note that it is far easier to configure application filtering using a purpose-built mo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
308 | To specify traffic thatshould not match the class map, use the matchnot command.For example, if the match
not command specifies the string “example.com,” then any traffic that includes “example.com” does not
match the class map.
For the traffic that you identify in this class map, you specify actions to take on the tra... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
309 | expression or regular expression class. Methods are: bcopy, bdelete, bmove, bpropfind, bproppatch,
connect, copy, delete, edit, get, getattribute, getattributenames, getproperties, head, index, lock,
mkcol, mkdir, move, notify, options, poll, post, propfind, proppatch, put, revadd, revlabel, revlog,
revnum, save, searc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
310 | • Specify traffic directly in the policy map using one of the match commands described for HTTP
class maps. If you use a match not command, then any traffic that does not match the criterion in
the match not command has the action applied.
b) Specify the action you want to perform on the matching traffic by entering on... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
311 | hostname(config-cmap)# match regex get
hostname(config-cmap)# match regex put
hostname(config-cmap)# exit
hostname(config)# class-map type inspect http http_url_policy
hostname(config-cmap)# match request uri regex class url_to_log
hostname(config-cmap)# match request method regex class methods_to_log
hostname(config-c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
312 | ILS Inspection
The Internet Locator Service (ILS) inspection engine provides NAT support for Microsoft NetMeeting,
SiteServer, and Active Directory products that use LDAP to exchange directory information with an ILS
server. You cannot use PAT with ILS inspection because only IP addresses are stored by an LDAP database... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
313 | Procedure
Step 1 (Optional) Create an IM inspection class map by performing the following steps.
A class map groups multiple traffic matches. You can alternatively identify match commands directly in the
policy map. The difference between creating a class map and defining the traffic match directly in the inspection
po... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
314 | d) Enter exit to leave class map configuration mode.
Step 2 Create an IM inspection policy map: policy-map type inspect im policy_map_name
Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration mode.
Step 3 (Optional) Add a description to the policy map: description string
Step... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
315 | hostname(config-cmap)# match version regex yahoo_version_regex
hostname(config)# class-map im_inspect_class_map
hostname(config-cmap)# match default-inspection-traffic
hostname(config)# policy-map type inspect im im_policy_all
hostname(config-pmap)# class yahoo_file_block_list
hostname(config-pmap-c)# match service fil... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
316 | require relatively complex processing from the routers along the packet’s delivery path. Dropping RSVP
packets containing the Router Alert option can cause problems in VoIP implementations.
• Packets that contain any other options are dropped.
Each time a packet is dropped due to inspection, syslog 106012 is issued. Th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
317 | • exp-flow-control action {allow | clear}—Allows or clears the Experimental Flow Control (FINN)
option.
• exp-measurement action {allow | clear}—Allows or clears the Experimental Measurement (ZSU)
option.
• extended-security action {allow | clear}—Allows or clears the Extended Security (E-SEC) option.
• imi-traffic-des... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
318 | NAT and non-NAT traffic is permitted. However, PAT is not supported.
Configure an IPsec Pass Through Inspection Policy Map
An IPsec Pass Through map lets you change the default configuration values used for IPsec Pass Through
application inspection. You can use an IPsecPass Through map to permit certain flows without u... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
319 | hostname(config-pmap-c)# inspect ipsec-pass-thru iptmap
hostname(config)# service-policy inspection_policy interface outside
IPv6 Inspection
IPv6 inspection lets you selectively log or drop IPv6 traffic based on the extension header. In addition, IPv6
inspection can check conformance to RFC 2460 for type and order of e... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
320 | • ah—Matches the IPv6 Authentication extension header.
• count gt number—Specifies the maximum number of IPv6 extension headers, from 0 to 255.
• destination-option—Matches the IPv6 destination-option extension header.
• esp—Matches the IPv6 Encapsulation Security Payload (ESP) extension header.
• fragment—Matches the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
321 | drop log
match header routing-address count gt 0
drop log
match header routing-type eq 0
drop log
policy-map global_policy
class class-default
inspect ipv6 ipv6-pm
!
service-policy global_policy global
What to do next
You can now configure an inspection policy to use the map. See Configure Application Layer Protocol
In... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
322 | hostname(config)# policy-map netbios_policy
hostname(config-pmap)# class inspection_default
hostname(config-pmap-c)# no inspect netbios
hostname(config-pmap-c)# inspect netbios netbios_map
What to do next
You can now configure an inspection policy to use the map. See Configure Application Layer Protocol
Inspection, on ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
323 | The following sections describe the ESMTP inspection engine.
SMTP and ESMTP Inspection Overview
Extended SMTP (ESMTP) application inspection provides improved protection against SMTP-based attacks
by restricting the types of SMTP commands that can pass through the ASA and by adding monitoring
capabilities. ESMTP is an ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
324 | • The server banner is masked. The ESMTP inspection engine changes the characters in the server SMTP
banner to asterisks except for the “2”, “0”, “0” characters. Carriage return (CR) and linefeed (LF)
characters are ignored.
• Encrypted connections are allowed but not inspected.
• Special characters in sender and recei... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
325 | Procedure
Step 1 Create an ESMTP inspection policy map: policy-map type inspect esmtp policy_map_name
Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration mode.
Step 2 (Optional) Add a description to the policy map: description string
Step 3 To apply actions to matching traff... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
326 | • mask [log]—Mask out the matching portion of the packet. This action is available for
ehlo-reply-parameter and cmd verb only.
• reset [log]—Drop the packet, close the connection, and send a TCP reset to the server or client.
• log—Send a system log message. You can use this option alone or with one of the other action... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
327 | hostname(config-pmap-c)# drop-connection log
hostname(config)# policy-map outside_policy
hostname(config-pmap)# class inspection_default
hostname(config-pmap-c)# inspect esmtp advanced_esmtp_map
hostname(config)# service-policy outside_policy interface outside
What to do next
You can now configure an inspection policy ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
328 | SQL*Net Inspection
SQL*Net inspection is enabled by default. The inspection engine supports SQL*Net versions 1 and 2, but
only the Transparent Network Substrate (TNS) format. Inspection does not support the Tabular Data Stream
(TDS) format.SQL*Net messages are scanned for embedded addresses and ports, and NAT rewrite i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
329 | sunrpc-server interface_name ip_address mask service service_type protocol {tcp | udp} port[-port]
timeout hh:mm:ss
Where:
• interface_name—The interface through which traffic to the server flows.
• ip_address mask—The address of the Sun RPC server.
• service service_type —The service type on the server, which is the m... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
330 | The inspection engine inspects TFTP read request (RRQ), write request (WRQ), and error notification
(ERROR), and dynamically creates connections and translations, if necessary, to permit file transfer between
a TFTP client and server.
A dynamic secondary channel and a PAT translation, if necessary, are allocated on a r... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
331 | History for Basic Internet Protocol Inspection
Feature Name Releases Feature Information
The ASA started supporting non-EPM DCERPC messages in
release 8.3, supporting the ISystemMapper UUID message
RemoteCreateInstance opnum4. This change extends support
to the RemoteGetClassObject opnum3 message.
We did not modify any... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
332 | CHAPTER 13
Inspection for Voice and Video Protocols
The following topics explain application inspection for voice and video protocols. For basic information on
why you need to use inspection for certain protocols, and the overall methods for applying inspection, see
Getting Started with Application Layer Protocol Inspe... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
333 | Cisco IPSoftPhone requires the Cisco CallManager IPaddress to be specified explicitly in its Cisco TSP
configuration on the PC.
• When using PAT or Outside PAT, if the Cisco CallManager IP address is to be translated, its TCP port
2748 must be statically mapped to the same port of the PAT (interface) address for Cisco ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
334 | Within each H.245 message, the H.323 endpoints exchange port numbers that are used for subsequent UDP
data streams. H.323 inspection inspects the H.245 messages to identify these ports and dynamically creates
connections for the media exchange. RTP uses the negotiated port number, while RTCP uses the next higher
port n... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
335 | Limitations for H.323 Inspection
H.323 inspection is tested and supported for Cisco Unified Communications Manager (CUCM) 7.0. It is not
supported for CUCM 8.0 and higher. H.323 inspection might work with other releases and products.
The following are some of the known issues and limitations when using H.323 applicatio... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
336 | Where string is the description of the class map (up to 200 characters).
c) Specify the traffic on which you want to perform actions using one of the following match commands.
If you use a match not command, then any traffic that does not match the criterion in the match not
command has the action applied.
• match[not]... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
337 | for calls based on the RegistrationRequest/RegistrationConfirm (RRQ/RCF) messages. Because
these RRQ/RCF messages are sent to and from the Gatekeeper, the calling endpoint's IP address is
unknown and the ASA opens a pinhole through source IP address/port 0/0. By default, this option
is disabled.
• timeout users time—Se... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
338 | hostname(config)# policy-map type inspect h323 h323_map
hostname(config-pmap)# parameters
hostname(config-pmap-p)# class h323_traffic
hostname(config-pmap-c)# drop
What to do next
You can now configure an inspection policy to use the map. See Configure Application Layer Protocol
Inspection, on page 261.
MGCP Inspection... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
339 | Figure 49: Using NAT with MGCP
MGCP endpoints are physical or virtual sources and destinations for data. Media gateways contain endpoints
on which the call agent can create, modify and delete connections to establish and control media sessions with
other multimedia endpoints. Also, the call agent can instruct the endpo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
340 | Step 2 (Optional) Add a description to the policy map: description string
Step 3 Enter parameters configuration mode.
hostname(config-pmap)# parameters
hostname(config-pmap-p)#
Step 4 Set one or more parameters. You can set the following options; use the no form of the command to disable
the option.
• call-agent ip_add... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
341 | RTSP Inspection
RTSP inspection is enabled by default. You need to configure it only if you want non-default processing. The
following sections describe RTSP application inspection.
RTSP Inspection Overview
The RTSP inspection engine lets the ASA pass RTSP packets. RTSP is used by RealAudio, RealNetworks,
Apple QuickTi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
342 | • The ASA cannot perform NAT on RTSP messages because the embedded IP addresses are contained in
the SDP files as part of HTTP or RTSP messages. Packets could be fragmented and the ASA cannot
perform NAT on fragmented packets.
• With Cisco IP/TV, the number of translates the ASA performs on the SDP part of the message ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
343 | • match[not] request-method method—Matches an RTSPrequest method. The methods are: announce,
describe, get_parameter, options, pause, play, record, redirect, setup, set_parameter, teardown.
• match [not] url-filter regex {regex_name | class class_name}—Matches the URL against the
specified regular expression or regular... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
344 | hostname(config)# regex badurl1 www.url1.com/rtsp.avi
hostname(config)# regex badurl2 www.url2.com/rtsp.rm
hostname(config)# regex badurl3 www.url3.com/rtsp.asp
hostname(config)# class-map type regex match-any badurl-list
hostname(config-cmap)# match regex badurl1
hostname(config-cmap)# match regex badurl2
hostname(con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
345 | To support SIP calls through the ASA, signaling messages for the media connection addresses, media ports,
and embryonic connections for the media must be inspected, because while the signaling is sent over a
well-known destination port (UDP/TCP5060), the media streams are dynamically allocated. Also,SIPembeds
IP addres... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
346 | Default SIP Inspection
SIP inspection is enabled by default using the default inspection map, which includes the following:
• SIP instant messaging (IM) extensions: Enabled.
• Non-SIP traffic on SIP port: Permitted.
• Hide server’s and endpoint’s IP addresses: Disabled.
• Mask software version and non-SIP URIs: Disable... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
347 | b) (Optional) Add a description to the class map: description string
Where string is the description of the class map (up to 200 characters).
c) Specify the traffic on which you want to perform actions using one of the following match commands.
If you use a match not command, then any traffic that does not match the cr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
348 | • log—Send a system log message. You can use this option alone or with one of the other actions.
• rate-limit message_rate—Limits the rate of messages. Rate limiting is available for request method
matches to “invite” and “register” only.
You can specify multiple class or match commands in the policy map. For informati... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
349 | • uri-non-sip action {mask [log] | log}—Identifies the non-SIP URIs present in the Alert-Info and
Call-Info header fields. You can mask the information in the SIP messages and optionally log it, or
simply log it.
Examples
The following example shows how to disable instant messaging over SIP:
hostname(config)# policy-ma... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
350 | The ASA supports PAT and NAT for SCCP. PAT is necessary if you have more IP phones than global IP
addressesfor the IPphonesto use. By supporting NAT andPAT ofSCCPSignaling packets,Skinny application
inspection ensures that all SCCP signaling and media packets can traverse the ASA.
Normal traffic between Cisco CallManag... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
351 | • Registration: Not enforced.
• Maximum message ID: 0x181.
• Minimum prefix length: 4
• Media timeout: 00:05:00
• Signaling timeout: 01:00:00.
• RTP conformance: Not enforced.
Also note that inspection of encrypted traffic is not enabled. You must configure a TLS proxy to inspect
encrypted traffic.
Configure a Skinny (... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
352 | • enforce-registration—Enforces registration before calls can be placed.
• message-ID max hex_value—Sets the maximum SCCP station message ID allowed. The message
ID is in hex, and the default maximum is 0x181.
• rtp-conformance [enforce-payloadtype]—Checks RTPpacketsflowing on the pinholesfor protocol
conformance. The ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
353 | When you enableSTUN inspection on the default inspection class, TCP/UDPport 3478 is watched forSTUN
traffic. The inspection supports IPv4 addresses and TCP/UDP only.
There are some NAT limitations for STUN inspection. For WebRTC traffic, static NAT/PAT44 are supported.
Cisco Spark can support additional types of NAT, b... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
354 | Feature Name Releases Feature Information
You can no longer use Phone Proxy or UC-IME Proxy when
configuringSIPinspection. Use TLSProxy to inspect encrypted
traffic.
We removed the following commands: phone-proxy, uc-ime.
We removed the phone-proxy and uc-ime keywords from the
inspect sip command.
SIP inspection suppor... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
355 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
334
Service Policies and Application Inspection
History for Voice and Video Protocol Inspection | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
356 | CHAPTER 14
Inspection for Mobile Networks
The following topics explain application inspection for protocols used in mobile networks such as LTE. These
inspectionsrequire the Carrier license.For information on why you need to use inspection for certain protocols,
and the overall methodsfor applying inspection,see Gettin... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
357 | GTP Inspection Limitations
Following are some limitations on GTP inspection:
• GTPv2 piggybacking messages are not supported. They are always dropped.
• GTPv2 emergency UE attach is supported only if it contains IMSI (International Mobile Subscriber
Identity).
• GTP inspection does not inspect early data. That is, data... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
358 | SCTP Stateful Inspection
Similar to TCP, SCTP traffic is automatically inspected at layer 4 to ensure well-structured traffic and limited
RFC 4960 enforcement. The following protocol elements are inspected and enforced:
• Chunk types, flags, and length.
• Verification tags.
• Source and destination ports, to prevent as... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
359 | • If you use PPID filtering to drop or rate-limit packets, be aware that the transmitter will resend any
dropped packets. Although a packet for a rate-limited PPID might make it through on the next attempt,
a packet for a droppedPPID will again be dropped. You might want to evaluate the eventual consequence
of these re... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
360 | M3UA inspection provides limited protocol conformance.
You can optionally apply access policy based on point codes or Service Indicators (SI). You can also apply
rate limiting based on message class and type.
M3UA Protocol Conformance
M3UA inspection provides the following limited protocol enforcement. Inspection drops... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
361 | You have the option to configure a secret pre-shared key with the RADIUS server so the ASA can validate
the message. If the shared secret is not configured, the ASA will only check that the source IP address is one
of the configured addresses allowed to send the RADIUS messages.
When using RADIUS accounting inspection ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
362 | • The maximum number of requests is 200.
• The maximum number of tunnels is 500. This is equivalent to the number of PDP contexts (endpoints).
• The GTPendpoint timeout is 30 minutes. Endpointsinclude GSNs(GTPv0,1) andSGW/PGW (GTPv2).
• The PDP context timeout is 30 minutes. In GTPv2, this is the bearer context timeout... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
363 | Configure a GTP Inspection Policy Map
If you want to enforce additional parameters on GTP traffic, and the default map does not meet your needs,
create and configure a GTP map.
Before you begin
Some traffic matching options use regular expressions for matching purposes. If you intend to use one of
those techniques, fir... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
364 | b) Set one or more parameters. You can set the following options; use theno form of the command to disable
the option:
• permit errors—Allows invalid GTP packets or packets that otherwise would fail parsing and be
dropped.
• request-queue max_requests—Sets the maximum number of GTP requests that will be queued
waiting ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
365 | To configure GSN/PGW pooling and thus support load balancing, create a network object group that specifies
the GSN/PGW endpoints and specify this on the from-object-group parameter. Likewise, create a network
object group for theSGSN/SGW and select it on the to-object-groupparameter. If the GSN/PGW responding
belongs t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
366 | PPIDs are in data chunks, and a given packet can have multiple data chunks or even a control chunk. If a
packet includes a control chunk or multiple data chunks, the packet will not be dropped even if the assigned
action is drop. For example, if you configure an SCTP inspection policy map to drop PPID 26, and a PPID
26... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
367 | log
policy-map global_policy
class inspection_default
inspect sctp sctp-pmap
!
service-policy global_policy global
What to do next
You can now configure an inspection policy to use the map. See Configure the Mobile Network Inspection
Service Policy , on page 363.
Configure a Diameter Inspection Policy Map
You can creat... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
368 | b) (Optional) Add a description to the class map: description string
Where string is the description of the class map (up to 200 characters).
c) Specify the traffic on which you want to perform actions using one of the following match commands.
If you use a match not command, then any traffic that does not match the cr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
369 | • value—The value portion of the AVP. You can configure this only if the data type of the AVP
is supported. For example, you can specify an IP address for AVP that have the address data
type. Following are the specific syntax of the value option for the supported data types:
• Diameter Identity, Diameter URI, Octet Str... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
370 | • drop—Drop all packets that match.
• drop-connection—Drop the packet and close the connection.
• log—Send a system log message.
You can specify multiple class or match commands in the policy map. For information about the order
of class and match commands, see How Multiple Traffic Classes are Handled, on page 254.
Exa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
371 | class-map type inspect diameter match-all block_ip
match command-code cer-cea
match avp host-ip-address 1.1.1.1
policy-map type inspect diameter diameter_map
parameters
unsupported application-id log
class log_app
log
class block_ip
drop-connection
policy-map global_policy
class inspection_default
inspect diameter diam... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
372 | • float32—32-bit floating point number.
• float64—64-bit floating point number.
• int32—32-bit integer.
• int64—64-bit integer.
• octetstring—Octet string.
• time—Time value.
• uint32—32-bit unsigned integer.
• uint64—64-bit unsigned integer.
• vendor-id id_number—(Optional.) The ID number of the vendor who defined the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
373 | ASA proxy TLS server
• Server identity certificate
• CA certificate used to sign the
Diameter TLS client's identity
certificate
Diameter TLS client (MME) 2
• Client identity certificate
• CA certificate used to sign the ASA
TLSproxy server'sidentity certificate
1
Diameter TLS server (full proxy)
• Server identity certi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
374 | • You need to import the Certificate Authority (CA) certificate used to sign the ASA’s server certificate
into the Diameter client. This might be in the client’s CA certificate store or some other location that the
client uses. Consult the client documentation for exact details on certificate usage.
• You need to impor... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
375 | Enter the base 64 encoded pkcs12.
End with a blank line or the word "quit" on a line by itself:
[PKCS12 data omitted]
quit
INFO: Import PKCS12 operation completed successfully
ciscoasa (config)#
b) Configure the trustpoint.
ciscoasa(config)# crypto ca trustpoint tls-proxy-server-tp
ciscoasa(ca-trustpoint)# revocation-c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
376 | ciscoasa(config)# crypto ca authenticate diameter-server
Enter the base 64 encoded CA certificate.
End with a blank line or the word "quit" on a line by itself
MIIDRTCCAu+gAwIBAgIQKVcqP/KW74VP0NZzL+JbRTANBgkqhkiG9w0BAQUFADCB
[certificate data omitted]
/7QEM8izy0EOTSErKu7Nd76jwf5e4qttkQ==
quit
INFO: Certificate has the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
377 | d) (Optional.) Define the ciphers that the client can use.
client cipher-suite cipher-list
Where cipher-list can include any combination of the following:
• 3des-sha1
• aes128-sha1
• aes256-sha1
• des-sha1
• null-sha1
• rc4-sha1
Separate multiple options with spaces.
If you do not define the ciphers the TLS proxy can u... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
378 | • You need to create the LDC trustpoint. You need to export the LDC server’s CA certificate and import
it into the Diameter server. The export step is explained below. Consult the Diameter server’s
documentation for information on importing certificates.
Procedure
Step 1 Import the CA certificate that is used to sign t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
379 | The proxy-ldc-issuer command defines the local CA role for the trustpoint to issue dynamic certificates
for TLS proxy.
ciscoasa(config)# crypto ca trustpoint ldc-server
ciscoasa(ca-trustpoint)# keypair ldc-signer-key
ciscoasa(ca-trustpoint)# subject-name CN=asa3
ciscoasa(ca-trustpoint)# enrollment self
ciscoasa(ca-trus... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
380 | are available except for NULL-SHA, DES-CBC-SHA, and RC4-MD5. Specify the client cipher-suite
command only if you want to use a different suite than the one generally available on the ASA.
To set the minimum TLS version for all SSL client connections on the ASA, see the ssl client-version
command. The default is TLS v1.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
381 | a) Name the TLS proxy and enter TLS proxy configuration mode.
tls-proxy name
b) Identify the trustpoint used when the ASA acts as the server in relationship to the Diameter clients.
server trust-point trustpoint_name
For testing purposes, or if you are certain that you can trust the Diameter clients, you can skip
thiss... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
382 | The default point code format is ITU. If you use a different format, specify the required format in the policy
map.
If you do not want to apply policy based on point code or message class, you do not need to configure an
M3UA policy map. You can enable inspection without a map.
Procedure
Step 1 Create an M3UA inspectio... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
383 | • match[not] service-indicator number—Matches the service indicator number, 0-15.Following are
the available service indicators. Consult M3UA RFCs and documentation for detailed information
about these service indicators.
• 0—Signaling Network Management Messages
• 1—Signaling Network Testing and Maintenance Messages
•... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
384 | • timeout endpoint time—Setsthe idle timeout to remove statisticsfor an M3UA endpoint, in hh:mm:ss
format. To have no timeout, specify 0. The default is 30 minutes (00:30:00).
Example
The following is an example of an M3UA policy map and service policy.
hostname(config)# policy-map type inspect m3ua m3ua-map
hostname(c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
385 | In the default global policy, the inspection_default class map is a special class map that includes default ports
for all inspection types (matchdefault-inspection-traffic). If you are using this class map in either the default
policy or for a new service policy, you can skip this step.
For information on matching stat... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
386 | If you are editing the default global policy (or any in-use policy) to use a different inspection policy
map, you must remove the inspection with the no inspect version of the command, and then re-add
it with the new inspection policy map name. For example, to change the policy map for GTP:
hostname(config-class)# no i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
387 | hostname(config-pmap)# parameters
hostname(config-pmap-p)#
Step 4 Set one or more parameters. You can set the following options; use the no form of the command to disable
the option.
• send response—Instructs the ASA to send Accounting-Request Start and Stop messages to the sender
of those messages (which are identifie... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
388 | Configure the RADIUS Accounting Inspection Service Policy
RADIUS accounting inspection is not enabled in the default inspection policy, so you must enable it if you
need this inspection. Because RADIUS accounting inspection is for traffic directed to the ASA, you must
configure it as a management inspection rule rather... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
389 | Step 5 If you are editing an existing service policy (such as the default global policy called global_policy), you are
done. Otherwise, activate the policy map on one or more interfaces.
service-policy policymap_name {global | interface interface_name}
Example:
hostname(config)# service-policy global_policy global
The ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
390 | total received 1 0
dropped 0 0
forwarded 1 0
Use the show service-policy inspect gtp pdp-context command to display PDP context-related information.
For GTPv2, this is the bearer context. For example:
ciscoasa(config)# show service-policy inspect gtp pdp-context
4 in use, 5 most used
Version v1, TID 050542012151705f, M... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
391 | 5-min-pkt-rate 0 pkts/sec, v6-fail-close 0, sctp-drop-override 4910
Match ppid 30 35
rate-limit 1000 kbps, chunk 2354, dropped 10, bytes 21408, dropped-bytes 958
Match: ppid 40
drop, chunk 5849
Match: ppid 55
log, chunk 9546
• show sctp [detail]
Displays current SCTP cookies and associations. Add the detail keyword to ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
392 | • show diameter
Displays state information for each Diameter connection. For example:
ciscoasa# show diameter
Total active diameter sessions: 5
Session 3638
==========
ref_count: 1 val = .; 1096298391; 2461;
Protocol : diameter Context id : 0
From inside:211.1.1.10/45169 to outside:212.1.1.10/3868
...
• show conn detai... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
393 | History for Mobile Network Inspection
Feature Name Releases Feature Information
GTP inspection can now handle GTPv2. In addition, GTP
inspection for all versions now supports IPv6 addresses.
We changed the match message idcommand to match message
{v1 | v2} id message_id . We replaced the timeout gsn
command with timeou... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
394 | Feature Name Releases Feature Information
You can now inspect M3UA traffic and also apply actions based
on point code, service indicator, and message class and type.
We added or modified the following commands: clear
service-policy inspect m3ua {drops| endpoint [IP_address]},
inspect m3ua, match dpc, match opc, match
s... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
395 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
374
Service Policies and Application Inspection
History for Mobile Network Inspection | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
396 | P ART IV
Connection Management and Threat Detection
• Connection Settings, on page 377
• Quality of Service, on page 403
• Threat Detection, on page 417 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.