Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    10-5
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 10      Getting Started with Application Layer Protocol Inspection
      Default Settings and NAT Limitations
    ICMP ERROR — — ——
    ILS (LDAP) TCP/389 No extended PAT.
    No NAT64.——
    Instant 
    Messaging (IM)Varies by 
    clientNo extended PAT.
    No NAT64.RFC 3860 —
    IP Options— No NAT64. RFC 791, RFC 
    2113—
    IPsec Pass 
    ThroughUDP/500 No PAT.
    No NAT64.——
    IPv6 — No NAT64. RFC 2460 —
    MGCP UDP/2427, 
    2727No extended PAT.
    No NAT64.
    (Clustering) No static PAT.RFC 2705bis-05 —
    MMP TCP 5443 No extended PAT.
    No NAT64.——
    NetBIOS Name 
    Server over IPUDP/137, 
    138 (Source 
    ports)No extended PAT.
    No NAT64.— NetBIOS is supported by performing 
    NAT of the packets for NBNS UDP port 
    137 and NBDS UDP port 138.
    PPTP TCP/1723 No NAT64.
    (Clustering) No static PAT.RFC 2637 —
    RADIUS 
    Accounting1646 No NAT64. RFC 2865 —
    RSHTCP/514 No PAT.
    No NAT64.
    (Clustering) No static PAT.Berkeley UNIX —
    RTSP TCP/554 No extended PAT.
    No outside NAT.
    No NAT64.
    (Clustering) No static PAT.RFC 2326, 2327, 
    1889No handling for HTTP cloaking.
    ScanSafe (Cloud 
    Web Security)TCP/80
    TCP/413— — These ports are not included in the 
    default-inspection-traffic class for the 
    ScanSafe inspection.
    Table 10-1 Supported Application Inspection Engines (continued)
    Application1Default Port NAT Limitations Standards2Comments 
    						
    							 
    10-6
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 10      Getting Started with Application Layer Protocol Inspection
      Default Settings and NAT Limitations
    SIPTCP/5060
    UDP/5060No outside NAT.
    No NAT on same security 
    interfaces.
    No extended PAT.
    No per-session PAT.
    No NAT64.
    (Clustering) No static PAT.RFC 2543 —
    SKINNY 
    (SCCP)TCP/2000 No outside NAT.
    No NAT on same security 
    interfaces.
    No extended PAT.
    No per-session PAT.
    No NAT64.
    (Clustering) No static PAT.— Does not handle TFTP uploaded Cisco 
    IP Phone configurations under certain 
    circumstances.
    SMTP and 
    ESMTPTCP/25 No NAT64. RFC 821, 1123 —
    SNMP UDP/161, 
    162No NAT or PAT. RFC 1155, 1157, 
    1212, 1213, 1215v.2 RFC 1902-1908; v.3 RFC 
    2570-2580.
    SQL*NetTCP/1521  No extended PAT.
    No NAT64.
    (Clustering) No static PAT.— v.1 and v.2.
    Sun RPC over 
    UDP and TCPUDP/111 No extended PAT.
    No NAT64.— The default rule includes UDP port 111; 
    if you want to enable Sun RPC 
    inspection for TCP port 111, you need 
    to create a new rule that matches TCP 
    port 111 and performs Sun RPC 
    inspection.
    TFTPUDP/69 No NAT64.
    (Clustering) No static PAT.RFC 1350 Payload IP addresses are not translated.
    WAAS — No extended PAT.
    No NAT64.——
    XDCMPUDP/177 No extended PAT.
    No NAT64.
    (Clustering) No static PAT.——
    1. Inspection engines that are enabled by default for the default port are in bold.
    2. The ASA is in compliance with these standards, but it does not enforce compliance on packets being inspected. For example, FTP commands are supposed 
    to be in a particular order, but the ASA does not enforce the order.
    Table 10-1 Supported Application Inspection Engines (continued)
    Application1Default Port NAT Limitations Standards2Comments 
    						
    							 
    10-7
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 10      Getting Started with Application Layer Protocol Inspection
      Configuring Application Layer Protocol Inspection
    Configuring Application Layer Protocol Inspection
    This feature uses Security Policy Rules to create a service policy. Service policies provide a consistent 
    and flexible way to configure ASA features. For example, you can use a service policy to create a timeout 
    configuration that is specific to a particular TCP application, as opposed to one that applies to all TCP 
    applications. See Chapter 1, “Configuring a Service Policy,” for more information.
    Inspection is enabled by default for some applications. See the “Default Settings and NAT Limitations” 
    section for more information. Use this section to modify your inspection policy.
    Detailed Steps
    
    Step 1Choose Configuration > Firewall > Service Policy Rules.
    Step 2Add or edit a service policy rule according to the “Adding a Service Policy Rule for Through Traffic” 
    section on page 1-8.
    If you want to match non-standard ports, then create a new rule for the non-standard ports. See the 
    “Default Settings and NAT Limitations” section on page 10-4 for the standard ports for each inspection 
    engine. You can combine multiple rules in the same service policy if desired, so you can create one rule 
    to match certain traffic, and another to match different traffic. However, if traffic matches a rule that 
    contains an inspection action, and then matches another rule that also has an inspection action, only the 
    first matching rule is used.
    Step 3In the Edit Service Policy Rule > Rule Actions dialog box, click the Protocol Inspection tab.
    For a new rule, the dialog box is called Add Service Policy Rule Wizard - Rule Actions.
    Step 4Select each inspection type that you want to apply.
    Step 5(Optional) Some inspection engines let you control additional parameters when you apply the inspection 
    to the traffic. Click Configure for each inspection type to configure an inspect map.
    You can either choose an existing map, or create a new one. You can predefine inspect maps in the 
    Configuration > Firewall > Objects > Inspect Maps pane.
    Step 6You can configure other features for this rule if desired using the other Rule Actions tabs.
    Step 7Click OK (or Finish from the wizard). 
    						
    							 
    10-8
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 10      Getting Started with Application Layer Protocol Inspection
      Configuring Application Layer Protocol Inspection 
    						
    							CH A P T E R
     
    11-1
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    11
    Configuring Inspection of Basic Internet 
    Protocols
    This chapter describes how to configure application layer protocol inspection. Inspection engines are 
    required for services that embed IP addressing information in the user data packet or that open secondary 
    channels on dynamically assigned ports. These protocols require the ASA to do a deep packet inspection 
    instead of passing the packet through the fast path. As a result, inspection engines can affect overall 
    throughput.
    Several common inspection engines are enabled on the ASA by default, but you might need to enable 
    others depending on your network. 
    This chapter includes the following sections:
    DNS Inspection, page 11-1
    FTP Inspection, page 11-17
    HTTP Inspection, page 11-26
    ICMP Inspection, page 11-39
    ICMP Error Inspection, page 11-39
    Instant Messaging Inspection, page 11-39
    IP Options Inspection, page 11-41
    IPsec Pass Through Inspection, page 11-45
    IPv6 Inspection, page 11-48
    NetBIOS Inspection, page 11-50
    PPTP Inspection, page 11-51
    SMTP and Extended SMTP Inspection, page 11-52
    TFTP Inspection, page 11-60
    DNS Inspection
    This section describes DNS application inspection. This section includes the following topics:
    Information About DNS Inspection, page 11-2
    Default Settings for DNS Inspection, page 11-2
    (Optional) Configuring a DNS Inspection Policy Map and Class Map, page 11-3 
    						
    							 
    11-2
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 11      Configuring Inspection of Basic Internet Protocols
      DNS Inspection
    Configuring DNS Inspection, page 11-16
    Information About DNS Inspection
    General Information About DNS, page 11-2
    DNS Inspection Actions, page 11-2
    General Information About DNS
    A single connection is created for multiple DNS sessions, as long as they are between the same two 
    hosts, and the sessions have the same 5-tuple (source/destination IP address, source/destination port, and 
    protocol). DNS identification is tracked by app_id, and the idle timer for each app_id runs 
    independently. Because the app_id expires independently, a legitimate DNS response can only pass 
    through the ASA within a limited period of time and there is no resource build-up.
    DNS Inspection Actions
    DNS inspection is enabled by default. You can customize DNS inspection to perform many tasks:
    Translate the DNS record based on the NAT configuration. For more information, see the “DNS and 
    NAT” section on page 3-31.
    Enforce message length, domain-name length, and label length.
    Verify the integrity of the domain-name referred to by the pointer if compression pointers are 
    encountered in the DNS message.
    Check to see if a compression pointer loop exists.
    Inspect packets based on the DNS header, type, class and more.
    Default Settings for DNS Inspection
    DNS inspection is enabled by default, using the preset_dns_map inspection class map:
    The maximum DNS message length is 512 bytes.
    The maximum client DNS message length is automatically set to match the Resource Record.
    DNS Guard is enabled, so the ASA tears down the DNS session associated with a DNS query as 
    soon as the DNS reply is forwarded by the ASA. The ASA also monitors the message exchange to 
    ensure that the ID of the DNS reply matches the ID of the DNS query.
    Translation of the DNS record based on the NAT configuration is enabled.
    Protocol enforcement is enabled, which enables DNS message format check, including domain 
    name length of no more than 255 characters, label length of 63 characters, compression, and looped 
    pointer check. 
    						
    							 
    11-3
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 11      Configuring Inspection of Basic Internet Protocols
      DNS Inspection
    (Optional) Configuring a DNS Inspection Policy Map and Class Map
    To match DNS packets with certain characteristics and perform special actions, create a DNS inspection 
    policy map. You can also configure a DNS inspection class map to group multiple match criteria for 
    reference within the inspection policy map. You can then apply the inspection policy map when you 
    enable DNS inspection.
    Prerequisites
    If you want to match a DNS message domain name list, then create a regular expression using one of the 
    methods below:
    “Creating a Regular Expression” section on page 20-20 in the general operations configuration 
    guide.
    “Creating a Regular Expression Class Map” section on page 20-24 in the general operations 
    configuration guide.
    Detailed Steps
    Step 1Choose Configuration > Firewall > Objects > Inspect Maps > DNS.
    The Configure DNS Maps pane appears. 
    Step 2Click Add.
    The Add IPv6 Inspection Map dialog box appears.
    Step 3In the Name field, name the inspection policy map.
    Step 4(Optional) In the Description field, add a description.
    Step 5Do one of the following: 
    						
    							 
    11-4
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 11      Configuring Inspection of Basic Internet Protocols
      DNS Inspection
    To use one of the preset security levels (Low, Medium, or High), drag the Security Level knob, then 
    click OK to add the inspection policy map. You can skip the rest of this procedure.
    To customize each parameter and/or to configure packet matching inspection, click Details.
    Detailed Steps—Protocol Conformance
    Step 1Configure the following Protocol Conformance parameters:
    Step 2Enable DNS guard function—Enables DNS Guard. The ASA tears down the DNS session associated 
    with a DNS query as soon as the DNS reply is forwarded by the ASA. The ASA also monitors the 
    message exchange to ensure that the ID of the DNS reply matches the ID of the DNS query.
    Step 3Enable NAT re-write function—Translates the DNS record based on the NAT configuration.
    Step 4Enable protocol enforcement—Enables DNS message format check, including domain name length of 
    no more than 255 characters, label length of 63 characters, compression, and looped pointer check.
    Step 5Randomize the DNS identifier for DNS query—Randomizes the DNS identifier for a DNS query.
    Step 6Enforce TSIG resource record to be present in DNS message—Requires a TSIG resource record to 
    be present. Actions include:
    Action: Drop packet or Log—Drop or log a non-conforming packet.
    Log: Enable or Disable—If you selected Drop packet, you can also enable logging. 
    						
    							 
    11-5
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 11      Configuring Inspection of Basic Internet Protocols
      DNS Inspection
    Detailed Steps—Filtering
    Step 1Click the Filtering tab.
    Step 2Global Settings: Drop packets that exceed specified maximum length (global)—Sets the maximum 
    DNS message length, from 512 to 65535 bytes.
    Step 3Server Settings: Drop packets that exceed specified maximum length and Drop packets sent to 
    server that exceed length indicated by the RR—Sets the maximum server DNS message length, from 
    512 to 65535 bytes, or sets the maximum length to the value in the Resource Record. If you enable both 
    settings, the lower value is used.
    Step 4Client Settings: Drop packets that exceed specified maximum length and Drop packets sent to server 
    that exceed length indicated by the RR—Sets the maximum client DNS message length, from 512 to 
    65535 bytes, or sets the maximum length to the value in the Resource Record. If you enable both settings, 
    the lower value is used.
    Detailed Steps—Mismatch Rate
    Step 1Click the Mismatch Rate tab. 
    						
    							 
    11-6
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 11      Configuring Inspection of Basic Internet Protocols
      DNS Inspection
    Step 2Enable logging when DNS ID mismatch rate exceeds specified rate—Enables logging for excessive 
    DNS ID mismatches, where the Mismatch Instance Threshold and Time Interval fields specify the 
    maximum number of mismatch instances per x seconds before a system message log is sent.
    Detailed Steps—Inspections
    Step 1Click the Inspections tab. 
    						
    All Cisco manuals Comments (0)