Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    1-15
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 1      Configuring a Service Policy
      Managing the Order of Service Policy Rules
    Specify the address and subnet mask using prefix/length notation, such as 10.1.1.0/24. If you 
    enter an IP address without a mask, it is considered to be a host address, even if it ends with a 0.
    Enter any to specify any destination address.
    Separate multiple addresses by a comma.
    d.In the Service field, enter an IP service name or number for the destination service, or click the 
    ... button to choose a service.
    If you want to specify a TCP or UDP port number, or an ICMP service number, enter 
    protocol/port. For example, enter TCP/8080.
    By default, the service is IP.
    Separate multiple services by a comma.
    e.(Optional) Enter a description in the Description field.
    f.(Optional) To specify a source service for TCP or UDP, click the More Options area open, and 
    enter a TCP or UDP service in the Source Service field.
    The destination service and source service must be the same. Copy and paste the destination 
    Service field to the Source Service field.
    g.(Optional) To make the rule inactive, click the More Options area open, and uncheck Enable 
    Rule.
    This setting might be useful if you do not want to remove the rule, but want to turn it off.
    h.(Optional) To set a time range for the rule, click the More Options area open, and from the Time 
    Range drop-down list, choose a time range.
    To add a new time range, click the ... button. See the “Configuring Time Ranges” section on 
    page 20-26 in the general operations configuration guide for more information.
    This setting might be useful if you only want the rule to be active at predefined times.
    Destination Port—Click TCP or UDP.
    In the Service field, enter a port number or name, or click ... to choose one already defined in ASDM.
    Step 8Click Next.
    The Add Management Service Policy Rule - Rule Actions dialog box appears.
    Step 9To configure RADIUS accounting inspection, choose an inspect map from the RADIUS Accounting 
    Map drop-down list, or click Configure to add a map.
    See the “Supported Features” section on page 1-1 for more information.
    Step 10To configure connection settings, see the “Configuring Connection Settings” section on page 22-8.
    Step 11Click Finish.
    Managing the Order of Service Policy Rules
    The order of service policy rules on an interface or in the global policy affects how actions are applied 
    to traffic. See the following guidelines for how a packet matches rules in a service policy:
    A packet can match only one rule in a service policy for each feature type.
    When the packet matches a rule that includes actions for a feature type, the ASA does not attempt 
    to match it to any subsequent rules including that feature type. 
    						
    							 
    1-16
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 1      Configuring a Service Policy
      Managing the Order of Service Policy Rules
    If the packet matches a subsequent rule for a different feature type, however, then the ASA also 
    applies the actions for the subsequent rule.
    For example, if a packet matches a rule for connection limits, and also matches a rule for application 
    inspection, then both rule actions are applied.
    If a packet matches a rule for application inspection, but also matches another rule that includes 
    application inspection, then the second rule actions are not applied.
    If your rule includes an ACL with multiple ACEs, then the order of ACEs also affects the packet flow. 
    The ASA tests the packet against each ACE in the order in which the entries are listed. After a match is 
    found, no more ACEs are checked. For example, if you create an ACE at the beginning of an ACL that 
    explicitly permits all traffic, no further statements are ever checked.
    To change the order of rules or ACEs within a rule, perform the following steps:
    Step 1From the Configuration > Firewall > Service Policy Rules pane, choose the rule or ACE that you want 
    to move up or down.
    Step 2Click the Move Up or Move Down cursor (see Figure 1-1).
    Figure 1-1 Moving an ACE
    NoteIf you rearrange ACEs in an ACL that is used in multiple service policies, then the change is 
    inherited in all service policies.
    Step 3When you are done rearranging your rules or ACEs, click Apply. 
    						
    							 
    1-17
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 1      Configuring a Service Policy
      Feature History for Service Policies
    Feature History for Service Policies
    Ta b l e 1 - 3 lists the release history for this feature.
    Table 1-3 Feature History for Service Policies
    Feature Name Releases Feature Information
    Modular Policy Framework 7.0(1) Modular Policy Framework was introduced.
    Management class map for use with RADIUS 
    accounting traffic7.2(1) The management class map was introduced for use with 
    RADIUS accounting traffic. The following commands were 
    introduced: class-map type management, and inspect 
    radius-accounting.
    Inspection policy maps 7.2(1) The inspection policy map was introduced. The following 
    command was introduced: class-map type inspect.
    Regular expressions and policy maps 7.2(1) Regular expressions and policy maps were introduced to be 
    used under inspection policy maps. The following 
    commands were introduced: class-map type regex, regex, 
    match regex.
    Match any for inspection policy maps 8.0(2) The match any keyword was introduced for use with 
    inspection policy maps: traffic can match one or more 
    criteria to match the class map. Formerly, only match all 
    was available. 
    						
    							 
    1-18
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 1      Configuring a Service Policy
      Feature History for Service Policies 
    						
    							CH A P T E R
     
    2-1
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    2
    Configuring Special Actions for Application 
    Inspections (Inspection Policy Map)
    Modular Policy Framework lets you configure special actions for many application inspections. When 
    you enable an inspection engine in the service policy, you can also optionally enable actions as defined 
    in an inspection policy map. When the inspection policy map matches traffic within the service policy 
    for which you have defined an inspection action, then that subset of traffic will be acted upon as specified 
    (for example, dropped or rate-limited).
    This chapter includes the following sections:
    Information About Inspection Policy Maps, page 2-1
    Guidelines and Limitations, page 2-2
    Default Inspection Policy Maps, page 2-2
    Defining Actions in an Inspection Policy Map, page 2-3
    Identifying Traffic in an Inspection Class Map, page 2-3
    Where to Go Next, page 2-4
    Feature History for Inspection Policy Maps, page 2-4
    Information About Inspection Policy Maps
    See the “Configuring Application Layer Protocol Inspection” section on page 10-7 for a list of 
    applications that support inspection policy maps.
    An inspection policy map consists of one or more of the following elements. The exact options available 
    for an inspection policy map depends on the application.
    Traffic matching option—You can define a traffic matching option directly in the inspection policy 
    map to match application traffic to criteria specific to the application, such as a URL string, for 
    which you then enable actions.
    –Some traffic matching options can specify regular expressions to match text inside a packet. Be 
    sure to create and test the regular expressions before you configure the policy map, either singly 
    or grouped together in a regular expression class map.
    Inspection class map—An inspection class map includes multiple traffic matching options. You then 
    identify the class map in the policy map and enable actions for the class map as a whole. The 
    difference between creating a class map and defining the traffic match directly in the inspection  
    						
    							 
    2-2
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 2      Configuring Special Actions for Application Inspections (Inspection Policy Map)
      Guidelines and Limitations
    policy map is that you can create more complex match criteria and you can reuse class maps. 
    However, you cannot set different actions for different matches. Note: Not all inspections support 
    inspection class maps.
    Parameters—Parameters affect the behavior of the inspection engine.
    Guidelines and Limitations
    HTTP inspection policy maps—If you modify an in-use HTTP inspection policy map, you must 
    remove and reapply the inspection policy map action for the changes to take effect. For example, if 
    you modify the “http-map” inspection policy map, you must remove, apply changes, and readd the 
    inspection policy map to the service policy.
    All inspection policy maps—If you want to exchange an in-use inspection policy map for a different 
    map name, you must remove, apply changes, and readd the new inspection policy map to the service 
    policy.
    You can specify multiple inspection class maps or direct matches in the inspection policy map.
    If a packet matches multiple different matches, then the order in which the ASA applies the actions 
    is determined by internal ASA rules, and not by the order they are added to the inspection policy 
    map. The internal rules are determined by the application type and the logical progression of parsing 
    a packet, and are not user-configurable. For example for HTTP traffic, parsing a Request Method 
    field precedes parsing the Header Host Length field; an action for the Request Method field occurs 
    before the action for the Header Host Length field.
    If an action drops a packet, then no further actions are performed in the inspection policy map. For 
    example, if the first action is to reset the connection, then it will never match any further match 
    criteria. If the first action is to log the packet, then a second action, such as resetting the connection, 
    can occur.
    If a packet matches multiple match criteria that are the same, then they are matched in the order they 
    appear in the policy map. 
    A class map is determined to be the same type as another class map or direct match based on the 
    lowest priority match option in the class map (the priority is based on the internal rules). If a class 
    map has the same type of lowest priority match option as another class map, then the class maps are 
    matched according to the order they are added to the policy map. If the lowest priority match for 
    each class map is different, then the class map with the higher priority match option is matched first.
    Default Inspection Policy Maps
    DNS inspection is enabled by default, using the preset_dns_map inspection class map:
    The maximum DNS message length is 512 bytes.
    The maximum client DNS message length is automatically set to match the Resource Record.
    DNS Guard is enabled, so the ASA tears down the DNS session associated with a DNS query as 
    soon as the DNS reply is forwarded by the ASA. The ASA also monitors the message exchange to 
    ensure that the ID of the DNS reply matches the ID of the DNS query.
    Translation of the DNS record based on the NAT configuration is enabled.
    Protocol enforcement is enabled, which enables DNS message format check, including domain 
    name length of no more than 255 characters, label length of 63 characters, compression, and looped 
    pointer check. 
    						
    							 
    2-3
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 2      Configuring Special Actions for Application Inspections (Inspection Policy Map)
      Defining Actions in an Inspection Policy Map
    NoteThere are other default inspection policy maps such as _default_esmtp_map. For example, an ESMTP 
    inspection rule implicitly uses the policy map “_default_esmtp_map.”
    Defining Actions in an Inspection Policy Map
    When you enable an inspection engine in the service policy, you can also optionally enable actions as 
    defined in an inspection policy map.
    Detailed Steps
    Step 1(Optional) Create an inspection class map. Alternatively, you can identify the traffic directly within the 
    policy map. See the “Identifying Traffic in an Inspection Class Map” section on page 2-3.
    Step 2(Optional) For policy map types that support regular expressions, create a regular expression. See the 
    “Configuring Regular Expressions” section on page 20-20 in the general operations configuration guide.
    Step 3Choose Configuration > Firewall > Objects > Inspect Maps .
    Step 4Choose the inspection type you want to configure.
    Step 5Click Add to add a new inspection policy map.
    Step 6Follow the instructions for your inspection type in the inspection chapter.
    Identifying Traffic in an Inspection Class Map
    This type of class map allows you to match criteria that is specific to an application. For example, for 
    DNS traffic, you can match the domain name in a DNS query.
    A class map groups multiple traffic matches (in a match-all class map), or lets you match any of a list of 
    matches (in a match-any class map). The difference between creating a class map and defining the traffic 
    match directly in the inspection policy map is that the class map lets you group multiple match 
    commands, and you can reuse class maps. For the traffic that you identify in this class map, you can 
    specify actions such as dropping, resetting, and/or logging the connection in the inspection policy map. 
    If you want to perform different actions on different types of traffic, you should identify the traffic 
    directly in the policy map.
    Restrictions
    Not all applications support inspection class maps.
    Detailed Steps
    Step 1Choose Configuration > Firewall > Objects > Class Maps .
    Step 2Choose the inspection type you want to configure.
    Step 3Click Add to add a new inspection class map. 
    						
    							 
    2-4
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 2      Configuring Special Actions for Application Inspections (Inspection Policy Map)
      Where to Go Next
    Step 4Follow the instructions for your inspection type in the inspection chapter.
    Where to Go Next
    To use an inspection policy, see Chapter 1, “Configuring a Service Policy.”
    Feature History for Inspection Policy Maps
    Ta b l e 2 - 1 lists the release history for this feature.
    Table 2-1 Feature History for Service Policies
    Feature Name Releases Feature Information
    Inspection policy maps 7.2(1) The inspection policy map was introduced. The following 
    command was introduced: class-map type inspect.
    Regular expressions and policy maps 7.2(1) Regular expressions and policy maps were introduced to be 
    used under inspection policy maps. The following 
    commands were introduced: class-map type regex, regex, 
    match regex.
    Match any for inspection policy maps 8.0(2) The match any keyword was introduced for use with 
    inspection policy maps: traffic can match one or more 
    criteria to match the class map. Formerly, only match all 
    was available. 
    						
    							 
    PART 2
    Configuring Network Address Translation 
    						
    All Cisco manuals Comments (0)