Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
17-17
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 17 Managing Firewall Inspection Rules
Inspection Rules Page
Editing Rules, page 12-9
Filtering Tables, page 1-45
Field Reference
Table 17-5 Inspected Protocol Options
Element Description
Protocols table Lists the protocols that can be inspected. You can select one protocol
per rule. The list includes information on the device operating systems
that allow inspection of the protocol: do not select protocols that are not
supported by the device type to which you will apply the inspection
rule.
Tip For IOS devices, if you selected Custom Destination Ports or
Destination Address and Port for the match type on the first
page of the wizard, you can select custom protocol and click
Configure to give your protocol a name. For other device types,
select the protocol that you associate with the ports previously
specified.
The Options column displays configured options for the selected
protocol, if any.
The Group column provides additional information on the use of some
of the protocols.
Selected Protocol
Configure button
Displays the protocol you selected. If the protocol allows additional
configuration, the Configure button becomes active; click it to see your
options, and click the Help button in the dialog box that is opened for
information about the options. For more information about protocols
that allow configuration, see Configuring Protocols and Maps for
Inspection, page 17-21.
Rule Settings (IOS) Additional settings for the rule if it is used on devices running Cisco
IOS software. If you select Use Default Inspection settings, the IOS
defaults, or the settings defined in the inspection settings policy (see
Configuring Settings for Inspection Rules for IOS Devices,
page 17-88), are used. These are the settings you can enable or disable:
Alert—Whether to generate stateful packet inspection alert
messages on the console.
Audit—Whether audit trail messages are logged to the syslog
server or router.
Timeout—Whether to configure the length of time, in seconds, for
which a session is managed while there is no activity. If you select
Specify Timeout, enter the timeout value; the range is 5 to 43200
seconds.
Inspect Router Generated Traffic—Whether to inspect traffic that
is generated by the device itself. This option is available for a
limited number of the protocols.