Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
17-22
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 17 Managing Firewall Inspection Rules
Configuring Protocols and Maps for Inspection
Table 17-10 Configuring Protocols for Deep Inspection in Inspection Rules
Protocol Device Types Policy Map
Class Map
(ASA, PIX,
FWSM only)
Description and Match Criteria
Reference
DNS ASA, PIX,
FWSM, IOS
DNS DNS Inspect traffic based on a wide
variety of criteria using the class
and policy map, which allow
extensive control over DNS
packets. In addition, you can
configure a maximum length in the
inspection rule, and enable
dynamic DNS snooping for use
with Botnet rules (on ASA
devices). See the following topics:
Configuring DNS Maps,
page 17-28
DNS Class and Policy Maps
Add or Edit Match Condition
(and Action) Dialog Boxes,
page 17-31
Configure DNS Dialog Box,
page 17-18
FTP Strict ASA, PIX,
FWSM, IOS
FTP FTP Inspect traffic based on file name,
type, server, user, or FTP
command. See Configuring FTP
Maps, page 17-37 and FTP Class
and Policy Maps Add or Edit
Match Condition (and Action)
Dialog Boxes, page 17-38.
GTP ASA, PIX,
FWSM, IOS
GTP GTP Inspect traffic based on timeout
values, message sizes, tunnel
counts, and GTP versions
traversing the security appliance.
See Configuring GTP Maps,
page 17-40 and GTP Policy Maps
Add or Edit Match Condition and
Action Dialog Boxes, page 17-43.
H.323 H.225
H.323 RAS
ASA, PIX,
FWSM
H.323 (ASA,
PIX, FWSM)
H.323 (ASA,
PIX, FWSM)
Inspect traffic based on a wide
variety of criteria, including the
H.323 message type, calling party,
and called party. See Configuring
H.323 Maps, page 17-45 and
H.323 Class and Policy Maps Add
or Edit Match Condition (and
Action) Dialog Boxes,
page 17-48.