Cisco Systems ASA 5585-X Manual De Usuario

Descargar
Página de 712
 
2-3
Cisco ASA Series Firewall CLI Configuration Guide
 
Chapter 2      Configuring Special Actions for Application Inspections (Inspection Policy Map)
  Default Inspection Policy Maps
A class map is determined to be the same type as another class map or match command based on 
the lowest priority match command in the class map (the priority is based on the internal rules). If 
a class map has the same type of lowest priority match command as another class map, then the class 
maps are matched according to the order they are added to the policy map. If the lowest priority 
match for each class map is different, then the class map with the higher priority match command 
is matched first. For example, the following three class maps contain two types of match commands: 
match request-cmd (higher priority) and match filename (lower priority). The ftp3 class map 
includes both commands, but it is ranked according to the lowest priority command, match 
filename
. The ftp1 class map includes the highest priority command, so it is matched first, 
regardless of the order in the policy map. The ftp3 class map is ranked as being of the same priority 
as the ftp2 class map, which also contains the match filename command. They are matched 
according to the order in the policy map: ftp3 and then ftp2.
class-map type inspect ftp match-all ftp1
match request-cmd get
class-map type inspect ftp match-all ftp2
match filename regex abc
class-map type inspect ftp match-all ftp3
match request-cmd get
match filename regex abc
policy-map type inspect ftp ftp
class ftp3
log
class ftp2
log
class ftp1
log
Default Inspection Policy Maps
DNS inspection is enabled by default, using the preset_dns_map inspection class map:
The maximum DNS message length is 512 bytes.
The maximum client DNS message length is automatically set to match the Resource Record.
DNS Guard is enabled, so the ASA tears down the DNS session associated with a DNS query as 
soon as the DNS reply is forwarded by the ASA. The ASA also monitors the message exchange to 
ensure that the ID of the DNS reply matches the ID of the DNS query.
Translation of the DNS record based on the NAT configuration is enabled.
Protocol enforcement is enabled, which enables DNS message format check, including domain 
name length of no more than 255 characters, label length of 63 characters, compression, and looped 
pointer check.
See the following default commands:
policy-map type inspect dns preset_dns_map
 parameters
message-length maximum client auto
message-length maximum 512
dns-guard
protocol-enforcement
nat-rewrite