Cisco FirePOWER ASA 5500 series Configuration Manual page 458

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

H.323 Inspection
To apply actions to matching traffic, perform the following steps.
Step 6
Specify the traffic on which you want to perform actions using one of the following methods:
a.
Specify the action you want to perform on the matching traffic by entering the following command:
b.
hostname(config-pmap-c)# {[drop [send-protocol-error] |
drop-connection [send-protocol-error]| mask | reset] [log] | rate-limit message_rate}
Not all options are available for each match or class command. See the CLI help or the Cisco
Security Appliance Command Reference for the exact options available.
The drop keyword drops all packets that match.
The send-protocol-error keyword sends a protocol error message.
The drop-connection keyword drops the packet and closes the connection.
The mask keyword masks out the matching portion of the packet.
The reset keyword drops the packet, closes the connection, and sends a TCP reset to the server
and/or client.
The log keyword, which you can use alone or with one of the other keywords, sends a system log
message.
The rate-limit message_rate argument limits the rate of messages.
You can specify multiple class or match commands in the policy map. For information about the order
of class and match commands, see the
page
To configure parameters that affect the inspection engine, perform the following steps:
Step 7
To enter parameters configuration mode, enter the following command:
a.
hostname(config-pmap)# parameters
hostname(config-pmap-p)#
b.
To define the H.323 call duration limit, enter the following command:
hostname(config-pmap-p)# call-duration-limit time
Where time is the call duration limit in seconds. Range is from 0:0:0 ti 1163:0;0. A value of 0 means
never timeout.
To enforce call party number used ini call setup, enter the following command:
c.
hostname(config-pmap-p)# call-party-number
To enforce H.245 tunnel blocking, enter the following command:
d.
hostname(config-pmap-p)# h245-tunnel-block action {drop-connection | log}
To define an hsi group, enter the following command:
e.
hostname(config-pmap-p)# hsi-group id
Where id is the hsi group ID. Range is from 0 to 2147483647.
Cisco Security Appliance Command Line Configuration Guide
25-40
Specify the H.323 class map that you created in
hostname(config-pmap)# class class_map_name
hostname(config-pmap-c)#
Specify traffic directly in the policy map using one of the match commands described in
If you use a match not command, then any traffic that does not match the criterion in the match
not command has the action applied.
21-10.
Chapter 25
Configuring Application Layer Protocol Inspection
Step 3
by entering the following command:
"Defining Actions in an Inspection Policy Map" section on
Step
3.
OL-10088-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents