Cisco ASA Series Configuration Manual page 346

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

SIP Inspection
Enter exit to leave class map configuration mode.
d.
Create a SIP inspection policy map, enter the following command:
Step 2
hostname(config)# policy-map type inspect sip policy_map_name
hostname(config-pmap)#
Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration
mode.
(Optional) To add a description to the policy map, enter the following command:
Step 3
hostname(config-pmap)# description string
To apply actions to matching traffic, perform the following steps.
Step 4
Specify the traffic on which you want to perform actions using one of the following methods:
a.
Specify the action you want to perform on the matching traffic by entering the following command:
b.
hostname(config-pmap-c)# {[drop | drop-connection | reset] [log] |
rate-limit message_rate}
Not all options are available for each match or class command. See the CLI help or the command
reference for the exact options available.
The drop keyword drops all packets that match.
The drop-connection keyword drops the packet and closes the connection.
The reset keyword drops the packet, closes the connection, and sends a TCP reset to the server
and/or client.
The log keyword, which you can use alone or with one of the other keywords, sends a system log
message.
The rate-limit message_rate argument limits the rate of messages. Rate limiting is available for
request method matches to "invite" and "register" only.
You can specify multiple class or match commands in the policy map. For information about the order
of class and match commands, see
Step 5
To configure parameters that affect the inspection engine, perform the following steps:
a.
To enter parameters configuration mode, enter the following command:
hostname(config-pmap)# parameters
hostname(config-pmap-p)#
Cisco ASA Series Firewall CLI Configuration Guide
14-26
match [not] request-method method—Matches a SIP request method: ack, bye, cancel, info,
invite, message, notify, options, prack, refer, register, subscribe, unknown, update.
match [not] third-party-registration regex {regex_name | class class_name}—Matches the
requester of a third-party registration against the specified regular expression or regular
expression class.
match [not] uri {sip | tel} length gt bytes—Matches a URI in the SIP headers of the selected
type (SIP or TEL) that is greater than the length specified, between 0 and 65536 bytes.
If you created a SIP class map, specify it by entering the following command:
hostname(config-pmap)# class class_map_name
hostname(config-pmap-c)#
Specify traffic directly in the policy map using one of the match commands described for SIP
class maps. If you use a match not command, then any traffic that does not match the criterion
in the match not command has the action applied.
Chapter 14
How Multiple Traffic Classes are Handled, page
Inspection for Voice and Video Protocols
12-4.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents