Configure A Gtp Inspection Policy Map - Cisco ASA Series Configuration Manual

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 15
Inspection of Database, Directory, and Management Protocols

Configure a GTP Inspection Policy Map

If you want to enforce additional parameters on GTP traffic, and the default map does not meet your
needs, create and configure a GTP map.
Before You Begin
Some traffic matching options use regular expressions for matching purposes. If you intend to use one
of those techniques, first create the regular expression or regular expression class map.
Procedure
Create a GTP inspection policy map:
Step 1
hostname(config)# policy-map type inspect gtp policy_map_name
hostname(config-pmap)#
Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration
mode.
Step 2
(Optional) To add a description to the policy map, enter the following command:
hostname(config-pmap)# description string
Step 3
To apply actions to matching traffic, perform the following steps.
a.
b.
You can specify multiple match commands in the policy map. For information about the order of match
commands, see
To configure parameters that affect the inspection engine, perform the following steps:
Step 4
a.
Specify the traffic on which you want to perform actions using one of the following match
commands. If you use a match not command, then any traffic that does not match the criterion in
the match not command has the action applied.
match [not] apn regex {regex_name | class class_name}—Matches the access point name
(APN) against the specified regular expression or regular expression class.
match [not] message id {message_id | range message_id_1 message_id_2}—Matches the
message ID, which can be 1 to 255. You can specify a single ID or a range of IDs.
match [not] message length min bytes max bytes—Matches messages where the length of the
UDP payload (GTP header plus the rest of the message) is between the minimum and maximum
values, from 1 to 65536.
match [not] version {version_id | range version_id_1 version_id_2}—Matches the GTP
version, which can be 0 to 255. You can specify a single version or a range of versions.
Specify the action you want to perform on the matching traffic by entering the following command:
hostname(config-pmap-c)# {drop [log]| log | rate-limit message_rate}
Not all options are available for each match command.
The drop keyword drops the packet.
The log keyword, which you can use alone or with drop, sends a system log message.
The rate-limit message_rate argument limits the rate of messages. This option is available with
message id only.
How Multiple Traffic Classes are Handled, page
To enter parameters configuration mode, enter the following command:
hostname(config-pmap)# parameters
12-4.
Cisco ASA Series Firewall CLI Configuration Guide
GTP Inspection
15-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents