Download Print this page

Cisco ASA 5506-X Configuration Manual page 183

Cli
Hide thumbs Also See for ASA 5506-X:

Advertisement

Chapter 7
Inspection of Basic Internet Protocols
NetBIOS Inspection
NetBIOS inspection is enabled by default. The NetBIOS inspection engine translates IP addresses in the
NetBIOS name service (NBNS) packets according to the ASA NAT configuration. You can optionally
create a policy map to drop or log NetBIOS protocol violations.
Procedure
Step 1
Configure a NetBIOS Inspection Policy Map for Additional Inspection Control, page
Step 2
Configure the NetBIOS Inspection Service Policy, page
Configure a NetBIOS Inspection Policy Map for Additional Inspection Control
To specify the action for protocol violations, create a NETBIOS inspection policy map. You can then
apply the inspection policy map when you enable NETBIOS inspection.
Procedure
Step 1
Create a NetBIOS inspection policy map.
hostname(config)# policy-map type inspect netbios policy_map_name
hostname(config-pmap)#
Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration
mode.
(Optional) To add a description to the policy map, enter the following command:
Step 2
hostname(config-pmap)# description string
Enter parameters configuration mode.
Step 3
hostname(config-pmap)# parameters
hostname(config-pmap-p)#
Specify the action to take for NETBIOS protocol violations.
Step 4
hostname(config-pmap-p)# protocol-violation action {drop [log] | log}
Where the drop action drops the packet. The log action sends a system log message when this policy
map matches traffic.
Example
hostname(config)# policy-map type inspect netbios netbios_map
hostname(config-pmap)# parameters
hostname(config-pmap-p)# protocol-violation drop log
hostname(config)# policy-map netbios_policy
hostname(config-pmap)# class inspection_default
hostname(config-pmap-c)# inspect netbios netbios_map
7-38.
Cisco ASA Series Firewall CLI Configuration Guide
NetBIOS Inspection
7-37.
7-37

Hide quick links:

Advertisement

loading