Download Print this page

Cisco ASA 5506-X Configuration Manual page 243

Cli
Hide thumbs Also See for ASA 5506-X:

Advertisement

Chapter 10
Inspection for Management Application Protocols
Where the policy_map_name is the name of the policy map. The CLI enters policy-map configuration
mode.
Step 2
(Optional) To add a description to the policy map, enter the following command:
hostname(config-pmap)# description string
To apply actions to matching traffic, perform the following steps.
Step 3
Specify the traffic on which you want to perform actions using one of the following match
a.
commands. If you use a match not command, then any traffic that does not match the criterion in
the match not command has the action applied.
Specify the action you want to perform on the matching traffic by entering the following command:
b.
hostname(config-pmap-c)# {drop [log]| log | rate-limit message_rate}
Not all options are available for each match command.
You can specify multiple match commands in the policy map. For information about the order of match
commands, see
To configure parameters that affect the inspection engine, perform the following steps:
Step 4
To enter parameters configuration mode, enter the following command:
a.
hostname(config-pmap)# parameters
hostname(config-pmap-p)#
b.
Set one or more parameters. You can set the following options; use the no form of the command to
disable the option:
match [not] apn regex {regex_name | class class_name}—Matches the access point name
(APN) against the specified regular expression or regular expression class.
match [not] message id {message_id | range message_id_1 message_id_2}—Matches the
message ID, which can be 1 to 255. You can specify a single ID or a range of IDs.
match [not] message length min bytes max bytes—Matches messages where the length of the
UDP payload (GTP header plus the rest of the message) is between the minimum and maximum
values, from 1 to 65536.
match [not] version {version_id | range version_id_1 version_id_2}—Matches the GTP
version, which can be 0 to 255. You can specify a single version or a range of versions.
The drop keyword drops the packet.
The log keyword, which you can use alone or with drop, sends a system log message.
The rate-limit message_rate argument limits the rate of messages. This option is available with
message id only.
Defining Actions in an Inspection Policy Map, page
permit errors—Allows invalid GTP packets or packets that otherwise would fail parsing and
be dropped.
request-queue max_requests—Sets the maximum number of GTP requests that will be queued
waiting for a response. The default is 200. When the limit has been reached and a new request
arrives, the request that has been in the queue for the longest time is removed. The Error
Indication, the Version Not Supported and the SGSN Context Acknowledge messages are not
considered as requests and do not enter the request queue to wait for a response.
tunnel-limit max_tunnels—Sets the maximum number of GTP tunnels allowed to be active on
the ASA. The default is 500. New requests will be dropped once the number of tunnels specified
by this command is reached.
2-4.
Cisco ASA Series Firewall CLI Configuration Guide
GTP Inspection
10-7

Hide quick links:

Advertisement

loading