<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA sqlnet inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960873#M1105916</link>
    <description>&lt;P&gt;thank you!&lt;/P&gt;</description>
    <pubDate>Thu, 16 Nov 2023 16:54:59 GMT</pubDate>
    <dc:creator>rouzbehta</dc:creator>
    <dc:date>2023-11-16T16:54:59Z</dc:date>
    <item>
      <title>Cisco ASA sqlnet inspection</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960307#M1105884</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have bypassed the sqlnet inspection, in packet-tracer phase 3, it shows that it is bypassed:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3794 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map oracle-tcp-bypass&lt;BR /&gt;match access-list oracle-tcp-bypass&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;class oracle-tcp-bypass&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;set connection advanced-options tcp-state-bypass&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;however, in phase 6, it says the packet is inspected:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-sqlnet&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14826 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map SQLNET-INSPECTION&lt;BR /&gt;match access-list SQLNET-INSPECTION&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;class SQLNET-INSPECTION&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;inspect sqlnet&lt;/FONT&gt;&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is, is the packet really being bypassed or inspected for sqlnet?&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;-Rouzbeh&lt;BR /&gt;Additional Information:&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 00:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960307#M1105884</guid>
      <dc:creator>rouzbehta</dc:creator>
      <dc:date>2023-11-16T00:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA sqlnet inspection</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960323#M1105885</link>
      <description>&lt;P&gt;I dont think so&lt;/P&gt;
&lt;P&gt;Check this link for bypass inspect&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-bypass-an-application-inspection-using-modular-policy/ta-p/3109176" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-bypass-an-application-inspection-using-modular-policy/ta-p/3109176&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 00:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960323#M1105885</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-16T00:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA sqlnet inspection</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960811#M1105909</link>
      <description>&lt;P&gt;The packet won't be inspected. Packet-tracer is unwise sometimes. But why do you need tcp-state-bypass if you already have class-map defined for sqlnet where you can disable and enable inspection selectively? Deny in the corresponding ACL would mean "don't inspect" and permit would mean "inspect".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 15:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960811#M1105909</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-11-16T15:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA sqlnet inspection</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960873#M1105916</link>
      <description>&lt;P&gt;thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 16:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4960873#M1105916</guid>
      <dc:creator>rouzbehta</dc:creator>
      <dc:date>2023-11-16T16:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA sqlnet inspection</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4962561#M1105976</link>
      <description>&lt;P&gt;Show service policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This command can give you short view about if packet drop in policy or not.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Nov 2023 20:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-sqlnet-inspection/m-p/4962561#M1105976</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-19T20:43:06Z</dc:date>
    </item>
  </channel>
</rss>

