<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-amp-verifying-rpc-policy-on-asa/m-p/3687743#M14542</link>
    <description>What you are doing is correct. You can't assign L7 policy map directly on&lt;BR /&gt;interface. You need to call them in L4 policy maps as you do.&lt;BR /&gt;&lt;BR /&gt;In this case you aren't changing the default settings for inspecting dcerpc&lt;BR /&gt;therefore, I don't see why you are creating L7 policy. You can apply&lt;BR /&gt;inspect directly without L7 policy.&lt;BR /&gt;</description>
    <pubDate>Tue, 14 Aug 2018 07:39:19 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2018-08-14T07:39:19Z</dc:date>
    <item>
      <title>Configuring &amp; Verifying RPC Policy on ASA</title>
      <link>https://community.cisco.com/t5/network-security/configuring-amp-verifying-rpc-policy-on-asa/m-p/3687631#M14538</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I currently have the following configuration set on my ASA and would like to know if this is set up properly.&amp;nbsp; I understand you can specify policy-map types and class map types but don't see/know how to apply these to an interface.&amp;nbsp; Can I get a little guidance on this?&amp;nbsp; I don't want to open up the dynamic range of ports and would like to inspect RPC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Current Config:&lt;/P&gt;
&lt;P&gt;policy-map type inspect dcerpc RPC-PM&lt;BR /&gt;exit&lt;BR /&gt;class-map RPC-CM&lt;BR /&gt; match port tcp eq 135&lt;BR /&gt;exit&lt;BR /&gt;policy-map INSPECT-RPC&lt;BR /&gt; class RPC-CM&lt;BR /&gt; inspect dcerpc RPC-PM&lt;BR /&gt;exit&lt;BR /&gt;exit&lt;BR /&gt;service-policy INSPECT-RPC interface inside&lt;BR /&gt;service-policy INSPECT-RPC interface pmont&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Service-Policy Output:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interface inside:&lt;BR /&gt; Service-policy: INSPECT-RPC&lt;BR /&gt; Class-map: RPC-CM&lt;BR /&gt; Inspect: dcerpc RPC-PM, packet 103369, lock fail 0, drop 2, reset-drop 0, 5-min-pkt-rate 7 pkts/sec, v6-fail-close 0 sctp-drop-override 0&lt;BR /&gt; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;/P&gt;
&lt;P&gt;Interface pmont:&lt;BR /&gt; Service-policy: INSPECT-RPC&lt;BR /&gt; Class-map: RPC-CM&lt;BR /&gt; Inspect: dcerpc RPC-PM, packet 10270, lock fail 0, drop 0, reset-drop 0, 5-min-pkt-rate 1 pkts/sec, v6-fail-close 0 sctp-drop-override 0&lt;BR /&gt; tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-amp-verifying-rpc-policy-on-asa/m-p/3687631#M14538</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2020-02-21T16:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring</title>
      <link>https://community.cisco.com/t5/network-security/configuring-amp-verifying-rpc-policy-on-asa/m-p/3687743#M14542</link>
      <description>What you are doing is correct. You can't assign L7 policy map directly on&lt;BR /&gt;interface. You need to call them in L4 policy maps as you do.&lt;BR /&gt;&lt;BR /&gt;In this case you aren't changing the default settings for inspecting dcerpc&lt;BR /&gt;therefore, I don't see why you are creating L7 policy. You can apply&lt;BR /&gt;inspect directly without L7 policy.&lt;BR /&gt;</description>
      <pubDate>Tue, 14 Aug 2018 07:39:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-amp-verifying-rpc-policy-on-asa/m-p/3687743#M14542</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-08-14T07:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring</title>
      <link>https://community.cisco.com/t5/network-security/configuring-amp-verifying-rpc-policy-on-asa/m-p/3689096#M14546</link>
      <description>&lt;P&gt;The policy that I created doesn't appear to be working.&amp;nbsp; If I explicitly define the dynamic port range in my ACL then my connections work.&amp;nbsp; However, if I disable those rules and rely on the policy map, they don't work.&amp;nbsp; Can you provide an example as to how I can inspect RPC without having to define the dynamic port range in my ACL?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Aug 2018 17:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-amp-verifying-rpc-policy-on-asa/m-p/3689096#M14546</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2018-08-15T17:00:55Z</dc:date>
    </item>
  </channel>
</rss>

