<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic it doesnt need any route. im in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893617#M154538</link>
    <description>&lt;P&gt;it doesnt need any route. im testing it on a lab. you can do it by yourself. assume that we have a policy map like this:&lt;/P&gt;
&lt;P&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;&amp;nbsp; match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp; class inspection_default&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;service-policy global_policy global&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;this policy map allows http or dns traffic but not icmp traffic. why?&lt;/P&gt;</description>
    <pubDate>Sat, 23 Apr 2016 15:40:25 GMT</pubDate>
    <dc:creator>qnetechinfo</dc:creator>
    <dc:date>2016-04-23T15:40:25Z</dc:date>
    <item>
      <title>policy map with any inpect command</title>
      <link>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893613#M154530</link>
      <description>&lt;P&gt;hi everyone&lt;/P&gt;
&lt;P&gt;i have this configuration on asa:&lt;/P&gt;
&lt;P&gt;hostname(config)#policy-map global_policy&lt;BR /&gt;hostname(config-pmap)#class inspection_default&lt;BR /&gt;hostname(config-pmap-c)#exit&lt;/P&gt;
&lt;P dir="ltr"&gt;hostname(config)#service-policy global_policy global&lt;/P&gt;
&lt;P dir="rtl"&gt;by without any inspect command,asa allows tcp traffic.why?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893613#M154530</guid>
      <dc:creator>qnetechinfo</dc:creator>
      <dc:date>2019-03-12T07:39:32Z</dc:date>
    </item>
    <item>
      <title>Without seeing the rest of</title>
      <link>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893614#M154532</link>
      <description>&lt;P&gt;Without seeing the rest of your configuration it is a little difficult to determine...but i suspect that you have ACLs allowing the traffic.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 17:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893614#M154532</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-04-22T17:59:40Z</dc:date>
    </item>
    <item>
      <title>here are the configurations:</title>
      <link>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893615#M154533</link>
      <description>&lt;P&gt;here are the configurations:&lt;/P&gt;
&lt;P&gt;ASA Version 8.4(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;nameif IN&lt;BR /&gt;&amp;nbsp;security-level 80&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;nameif OUT&lt;BR /&gt;&amp;nbsp;security-level 20&lt;BR /&gt;&amp;nbsp;ip address 10.1.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network CL&lt;BR /&gt;&amp;nbsp;host 192.168.1.2&lt;BR /&gt;object network PL1&lt;BR /&gt;&amp;nbsp;host 10.1.1.10&lt;BR /&gt;object network S1&lt;BR /&gt;&amp;nbsp;host 10.1.1.2&lt;BR /&gt;object network S2&lt;BR /&gt;&amp;nbsp;host 10.1.1.3&lt;BR /&gt;object network PL2&lt;BR /&gt;&amp;nbsp;host 10.1.1.20&lt;BR /&gt;access-list ANY extended permit ip any any &lt;BR /&gt;access-list BB extended permit ip any any &lt;BR /&gt;access-list OUT extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu IN 1500&lt;BR /&gt;mtu OUT 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map ANY&lt;BR /&gt;&amp;nbsp;match access-list ANY&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map ANY&lt;BR /&gt;&amp;nbsp;class ANY&lt;BR /&gt;!&lt;BR /&gt;service-policy ANY global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;crashinfo save disable&lt;BR /&gt;Cryptochecksum:2004eb31534187f7c5ff8403b615714e&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;with ASDM we cannot create a policy like this:&lt;/P&gt;
&lt;P&gt;class-map ANY&lt;BR /&gt;&amp;nbsp;match access-list ANY&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map ANY&lt;BR /&gt;&amp;nbsp;class ANY&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;we have to inspect something. but with commands we can. and when we dont inspect anything, it allows tcp. why?&lt;/P&gt;</description>
      <pubDate>Sat, 23 Apr 2016 14:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893615#M154533</guid>
      <dc:creator>qnetechinfo</dc:creator>
      <dc:date>2016-04-23T14:07:57Z</dc:date>
    </item>
    <item>
      <title>Have you left out some</title>
      <link>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893616#M154535</link>
      <description>&lt;P&gt;Have you left out some configuration? &amp;nbsp;amongst other things you are missing routing configuration.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 23 Apr 2016 15:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893616#M154535</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-04-23T15:00:29Z</dc:date>
    </item>
    <item>
      <title>it doesnt need any route. im</title>
      <link>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893617#M154538</link>
      <description>&lt;P&gt;it doesnt need any route. im testing it on a lab. you can do it by yourself. assume that we have a policy map like this:&lt;/P&gt;
&lt;P&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;&amp;nbsp; match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp; class inspection_default&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;service-policy global_policy global&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;this policy map allows http or dns traffic but not icmp traffic. why?&lt;/P&gt;</description>
      <pubDate>Sat, 23 Apr 2016 15:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893617#M154538</guid>
      <dc:creator>qnetechinfo</dc:creator>
      <dc:date>2016-04-23T15:40:25Z</dc:date>
    </item>
    <item>
      <title>Just because you have removed</title>
      <link>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893618#M154540</link>
      <description>&lt;P&gt;Just because you have removed all the inspection commands doesn't mean you have turned off the stateful inspection in the firewall. &amp;nbsp;The flow going from inside to outside will still go through all the checks and placed in the state table. &amp;nbsp;So as long as the flow remains the same (ie. destination porte from inside to outside, source port from outside to inside) the packet will be allowed. &amp;nbsp;But for protocols that use different source ports for replies (ie. ICMP) these packets will be dropped since the ASA can not match the return traffic to an existing flow without the packet being inspected.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 24 Apr 2016 12:30:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-map-with-any-inpect-command/m-p/2893618#M154540</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-04-24T12:30:16Z</dc:date>
    </item>
  </channel>
</rss>

