<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic class inspection_default in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857150#M157496</link>
    <description>&lt;P&gt;HI experts,&lt;/P&gt;
&lt;P&gt;I am wondering what's the specialty of the class-map&amp;nbsp;&lt;SPAN&gt;class inspection_default&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt; &lt;STRONG&gt;class inspection_default&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I am not able to figure out&amp;nbsp;how that class-map and the inspect command below that work together. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;CF&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:53:35 GMT</pubDate>
    <dc:creator>Cisco Freak</dc:creator>
    <dc:date>2019-03-12T07:53:35Z</dc:date>
    <item>
      <title>class inspection_default</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857150#M157496</link>
      <description>&lt;P&gt;HI experts,&lt;/P&gt;
&lt;P&gt;I am wondering what's the specialty of the class-map&amp;nbsp;&lt;SPAN&gt;class inspection_default&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt; &lt;STRONG&gt;class inspection_default&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I am not able to figure out&amp;nbsp;how that class-map and the inspect command below that work together. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;CF&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857150#M157496</guid>
      <dc:creator>Cisco Freak</dc:creator>
      <dc:date>2019-03-12T07:53:35Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857151#M157497</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_99 gr-alert gr_spell gr_disable_anim_appear ContextualSpelling" id="99" data-gr-id="99"&gt;Its&lt;/G&gt; just the name of the class.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So when we create a policy-map we need to configure the &lt;G class="gr_ gr_111 gr-alert gr_spell gr_disable_anim_appear ContextualSpelling" id="111" data-gr-id="111"&gt;class-map&lt;/G&gt;&amp;nbsp;to match the conditions/traffic.&lt;/P&gt;
&lt;P&gt;Here is an example:&lt;/P&gt;
&lt;P&gt;policy-map &amp;lt;NAME&amp;gt;&lt;BR /&gt;class &amp;lt;CLASS1&amp;gt;&lt;BR /&gt;&amp;lt;feature1&amp;gt;&lt;BR /&gt;class &amp;lt;CLASS2&amp;gt;&lt;BR /&gt;&amp;lt;feature2&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By &lt;G class="gr_ gr_227 gr-alert gr_gramm gr_run_anim Punctuation only-ins replaceWithoutSep" id="227" data-gr-id="227"&gt;default&lt;/G&gt; ASA would have a class-map&amp;nbsp;&lt;STRONG&gt;class inspection_default for matching the traffic and that is called under the default policy-map.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 03:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857151#M157497</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-06-16T03:02:56Z</dc:date>
    </item>
    <item>
      <title>Yes, I understand that. I</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857152#M157499</link>
      <description>&lt;P&gt;Yes, I understand that. I have seen that class-map&amp;nbsp;inspection_default is matching&amp;nbsp;&lt;STRONG&gt;default-inspection-traffic.&amp;nbsp;&lt;/STRONG&gt;Can you please share more info about&amp;nbsp;default-inspection-traffic?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have see the config of default-inspection-traffic as follows:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;default-inspection-traffic Match default inspection traffic:&lt;BR /&gt; ctiqbe----tcp--2748 dns-------udp--53&lt;BR /&gt; ftp-------tcp--21 gtp-------udp--2123,3386&lt;BR /&gt; h323-h225-tcp--1720 h323-ras--udp--1718-1719&lt;BR /&gt; http------tcp--80 icmp------icmp&lt;BR /&gt; ils-------tcp--389 ip-options-----rsvp&lt;BR /&gt; mgcp------udp--2427,2727 netbios---udp--137-138&lt;BR /&gt; radius-acct----udp--1646 rpc-------udp--111&lt;BR /&gt; rsh-------tcp--514 rtsp------tcp--554&lt;BR /&gt; sip-------tcp--5060 sip-------udp--5060&lt;BR /&gt; skinny----tcp--2000 smtp------tcp--25&lt;BR /&gt; sqlnet----tcp--1521 tftp------udp--69&lt;BR /&gt; waas------tcp--1-65535 xdmcp-----udp--177&lt;/P&gt;
&lt;P&gt;I am not able to understand what does this mean. Does this mean all these protocols are inspected by default? How the inspection works with default policy.&lt;/P&gt;
&lt;P&gt;CF&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 03:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857152#M157499</guid>
      <dc:creator>Cisco Freak</dc:creator>
      <dc:date>2016-06-16T03:48:02Z</dc:date>
    </item>
    <item>
      <title>Any help would be appreciated</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857153#M157501</link>
      <description>&lt;P&gt;Any help would be appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;CF&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 16:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857153#M157501</guid>
      <dc:creator>Cisco Freak</dc:creator>
      <dc:date>2016-06-16T16:59:01Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857154#M157502</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_21 gr-alert gr_gramm gr_run_anim Punctuation only-ins replaceWithoutSep" id="21" data-gr-id="21"&gt;Yes&lt;/G&gt; you are correct.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By &lt;G class="gr_ gr_70 gr-alert gr_gramm gr_run_anim Punctuation only-ins replaceWithoutSep" id="70" data-gr-id="70"&gt;default&lt;/G&gt; these protocols are inspected by the ASA and these are the ports that are inspected for the concerned traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 23:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857154#M157502</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-06-16T23:54:16Z</dc:date>
    </item>
    <item>
      <title>The default-inspection</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857155#M157503</link>
      <description>&lt;P&gt;The &lt;STRONG&gt;default-inspection-traffic&amp;nbsp;&lt;/STRONG&gt;list show ICMP too, does that also inspected? This is confusing me.&lt;/P&gt;
&lt;P&gt;When I tested in lab, I had to manually specify the ICMP inspect command in policy-map.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 16:00:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/2857155#M157503</guid>
      <dc:creator>Cisco Freak</dc:creator>
      <dc:date>2016-06-17T16:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: Yes, I understand that. I</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/4083489#M1070094</link>
      <description>&lt;P&gt;&lt;FONT color="#FF6600"&gt;class-map inspection_default&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;match default-inspection-traffic&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;here you label the traffic(ftp, dns, tftp and so on) as "inspection_default"&lt;/P&gt;&lt;P&gt;after this with policy-map you tel what to do with that traffic&lt;/P&gt;&lt;P&gt;guess what inspect&lt;/P&gt;&lt;P&gt;if you look at in policy-map inspect icmp is missing (that is why ping won't work)&lt;/P&gt;&lt;P&gt;if you add inspect icmp after :&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF00FF"&gt;policy-map global_policy &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF00FF"&gt;class inspection_default&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF00FF"&gt;inspect icmp&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;icmp will go from higher security level to lower security level and back, but...&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;icmp originating from lower security level interface will not pass the firewall to the higher sec level&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2020 18:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/4083489#M1070094</guid>
      <dc:creator>ramserv</dc:creator>
      <dc:date>2020-05-11T18:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Yes, I understand that. I</title>
      <link>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/4083494#M1070096</link>
      <description>if let's say instead inspect we add an icmp acl and group that acl on interface outside in&lt;BR /&gt;we let icmp two flow from lower level to higher levele</description>
      <pubDate>Mon, 11 May 2020 18:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-inspection-default/m-p/4083494#M1070096</guid>
      <dc:creator>ramserv</dc:creator>
      <dc:date>2020-05-11T18:16:26Z</dc:date>
    </item>
  </channel>
</rss>

