<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5500 model default setting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467154#M270102</link>
    <description>&lt;P&gt;Dear All, I saw below default configuration showed in my new 5505 and 5515 ASA.&amp;nbsp; May i know what is the function of those configuration and does it command affecting of my ASA firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:41:55 GMT</pubDate>
    <dc:creator>alan-wong</dc:creator>
    <dc:date>2019-03-12T03:41:55Z</dc:date>
    <item>
      <title>ASA 5500 model default setting</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467154#M270102</link>
      <description>&lt;P&gt;Dear All, I saw below default configuration showed in my new 5505 and 5515 ASA.&amp;nbsp; May i know what is the function of those configuration and does it command affecting of my ASA firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467154#M270102</guid>
      <dc:creator>alan-wong</dc:creator>
      <dc:date>2019-03-12T03:41:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5500 model default setting</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467155#M270104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the Inspections purpose is both enable certain applications/protocols that are dynamic in nature to work through your firewall without resorting to opening up the firewall too much. They are also used to set certain restrictions on certain type of connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most common ones in constant use would probably be (for me atleast) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ICMP Inspection (not enabled by default) which helps you allow ICMP through the firewall and automatically allow the ICMP Echo reply back without allowing it through the firewall in a separate ACL. It also makes sure that only valid ICMP return messages are allowed through the firewall&lt;/LI&gt;&lt;LI&gt;DNS Inspection sets some parameters for the DNS traffic and also makes sure that only one DNS reply is allowed through the firewall. Its also needed you are going to use the "dns" parameter in the NAT configurations to enable ASA so a DNS rewrite.&lt;/LI&gt;&lt;LI&gt;FTP Inspection enables the ASA to automatically allow the FTP Data connections which are created in addition to the initial Control connection. Therefore you dont need to allow anything but the FTP Control connection (TCP/21) to form through the firewall and the ASA will use the FTP Inspection to automatically allow through the Data connection that will be formed.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information I would suggest reading the ASA documentation. For example the Command Reference and Configuration Guide&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to the Command Reference and the different "inspect" commands&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/command-reference/i2.html"&gt;http://www.cisco.com/en/US/docs/security/asa/command-reference/i2.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a section in the Configuration Guide about inspections&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/inspect_overview.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/inspect_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not even fully read them myself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally there is not much need to touch the above settings. Sometimes Voice/Video related inspections need to be disabled as they might actually cause problems. I have also had to disable the ESMTP inspection sometimes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 11:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467155#M270104</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-07T11:54:30Z</dc:date>
    </item>
    <item>
      <title>ASA 5500 model default setting</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467156#M270106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thx Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, do we need "inspect http", i saw most of the ASA did not have "inspect http".&amp;nbsp; I think this is also important, am I correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 06:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467156#M270106</guid>
      <dc:creator>alan-wong</dc:creator>
      <dc:date>2014-02-08T06:52:52Z</dc:date>
    </item>
    <item>
      <title>ASA 5500 model default setting</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467157#M270107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to my knowledge, HTTP inspection is disabled by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can enable it under global policy if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt; inspect http&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 05:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-model-default-setting/m-p/2467157#M270107</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2014-02-10T05:37:58Z</dc:date>
    </item>
  </channel>
</rss>

