<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA H323 inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345950#M344308</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am hoping someone is able to help me with the following, I have checked the Cisco site to no avail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We have a requirement to disable H323 inspection on a set of access-list&amp;nbsp; on the Cisco ASA firewall for a video conferencing solution however the firewall still needs to have it enabled as part of the default inspection policy.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt; &lt;/SPAN&gt;Any help much appreciated.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt;Thanks MJ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:28:22 GMT</pubDate>
    <dc:creator>mj11</dc:creator>
    <dc:date>2019-03-12T02:28:22Z</dc:date>
    <item>
      <title>ASA H323 inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345950#M344308</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am hoping someone is able to help me with the following, I have checked the Cisco site to no avail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We have a requirement to disable H323 inspection on a set of access-list&amp;nbsp; on the Cisco ASA firewall for a video conferencing solution however the firewall still needs to have it enabled as part of the default inspection policy.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt; &lt;/SPAN&gt;Any help much appreciated.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt;Thanks MJ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345950#M344308</guid>
      <dc:creator>mj11</dc:creator>
      <dc:date>2019-03-12T02:28:22Z</dc:date>
    </item>
    <item>
      <title>ASA H323 inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345951#M344309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Create a class-map with an access list match criterion that excludes the network addresses you don't want inspected and then tell a policy map to inspect using the H.323. inspection the traffic that matches that class-map. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply to the appropriate interface with a service policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 04:13:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345951#M344309</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-08-21T04:13:20Z</dc:date>
    </item>
    <item>
      <title>ASA H323 inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345952#M344310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Marvin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the information. The dynamic nature of the H323 does anyone know how the access list would look?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks MJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 17:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345952#M344310</guid>
      <dc:creator>mj11</dc:creator>
      <dc:date>2013-08-23T17:35:54Z</dc:date>
    </item>
    <item>
      <title>ASA H323 inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345953#M344311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could do something like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list filter-list extended deny tcp 1.1.1.0 255.255.255.0 any eq h323&lt;/P&gt;&lt;P&gt;access-list filter-list extended deny udp 1.1.1.0 255.255.255.0 any range 1718 1719&lt;/P&gt;&lt;P&gt;access-list filter-list extended permit tcp any any eq h323&lt;/P&gt;&lt;P&gt;access-list filter-list extended permit udp any any range 1718 1719&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then apply it to the global policy map.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 18:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-h323-inspection/m-p/2345953#M344311</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-23T18:29:29Z</dc:date>
    </item>
  </channel>
</rss>

