<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Queries on ASA Inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037240#M402841</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Yogesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically inspection required for the protocols/services that insert IP information inside the datagram..&amp;nbsp; or it open secondary data patch using&amp;nbsp; dynamic ports othern than the normal defined port.. if inspection is enabled in these situations, ASA would be able to do a deep packet lookup and able to undertsand the packet flow and take a decision to forward/block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the following links provide you an insight of this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html#wp1114851"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html#wp1114851&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Oct 2012 10:27:46 GMT</pubDate>
    <dc:creator>Harish Balakrishnan</dc:creator>
    <dc:date>2012-10-15T10:27:46Z</dc:date>
    <item>
      <title>Queries on ASA Inspection</title>
      <link>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037239#M402840</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have many default inspections in ASA firewall but wondering what all those mean? what each can do if configured &amp;amp; what can miss if not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can someone please help to understand the same&amp;nbsp; &amp;amp; guide if document of url details about same&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;policy-map type inspect dns preset_dns_map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; message-length maximum 512&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; message-length maximum client auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect h323 h225&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect h323 ras&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect rsh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect rtsp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect sqlnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect skinny&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect sunrpc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect xdmcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect sip&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect netbios&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect tftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; inspect dns&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;policy-map http-mapl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;class http-mapl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp; set connection advanced-options mss-map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reagrds&lt;/P&gt;&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037239#M402840</guid>
      <dc:creator>yogesh.suryawanshi</dc:creator>
      <dc:date>2019-03-12T00:08:50Z</dc:date>
    </item>
    <item>
      <title>Queries on ASA Inspection</title>
      <link>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037240#M402841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Yogesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically inspection required for the protocols/services that insert IP information inside the datagram..&amp;nbsp; or it open secondary data patch using&amp;nbsp; dynamic ports othern than the normal defined port.. if inspection is enabled in these situations, ASA would be able to do a deep packet lookup and able to undertsand the packet flow and take a decision to forward/block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the following links provide you an insight of this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html#wp1114851"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html#wp1114851&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 10:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037240#M402841</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-10-15T10:27:46Z</dc:date>
    </item>
    <item>
      <title>Queries on ASA Inspection</title>
      <link>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037241#M402842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Harish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link provided will help in customising the MPF - policies. I am very much in need of understand of what is done by each default L3/L4 inspecttion on firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me come to point why i am asking , last week you had help me to understand behaviour of sql inspection which resets packet if size / window goes above 16000 &amp;amp; to resovle the issue we need to bypass that particular traffic flow from inspections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like that , i would proactively like to know what are significance of each inspect , their own features or capabilities..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&lt;A name="wp1099920"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect ftp 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099921"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect h323 h225 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099922"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect h323 ras 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099923"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect rsh 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099924"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect rtsp 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099925"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect esmtp 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099926"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect sqlnet 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099927"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect skinny 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099928"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect sunrpc 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099929"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect xdmcp 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099930"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect sip 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1099931"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect netbios 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp1085820"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&amp;nbsp; inspect tftp 
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appricaite your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Yogesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 11:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037241#M402842</guid>
      <dc:creator>yogesh.suryawanshi</dc:creator>
      <dc:date>2012-10-15T11:15:41Z</dc:date>
    </item>
    <item>
      <title>Queries on ASA Inspection</title>
      <link>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037242#M402843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yogesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explain all of them will require a lot of time but I will provide you the fundamentals of why we need them!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are several protocols that negotiate via a control channel a data channel ( Like FTP) so the question is, for a firewall how can we open this data channel dynamically without user intervention or configuration?? The answer is by inspecting the control channel protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other protocols that need to open secondary channels are SIP,h323,etc. So you will need to have their inspection as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Know for protocols like TFTP,SMTP, Why do we need them?&lt;/P&gt;&lt;P&gt;This will provide granularity to our firewall rules as the ASA will determine based on RFC standards or custom actions if traffic related to a particular protocol should be allowed or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As an example with the esmtp inspection, the ASA will be able to allow some SMTP sessions based on specific commands,etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Any other question..Sure..Just remember to rate all of my answers.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 17:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/queries-on-asa-inspection/m-p/2037242#M402843</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-15T17:46:17Z</dc:date>
    </item>
  </channel>
</rss>

