<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need Class-Map and Policy Map Explanations in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-class-map-and-policy-map-explanations/m-p/1664963#M535228</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is not really useful. You could have used ccp-insp-traffic directly in your policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the second question, you shouldn't think ACL as filtering method, but more as classification method. In the same way, when you use an ACL for nat, it's to select the traffic to be natted. In a classmap, the ACL is only used to select a particular traffic and associate it to the class-map, but the permit/deny action won't allow/drop the traffic, it only defines which traffic belongs to the class (permit), and which doesn't (deny).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So your ACL 100 will associate broadcast and loopback address to the invalid src class-map, which will be dropped per the action of the policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this is clear now &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 24 Jul 2011 08:04:28 GMT</pubDate>
    <dc:creator>Bastien Migette</dc:creator>
    <dc:date>2011-07-24T08:04:28Z</dc:date>
    <item>
      <title>Need Class-Map and Policy Map Explanations</title>
      <link>https://community.cisco.com/t5/network-security/need-class-map-and-policy-map-explanations/m-p/1664962#M535226</link>
      <description>&lt;P&gt;I really could use some help understanding some of the logic behind the default ZBFW settings on my Cisco 881W courtesy of Cisco Configuration Professional.&amp;nbsp; Here are my two questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.)&amp;nbsp; What is the purpose and logic behind consolidating the first class-map (&lt;STRONG&gt;ccp-cls-insp-traffic&lt;/STRONG&gt;) in to the second Class-Map (&lt;STRONG&gt;ccp-insp-traffic&lt;/STRONG&gt;) as follows?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;match protocol dns&lt;/P&gt;&lt;P&gt;match protocol ftp&lt;/P&gt;&lt;P&gt;match protocol h323&lt;/P&gt;&lt;P&gt;match protocol https&lt;/P&gt;&lt;P&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;match protocol imap&lt;/P&gt;&lt;P&gt;match protocol pop3&lt;/P&gt;&lt;P&gt;match protocol netshow&lt;/P&gt;&lt;P&gt;match protocol shell&lt;/P&gt;&lt;P&gt;match protocol realmedia&lt;/P&gt;&lt;P&gt;match protocol rtsp&lt;/P&gt;&lt;P&gt;match protocol smtp&lt;/P&gt;&lt;P&gt;match protocol sql-net&lt;/P&gt;&lt;P&gt;match protocol streamworks&lt;/P&gt;&lt;P&gt;match protocol tftp&lt;/P&gt;&lt;P&gt;match protocol vdolive&lt;/P&gt;&lt;P&gt;match protocol tcp&lt;/P&gt;&lt;P&gt;match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;--------------------------------&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Class-Map &lt;STRONG&gt;ccp-cls-insp-traffic&lt;/STRONG&gt; isnt directly applied to any Policy Map.&amp;nbsp; Only Class-Map &lt;STRONG&gt;ccp-insp-traffic&lt;/STRONG&gt; is being used by a Policy-Map (below) that is applied to an inside-to-outside zone pair.&amp;nbsp; Note that ccp-cls-insp-traffic is "match-any" and ccp-insp-traffic is "match-all" which makes it even more confusing to me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;---------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2.) What is the purpose and logic of Policy-Map &lt;STRONG&gt;ccp-inspect&lt;/STRONG&gt; is trying to drop traffic from &lt;STRONG&gt;ccp-invalid-src&lt;/STRONG&gt;, which is filtering based on &lt;STRONG&gt;ACL 100&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;policy-map type inspect ccp-inspect&lt;BR /&gt;class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;class type inspect ccp-protocol-http&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-invalid-src&lt;/P&gt;&lt;P&gt;match access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that Policy-Map &lt;STRONG&gt;ccp-inspect&lt;/STRONG&gt; is also applied to an inside-to-outside zone pair.&amp;nbsp; My inside vLan 1 has a subnet of 192.168.1.0 / 24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James E&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-class-map-and-policy-map-explanations/m-p/1664962#M535226</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2019-03-11T21:02:46Z</dc:date>
    </item>
    <item>
      <title>Need Class-Map and Policy Map Explanations</title>
      <link>https://community.cisco.com/t5/network-security/need-class-map-and-policy-map-explanations/m-p/1664963#M535228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is not really useful. You could have used ccp-insp-traffic directly in your policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the second question, you shouldn't think ACL as filtering method, but more as classification method. In the same way, when you use an ACL for nat, it's to select the traffic to be natted. In a classmap, the ACL is only used to select a particular traffic and associate it to the class-map, but the permit/deny action won't allow/drop the traffic, it only defines which traffic belongs to the class (permit), and which doesn't (deny).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So your ACL 100 will associate broadcast and loopback address to the invalid src class-map, which will be dropped per the action of the policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this is clear now &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jul 2011 08:04:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-class-map-and-policy-map-explanations/m-p/1664963#M535228</guid>
      <dc:creator>Bastien Migette</dc:creator>
      <dc:date>2011-07-24T08:04:28Z</dc:date>
    </item>
  </channel>
</rss>

