<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RPC dynamic filter in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rpc-dynamic-filter/m-p/1602472#M593619</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chuck,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, this is done with the 'inspect dcerpc' command. Here is an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect dcerpc&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the command reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1734557"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1734557&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Jan 2011 16:44:56 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-01-21T16:44:56Z</dc:date>
    <item>
      <title>RPC dynamic filter</title>
      <link>https://community.cisco.com/t5/network-security/rpc-dynamic-filter/m-p/1602471#M593614</link>
      <description>&lt;P&gt;I am looking to see if the Cisco ASA 5500 platform running ver 8.2 has support for RPC dynamic port filtering? So basically can I enable TCP 135 in an ACL and will the application policy read the RPC calls and dynamically open the ports being set in the intial conversation much like it does for FTP protocol?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-dynamic-filter/m-p/1602471#M593614</guid>
      <dc:creator>chucktiede</dc:creator>
      <dc:date>2019-03-11T19:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: RPC dynamic filter</title>
      <link>https://community.cisco.com/t5/network-security/rpc-dynamic-filter/m-p/1602472#M593619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chuck,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, this is done with the 'inspect dcerpc' command. Here is an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect dcerpc&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the command reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1734557"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1734557&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jan 2011 16:44:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpc-dynamic-filter/m-p/1602472#M593619</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-21T16:44:56Z</dc:date>
    </item>
  </channel>
</rss>

