<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple Class maps for AIP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725638#M65211</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the actions are different on the two class maps, it will be sent to IPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the action on second class map had been 'inspect ftp', then only the first 'inspect ftp' would have had any effect. But here, the actions are different. One is inspect and other is sending traffic to AIP module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Apr 2011 09:56:28 GMT</pubDate>
    <dc:creator>padatta</dc:creator>
    <dc:date>2011-04-27T09:56:28Z</dc:date>
    <item>
      <title>Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725637#M65210</link>
      <description>&lt;P&gt;Hello folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Similar question was asked on the forum here, but I just wanted to make sure there is no exception or this specific configuration. Basically we have AIP modules in our ASAs and we want to pass the traffic to them for investigation. We already have class-maps for inspection (the standard ASA inspection not IPS). And if I understand it correctly then the traffic will get matched only by a single class-map and handled accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config for better understanding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt; match default-inspection-traffic&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt; class inspection_default&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp; inspect ftp&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp; inspect h323 h225&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp; inspect h323 ras&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list USERS-IPS-ACL extended permit ip host x.x.x.x any&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list USERS-IPS-ACL extended permit ip any host x.x.x.x&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class-map USERS-IPS-CLASS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; match access-list USERS-IPS-ACL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map IPS-POLICY&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; class USERS-IPS-CLASS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; ips inline fail-close sensor USERS-SENSOR&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for example let's say a user establishes FTP connection to a server. Based on the global inspection policy (nothing to do with IPS), the traffic will get inspected and not forwarded to AIP module. Can someone confirm this or shed some light on it please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Martin&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725637#M65210</guid>
      <dc:creator>Martin Smid</dc:creator>
      <dc:date>2019-03-10T12:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725638#M65211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the actions are different on the two class maps, it will be sent to IPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the action on second class map had been 'inspect ftp', then only the first 'inspect ftp' would have had any effect. But here, the actions are different. One is inspect and other is sending traffic to AIP module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 09:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725638#M65211</guid>
      <dc:creator>padatta</dc:creator>
      <dc:date>2011-04-27T09:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725639#M65212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So if I understand your post correctly, the traffic will fall into the first class map and then inspected as dictated by the policy AND it will also be matched by the second class map and sent to the AIP module as set by the second policy (basically the traffic will be treated by two class maps and policies). The reason I am asking is that if you think about QoS, the traffic is classified by a single class map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 10:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725639#M65212</guid>
      <dc:creator>Martin Smid</dc:creator>
      <dc:date>2011-04-27T10:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725640#M65216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, if two class maps in a policy-map match the same traffic, both will take effect only if actions are different. E.g. One action is 'inspect' and other is 'police'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 11:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725640#M65216</guid>
      <dc:creator>padatta</dc:creator>
      <dc:date>2011-04-27T11:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725641#M65218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And I assume the same logic applies even though the class maps are in two different policy maps (see example in the first post).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for being so annoying &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 11:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725641#M65218</guid>
      <dc:creator>Martin Smid</dc:creator>
      <dc:date>2011-04-27T11:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725642#M65219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, this concept could be very confusing at times.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, same goes for class maps matching same traffic in more than one policy-map/service-policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 11:52:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725642#M65219</guid>
      <dc:creator>padatta</dc:creator>
      <dc:date>2011-04-27T11:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725643#M65220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to verify the MPF that will be applied to any flow by your configuration, you can execute the &lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt; show service-policy flow&lt;/STRONG&gt;&lt;/SPAN&gt; command from the ASA CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your example, assuming your &lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;IPS-POLICY&lt;/STRONG&gt;&lt;/SPAN&gt; policy-map is assigned to the inside interface, the output of a &lt;STRONG&gt;show service-policy flow&lt;/STRONG&gt; will look similar to the output below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt; show service-policy flow &lt;PROTOCOL&gt; host &lt;INSIDE_HOST&gt; [eq &lt;HIGH_PORT&gt;] host &lt;EXTERNAL_HOST&gt; [eq &lt;DESTINATION_SERVICE_PORT&gt;]&lt;/DESTINATION_SERVICE_PORT&gt;&lt;/EXTERNAL_HOST&gt;&lt;/HIGH_PORT&gt;&lt;/INSIDE_HOST&gt;&lt;/PROTOCOL&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" style="width: 95%; border: 1px solid #000000; background: none repeat scroll 0% 0% #d6d6d6; font-family: Courier New;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;ASA# show service-policy flow tcp host 10.1.1.5 eq 2500 host 4.2.2.2 eq 80 &lt;BR /&gt; Global policy:&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: default-inspection-traffic&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow:&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output flow:&lt;BR /&gt; Interface inside:&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Service-policy: IPS-POLICY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: USERS-IPS-CLASS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: access-list USERS-IPS-ACL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Access rule: permit ip any any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow:&amp;nbsp; ips inline fail-close&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action:&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;I hope it's helpful - We recorded a recent podcast episode on our favorite ASA and IPS commands and &lt;STRONG style="font-family: 'courier new', courier; "&gt;show service-policy flow&lt;/STRONG&gt; was one of them:&lt;/DIV&gt;&lt;DIV&gt;&lt;A href="https://community.cisco.com/docs/DOC-16112"&gt;https://supportforums.cisco.com/docs/DOC-16112&lt;/A&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;Thank you,&lt;/DIV&gt;&lt;DIV&gt;Blayne Dreier&lt;/DIV&gt;&lt;DIV&gt;Cisco TAC Escalation Team&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;**Please check out our Podcasts**&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;TAC Security Show: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/tacsecuritypodcast"&gt;http://www.cisco.com/go/tacsecuritypodcast&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;TAC IPS Media Series: &lt;/SPAN&gt;&lt;A href="https://community.cisco.com/docs/DOC-12758"&gt;https://supportforums.cisco.com/docs/DOC-12758&lt;/A&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 16:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725643#M65220</guid>
      <dc:creator>Christopher Dreier</dc:creator>
      <dc:date>2011-04-27T16:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Class maps for AIP</title>
      <link>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725644#M65221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Blayne,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got to hand it to you. Great information right there. Thank you very much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thank you guys both for your help!&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 16:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-class-maps-for-aip/m-p/1725644#M65221</guid>
      <dc:creator>Martin Smid</dc:creator>
      <dc:date>2011-04-27T16:58:09Z</dc:date>
    </item>
  </channel>
</rss>

