<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default class/policy-maps in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435217#M733125</link>
    <description>&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;I'm new to comm/firewall-related things. I have a new customer that has an ASA 5505.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;This ASA doesn't have any class-map or policy-map statements in its config. From what I've read there is, by default in an ASA 5505, the following configuration...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;The only problem I notice from the missing stuff is that FTP doesn't work (clients from the inside can't access or download files from FTP-servers on the internet). I've managed to solve this with the following configuration...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;class-map FTP-traffic&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match port tcp eq ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;policy-map FTP-policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp; class FTP-traffic&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;service-policy FTP-policy interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;&lt;BR /&gt;My question is should I recreate the default class-map and policy-map? What functionality do they provide... can they introduce any latency or other problems?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;&lt;BR /&gt;Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:54:16 GMT</pubDate>
    <dc:creator>goAtsyNasdaq</dc:creator>
    <dc:date>2019-03-11T17:54:16Z</dc:date>
    <item>
      <title>Default class/policy-maps</title>
      <link>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435217#M733125</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;I'm new to comm/firewall-related things. I have a new customer that has an ASA 5505.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;This ASA doesn't have any class-map or policy-map statements in its config. From what I've read there is, by default in an ASA 5505, the following configuration...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;The only problem I notice from the missing stuff is that FTP doesn't work (clients from the inside can't access or download files from FTP-servers on the internet). I've managed to solve this with the following configuration...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;class-map FTP-traffic&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match port tcp eq ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;policy-map FTP-policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp; class FTP-traffic&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: verdana,geneva; font-size: 8pt;"&gt;service-policy FTP-policy interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;&lt;BR /&gt;My question is should I recreate the default class-map and policy-map? What functionality do they provide... can they introduce any latency or other problems?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;&lt;BR /&gt;Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435217#M733125</guid>
      <dc:creator>goAtsyNasdaq</dc:creator>
      <dc:date>2019-03-11T17:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: Default class/policy-maps</title>
      <link>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435218#M733143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do not need to configure the default policy map inspection if none of the default protocols are needed in your environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the description of each inspection protocol for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 09:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435218#M733143</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-06-03T09:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Default class/policy-maps</title>
      <link>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435219#M733155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your answer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently FTP and DNS are the only protocols in the default-inspection-list that is permitted outbound in the firewall configuration. I think I´ll go ahead and enable the defaults anyway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 12:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435219#M733155</guid>
      <dc:creator>goAtsyNasdaq</dc:creator>
      <dc:date>2010-06-03T12:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: Default class/policy-maps</title>
      <link>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435220#M733166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, definitely. Go ahead and enable the default inspection policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 12:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435220#M733166</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-06-03T12:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: Default class/policy-maps</title>
      <link>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435221#M733183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to this link &lt;A class="jive-link-external-small" href="http://www.pingafrica.org/node/135"&gt;http://www.pingafrica.org/node/135&lt;/A&gt; I configure my CISCO OIOS (tm) C1700 Software (C1700-Y-M), Version 12.3(17a), router to filter HTML trafic. It works perfectly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Could you tell me how to configure it to not filter traffic for specific IP addresses ex. administrators and other privileged users in my network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Jul 2010 10:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-class-policy-maps/m-p/1435221#M733183</guid>
      <dc:creator>naumoskivladimir</dc:creator>
      <dc:date>2010-07-05T10:21:08Z</dc:date>
    </item>
  </channel>
</rss>

