<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with Application Inspection on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182665#M835234</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Presently I do not see a way to achieve this in the ASA/PIX or FWSM platform. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can however do this for dns inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html#wp1719130" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html#wp1719130&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Jun 2009 11:42:19 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2009-06-01T11:42:19Z</dc:date>
    <item>
      <title>Help with Application Inspection on ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182662#M835231</link>
      <description>&lt;P&gt;Hi All, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA that has an OUTSIDE interface connected to the Internet, and an INSIDE interface connected to my LAN. &lt;/P&gt;&lt;P&gt;I enter the following commands on the ASA: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 105 extended deny icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map ICMP&lt;/P&gt;&lt;P&gt; match access-list 105&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map ICMP&lt;/P&gt;&lt;P&gt; class ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy ICMP interface INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that if I applied these commands, then the ICMP packets are going to be dropped, but that's not the case.&lt;/P&gt;&lt;P&gt;Are these commands doing anything on the ASA and can I drop packets by using CLASS-MAPS and POLICY-MAPS instead of using ACCESS-LISTS? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182662#M835231</guid>
      <dc:creator>fedecotofaja</dc:creator>
      <dc:date>2019-03-11T15:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Application Inspection on ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182663#M835232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Those command are not doing anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to permit the traffic in the access-list for it to be matched in the class-map and then specify what you want done for those matched packets like inspect icmp. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The best place to deny icmp is by applying an access-list IN on the inside interface and permitting everything else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-acl deny icmp any any&lt;/P&gt;&lt;P&gt;access-list inside-acl permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside-acl in int inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 May 2009 00:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182663#M835232</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-05-30T00:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Application Inspection on ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182664#M835233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What if I want to permit ICMP PING packets but only of certain size? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I accomplish that with the CLASS-MAPS and POLICY-MAPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 May 2009 16:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182664#M835233</guid>
      <dc:creator>fedecotofaja</dc:creator>
      <dc:date>2009-05-30T16:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Application Inspection on ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182665#M835234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Presently I do not see a way to achieve this in the ASA/PIX or FWSM platform. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can however do this for dns inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html#wp1719130" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i2.html#wp1719130&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 11:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-application-inspection-on-asa/m-p/1182665#M835234</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-06-01T11:42:19Z</dc:date>
    </item>
  </channel>
</rss>

