cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1041
Views
0
Helpful
0
Replies

Query ASA inspect sip function

Robinyang
Level 1
Level 1

Hi all, 

 

below is my network topoloby. 

inspect SIP is enabled by default. it will create a lot of sessions which doenst even pass through the firewall and caused connection limit alarm "Resource 'conns' limit of 250000 reached for system".

 

from output of "show connection all", we can see a lot of connection from outside to outside:

 

UDP outside  10.10.200.100:26015 outside  10.208.1.157:0, idle 0:00:05, bytes 0, flags mi

 2018-09-05T00:12:28+08:00 BJYZ-ASA5516 : %ASA-6-607001: Pre-allocate SIP RTP secondary channel for outside:10.10.200.100/32316 to outside:10.208.1.157 from 183 message

2018-09-05T00:12:28+08:00 BJYZ-ASA5516 : %ASA-6-607001: Pre-allocate SIP RTCP secondary channel for outside:10.10.200.100/32317 to outside:10.208.1.157 from 183 message

2018-09-05T00:12:28+08:00 BJYZ-ASA5516 : %ASA-6-607001: Pre-allocate SIP RTP secondary channel for outside:10.208.1.157/10018 to outside:10.10.200.100 from 183 message

2018-09-05T00:12:28+08:00 BJYZ-ASA5516 : %ASA-6-607001: Pre-allocate SIP RTCP secondary channel for outside:10.208.1.157/10019 to outside:10.10.200.100 from 183 message

 

I have tried to use following policy-map to set max connection for these sessions. but it doesn't work.

access-list Invalid-RTP extended permit ip host x.x.x.x host y.y.y.y

access-list Invalid-RTP extended permit ip host y.y.y.y host x.x.x.x

class-map Invalid-RTP

 match access-list Invalid-RTP

policy-map global_policy

 class Invalid-RTP

  set connection conn-max 1

 

Now I use "no inspect sip" to disable SIP inspection and reduced the connection session.

But it is a temporary solution. Is there anyway that i can both enable sip inspection and some other method to filter/limit these "from outside to outside" session ?

topology.jpg 

Thanks, 

 

0 Replies 0
Review Cisco Networking for a $25 gift card