CHAPTER
36-1
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
36
Getting Started With Application Layer Protocol
Inspection
This chapter describes how to configure application layer protocol inspection. Inspection engines are
required for services that embed IP addressing information in the user data packet or that open secondary
channels on dynamically assigned ports. These protocols require the adaptive security appliance to do a
deep packet inspection instead of passing the packet through the fast path (see the “Stateful Inspection
Overview” section on page 1-18 for more information about the fast path). As a result, inspection
engines can affect overall throughput. Several common inspection engines are enabled on the adaptive
security appliance by default, but you might need to enable others depending on your network.
This chapter includes the following sections:
• Information about Application Layer Protocol Inspection, page 36-1
• Guidelines and Limitations, page 36-3
• Default Settings, page 36-3
• Configuring Application Layer Protocol Inspection, page 36-5
Information about Application Layer Protocol Inspection
This section includes the following topics:
• How Inspection Engines Work, page 36-1
• When to Use Application Protocol Inspection, page 36-2
How Inspection Engines Work
As illustrated in Figure 36-1, the adaptive security appliance uses three databases for its basic operation:
• Access lists—Used for authentication and authorization of connections based on specific networks,
hosts, and services (TCP/UDP port numbers).
• Inspections—Contains a static, predefined set of application-level inspection functions.
• Connections (XLATE and CONN tables)—Maintains state and other information about each
established connection. This information is used by the Adaptive Security Algorithm and
cut-through proxy to efficiently forward traffic within established sessions.