EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #829 background imageLoading...
Page #829 background image
37-45
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 37 Configuring Inspection of Basic Internet Protocols
IPSec Pass Through Inspection
be used during the session. IPSec can be used to protect data flows between a pair of hosts (for example,
computer users or servers), between a pair of security gateways (such as routers or firewalls), or between
a security gateway and a host.
IPSec Pass Through application inspection provides convenient traversal of ESP (IP protocol 50) and
AH (IP protocol 51) traffic associated with an IKE UDP port 500 connection. It avoids lengthy access
list configuration to permit ESP and AH traffic and also provides security using timeout and max
connections.
Specify IPSec Pass Through inspection parameters to identify a specific map to use for defining the
parameters for the inspection. Configure a policy map for Specify IPSec Pass Through inspection to
access the parameters configuration, which lets you specify the restrictions for ESP or AH traffic. You
can set the per client max connections and the idle timeout in parameters configuration.
NAT and non-NAT traffic is permitted. However, PAT is not supported.
Select IPSec-Pass-Thru Map
The Select IPSec-Pass-Thru Map dialog box is accessible as follows:
Add/Edit Service Policy Rule Wizard > Rule Actions > Protocol Inspection Tab >
Select IPSec-Pass-Thru Map
The Select IPSec-Pass-Thru dialog box lets you select or create a new IPSec map. An IPSec map lets
you change the configuration values used for IPSec application inspection. The Select IPSec Map table
provides a list of previously configured maps that you can select for application inspection.
Fields
• Use the default IPSec inspection map—Specifies to use the default IPSec map.
• Select an IPSec map for fine control over inspection—Lets you select a defined application
inspection map or add a new one.
• Add—Opens the Add Policy Map dialog box for the inspection.
Modes
The following table shows the modes in which this feature is available:
IPSec Pass Through Inspect Map
The IPSec Pass Through Inspect Map dialog box is accessible as follows:
Configuration > Global Objects > Inspect Maps > IPSec Pass Through
The IPSec Pass Through pane lets you view previously configured IPSec Pass Through application
inspection maps. An IPSec Pass Through map lets you change the default configuration values used for
IPSec Pass Through application inspection. You can use an IPSec Pass Through map to permit certain
flows without using an access list.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
••••—

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals