EasyManuals Logo

Cisco ASA 5506-X Configuration Guide

Cisco ASA 5506-X
428 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #267 background imageLoading...
Page #267 background image
12-11
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 12 Getting Started with Application Layer Protocol Inspection
Configure Application Layer Protocol Inspection
Table 12-2 Protocol Keywords
Keywords Notes
ctiqbe See CTIQBE Inspection, page 14-1.
dcerpc [map_name] See DCERPC Inspection, page 15-1.
If you added a DCERPC inspection policy map according to
Configure a DCERPC Inspection Policy Map, page 15-2,
identify the map name in this command.
dns [map_name]
[dynamic-filter-snoop]
See DNS Inspection, page 13-1.
If you added a DNS inspection policy map according to
Configure DNS Inspection Policy Map, page 13-3, identify
the map name in this command. The default DNS inspection
policy map name is “preset_dns_map.
To enable DNS snooping for the Botnet Traffic Filter, enter
the dynamic-filter-snoop keyword.
esmtp [map_name] See SMTP and Extended SMTP Inspection, page 13-39.
If you added an ESMTP inspection policy map according to
Configure an ESMTP Inspection Policy Map, page 13-42,
identify the map name in this command.
ftp [strict [map_name]] See FTP Inspection, page 13-8.
Use the strict keyword to increase the security of protected
networks by preventing web browsers from sending
embedded commands in FTP requests. See Strict FTP,
page 13-9 for more information.
If you added an FTP inspection policy map according to
Configure an FTP Inspection Policy Map, page 13-10,
identify the map name in this command.
gtp [map_name] See GTP Inspection, page 15-5.
If you added a GTP inspection policy map according to
Configure a GTP Inspection Policy Map, page 15-7, identify
the map name in this command.
h323 h225 [map_name] See H.323 Inspection, page 14-3.
If you added an H323 inspection policy map according to
Configure H.323 Inspection Policy Map, page 14-6, identify
the map name in this command.
h323 ras [map_name] See H.323 Inspection, page 14-3.
If you added an H323 inspection policy map according to
Configure H.323 Inspection Policy Map, page 14-6, identify
the map name in this command.
http [map_name] See HTTP Inspection, page 13-14.
If you added an HTTP inspection policy map according to
Configure an HTTP Inspection Policy Map, page 13-16,
identify the map name in this command.
icmp See ICMP Inspection, page 13-21.

Table of Contents

Other manuals for Cisco ASA 5506-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA 5506-X and is the answer not in the manual?

Cisco ASA 5506-X Specifications

General IconGeneral
ModelASA 5506-X
Firewall Throughput750 Mbps
Maximum Firewall Connections50, 000
Maximum VPN Peers50
Integrated Ports8 x 1 GE
Stateful Inspection Throughput750 Mbps
Weight4.4 lb (2 kg)
Firewall Throughput (Multiprotocol)750 Mbps
Firewall Throughput (Application Visibility and Control AVC)250 Mbps
Concurrent Sessions50, 000
New Connections per Second10, 000
IPsec VPN Throughput100 Mbps
Interfaces8 x 1 GE
Memory4 GB
Flash Memory8 GB
Form FactorDesktop
VPN Throughput100 Mbps
Maximum Concurrent Sessions50, 000
New Sessions per Second10, 000
Operating Temperature32 to 104°F (0 to 40°C)
Storage Temperature-13 to 158°F (-25 to 70°C)
Power SupplyExternal
Humidity10% to 90% non-condensing

Related product manuals