EasyManuals Logo

Cisco ASA Series User Manual

Cisco ASA Series
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1110 background imageLoading...
Page #1110 background image
1-4
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Inspection of Basic Internet Protocols
DNS Inspection
policy-map type inspect dns name
Example:
hostname(config)# policy-map type inspect
dns dns-map
Creates an inspection policy map in which you want to match
traffic directly.
You can specify multiple match commands in the policy map. For
information about the order of match commands, see the
“Defining Actions in an Inspection Policy Map” section on
page 2-4.
Step 2
match [not] header-flag [eq]
{f_well_known [f_well_known...] | f_value}
For direct match only:
{drop [log] | drop-connection [log]|
[enforce-tsig {[drop] [log]}] [mask [log]]
| log}
Example:
hostname(config-pmap)# match header-flag
AA QR
hostname(config-pmap-c)# mask log
hostname(config-pmap-c)# enforce-tsig log
Matches a specific flag or flags that are set in the DNS header,
where the f_well_known argument is the DNS flag bit. The
f_value argument is the 16-bit value in hex starting with 0x. The
eq keyword specifies an exact match (match all); without the eq
keyword, the packet only needs to match one of the specified
headers (match any).
To specify traffic that should not match, use the match not
command.
If you are matching directly in the inspection policy map, specify
the action(s) for the match:
drop [log]—Drops the packet. log also logs the packet.
drop-connection [log]—Drops the packet and closes the
connection. log also logs the packet.
enforce-tsig {[drop] [log]}—Enforces the TSIG resource
record in a message. drop drops a packet without the TSIG
resource record. log also logs the packet.
mask [log]—Masks out the matching portion of the packet.
log also logs the packet.
log—Logs the packet.
Step 3
match [not] dns-type
{eq {t_well_known | t_val}}
{range t_val1 t_val2}
For direct match only:
{drop [log] | drop-connection [log]|
enforce-tsig {[drop] [log]} | log}
Example:
hostname(config-pmap)# match dns-type eq
aaaa
hostname(config-pmap-c)# enforce-tsig log
Matches a DNS type, where the t_well_known argument is the
DNS flag bit. The t_val arguments are arbitrary values in the DNS
type field (0-65535). The range keyword specifies a range, and
the eq keyword specifies an exact match.
To specify traffic that should not match, use the match not
command.
If you are matching directly in the inspection policy map, specify
the action for the match:
drop [log]—Drops the packet. log also logs the packet.
drop-connection [log]—Drops the packet and closes the
connection. log also logs the packet.
enforce-tsig {[drop] [log]}—Enforces the TSIG resource
record in a message. drop drops a packet without the TSIG
resource record. log also logs the packet.
log—Logs the packet.
Command Purpose

Table of Contents

Other manuals for Cisco ASA Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA Series and is the answer not in the manual?

Cisco ASA Series Specifications

General IconGeneral
ModelASA 5505
InterfacesVaries by model (Fast Ethernet, Gigabit Ethernet, 10 Gigabit Ethernet, etc.)
High AvailabilityActive/Standby or Active/Active (varies by model)
Power SupplyVaries by model
Form FactorVaries by model
Operating SystemCisco ASA Software
IPsec VPNSupported
SSL VPNSupported
IPS ThroughputVaries by model

Related product manuals