Contents
xv
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
Default Layer 3/4 Policy Map 21-14
Adding a Layer 3/4 Policy Map 21-15
Applying a Layer 3/4 Policy to an Interface Using a Service Policy 21-17
Modular Policy Framework Examples 21-17
Applying Inspection and QoS Policing to HTTP Traffic 21-18
Applying Inspection to HTTP Traffic Globally 21-18
Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers 21-19
Applying Inspection to HTTP Traffic with NAT 21-20
CHAPTER
22 Managing AIP SSM and CSC SSM 22-1
Managing the AIP SSM 22-1
About the AIP SSM 22-1
Getting Started with the AIP SSM 22-2
Diverting Traffic to the AIP SSM 22-2
Sessioning to the AIP SSM and Running Setup 22-4
Managing the CSC SSM 22-5
About the CSC SSM 22-5
Getting Started with the CSC SSM 22-7
Determining What Traffic to Scan 22-9
Limiting Connections Through the CSC SSM 22-11
Diverting Traffic to the CSC SSM 22-11
Checking SSM Status 22-13
Transferring an Image onto an SSM 22-14
CHAPTER
23 Preventing Network Attacks 23-1
Configuring TCP Normalization 23-1
Configuring Connection Limits and Timeouts 23-4
Preventing IP Spoofing 23-5
Configuring the Fragment Size 23-6
Blocking Unwanted Connections 23-6
Configuring IP Audit for Basic IPS Support 23-7
CHAPTER
24 Applying QoS Policies 24-1
Overview 24-1
QoS Concepts 24-2
Implementing QoS 24-2
Identifying Traffic for QoS 24-4