Lesson 8 Flashcards
The Cisco _____________ is borrowed from IOS to make it easier to implement flexible policies on the security appliances. One or more policies can be applied to traffic flowing through the appliance.
Modular Policy Framework ( MPF)
- Control what traffic is added to the connection table to allow returning traffic back to the source, as well as examine the payloads of inspected applications for connection, translation, and security issues
Inspection of connections
- Limit the number of completed and half - open connections on a per - group, per - user, or per - host basis
Connection restriction s
- Implement low - latency queuing to prioritize high - priority traffic, like voice, over normal data traffic .
Traffic prioritization
- You can rate-limit traffic in both the inbound and outbound directions to control excessive bandwidth needs of applications
Traffic policing
- With the AIP-SSM (Advanced Inspection and Prevention Security Services Module) card installed in an ASA, you can define policies to copy packets to or to redirect packets into the AIP - SSM card to look for and prevent attacks.
Intrusion prevention system (IPS)
- With the CSC-SSM card (Content Security and Control ) installed in an ASA, you can define policies to have traffic redirected through the card to look for viruses, malware, spyware, phishing, and other types of issues with Web , FTP, and email applications.
Anti - X
The MPF Process
START
Identify traffic to be subject to the policy. Includes IP addresses and transport protocol port numbers
Create the policy, which specifies the action that permits, denies, or otherwise manipulates the traffic and/or the way it’s handled
Activate the policy by activating it on an interface
class-map
policy-map
service-policy
Template used to identify a traffic flow by using the match command. A traffic flow is a set of traffic that is identifiable by its packet content. The class - map identifies the traffic that you want to associate one or more policies to
class-map
Used to associate one or more actions with a class of traffic. Consists of a list of policies which reference a class map.
policy-map
Used to enable a set of policies on an interface or all interfaces.
service-policy
Supported class maps:
Layer 3/4
Inspection (Layer 7)
Regular expressions (“ftp://” )
Management
When using class maps, you are required to use _________ to identify the devices and or services, like a particular FTP server.
a Layer 3/4 class map
Includes all default application inspection traffic, which is about a 1 ½ dozen protocols such as ftp, rpc , ils , and so on
default-inspection-traffic
Matches on the specified ____ values in the IP header used for QoS.
DSCP