Solved

ASA-Inspection Rules

Posted on 2011-09-21
5
901 Views
Last Modified: 2012-05-12
Hi,

What is the basic purpose of Inspection rules,how the rules works and what will happen if we remove the rule

Regaards
ramu
0
Comment
Question by:RAMU CH
5 Comments
 
LVL 18

Assisted Solution

by:jmeggers
jmeggers earned 167 total points
ID: 36575239
At basic, rules permit traffic from more secure interfaces (such as outside) to more secure interfaces.  You can apply rules anywhere, but they are absolutely needed in this way.  They allow granular control over what ports, protocols, source, addresses, destination addresses, etc. are allowed in from the less trusted side.
0
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 166 total points
ID: 36575634
Nope. Inspection rules enforce the stateful inspection of several (commonly used) protocols.
For example, if you enable stateful inspection for ftp, the ASA knows that when a connection comes in on port 21 (ftp) there can also be traffic on port 20 (ftp-data) from that same source.

Or as Cisco says:
Inspection rules configure protocol inspection on a device. Inspection opens temporary holes in your access rules to allow return traffic for connections initiated within your trusted network. When traffic is inspected, the device also implements additional controls to eliminate mal-formed packets based on the inspected protocols.

Source: http://www.cisco.com/en/US/docs/security/security_management/cisco_security_manager/security_manager/4.1/user/guide/fwinsp.html
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 36575665
Oh, and reading the previous, you might imagine what happens if you remove them.

No worries though ;)  I've had issues where some rules had to be removed to make thing function properly.
0
 
LVL 5

Assisted Solution

by:Feroz Ahmed
Feroz Ahmed earned 167 total points
ID: 36708375
Hi,

Each Inpsection Rule has meaning and each rule defines a rule .for example if Inspect ICMP is not removed then one cannot ping from Inside Interface to outside Interface.If the same rule is implemented then one can ping from Inside Network to Outside network.likewise each inspection rule defines each rule .
0
 
LVL 1

Author Closing Comment

by:RAMU CH
ID: 36961038
Thanks
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
This is about downgrading PIX Version 8.0(4) & ASDM 6.1(5) to PIX 7.2(4) and ASDM 5.2(4) but with only 64MB RAM and 16MB flash. Background: You have a Cisco Pix 515E which was running on PIX 7.2(4) and its supporting ASDM 5.2(4) without any i…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now