Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1289
  • Last Modified:

ASA 5505 Policy Map global_policy

Can someone please explain in plain English an explanation\summary of what the Policy map actually does? It inspects the protocols listed underneath I suppose, but how does it define inspect?

Does it matter what order the protocols are inspected in? For example some of my ASA's have this at the bottom of the policy-map global_policy, while others have it in the middle.
inspect ip-options
  inspect icmp

I also see an ACL for this entry below but the global_mpc (which I assume is global map policy?),  isnt in the policy-map global_policy. What is the purpose of "policy-map global_policy"?

# show run access-list global_mpc
access-list global_mpc extended permit ip any any


policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect ip-options
  inspect icmp
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect xdmcp
0
tolinrome
Asked:
tolinrome
  • 2
1 Solution
 
Pete LongTechnical ConsultantCommented:
Policy maps are the bit in the middle :) service policy<>Policy Maps<>Class Maps
You can have one global service-policy, and a service policy for each interface (applied inbound and outbound)
so you define what you want to look at/restrict/ police etc with a class map like this.... (this will classify all traffic to and from 10.254.254.90) SO A CLASS MAP CLASSIFIES SOMETHING (IN THIS CASE TRAFFIC)
PetesASA(config)# access-list ACL-THROTTLE extended permit ip host 10.254.254.90 any
PetesASA(config)# access-list ACL-THROTTLE extended permit ip any host 10.254.254.90
PetesASA(config)# class-map CM-THROTTLE
PetesASA(config-cmap)# match access-list ACL-THROTTLE
PetesASA(config-cmap)# exit

Open in new window

Now I need to decide what to do with that traffic, lets say I want to throttle it so it cant steal all my bandwidth I use a policy map POLICY MAPS APPLY AN ACTION TO A CLASS MAP
PetesASA(config)# policy-map PM-THROTTLE
PetesASA(config-pmap)# class CM-THROTTLE
PetesASA(config-pmap-c)# police output 1000000 2000
PetesASA(config-pmap-c)# police input 1000000 2000
PetesASA(config-pmap-c)# exit
PetesASA(config-pmap)# exit

Open in new window

Then I either apply that with a global service-policy (like the one you have above in your config you will also have a line that looks like this to apply that policy SERVICE-POLICIES APPLY POLICY-MAPS
PetesASA(config)# service-policy global_policy global

Open in new window

So to throttle my traffic Id use
PetesASA(config)# service-policy PM-THROTTLE interface inside

Open in new window

0
 
tolinromeAuthor Commented:
great and thorough explanation, thanks.
0
 
Pete LongTechnical ConsultantCommented:
My Pleasure ThanQ
0

Featured Post

Choose an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now