Solved

disable inspection rule for SMTP/ESMTP

Posted on 2014-11-25
4
372 Views
Last Modified: 2014-11-25
hello,
in the gui ASDM 6.2 (1) on ASA Version 8.2 (1) I can disable SMTP application inspection ?
or if I have to do it from the CLI which command should I use?
now I have in my configuration:

policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
...
  inspect esmtp
  ....
  inspect tftp
0
Comment
Question by:sasapix
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 6

Expert Comment

by:Matt
ID: 40464405
conf term
policy-map global_policy
  class inspection_default
no  inspect esmtp
0
 

Author Comment

by:sasapix
ID: 40464422
Result of the command: "conf term"

The command has been sent to the device

Result of the command: "policy-map global_policy"

The command has been sent to the device

Result of the command: "class inspection_default"

The command has been sent to the device



Result of the command: "no  inspect esmtp"

no  inspect esmtp
      ^
ERROR: % Invalid input detected at '^' marker.

Result of the command: "no inspect esmtp"

no inspect esmtp
     ^
ERROR: % Invalid input detected at '^' marker.

---
I can not run the last command
0
 
LVL 6

Accepted Solution

by:
Matt earned 400 total points
ID: 40464432
In CLI:

ASA# conf t
ASA(config)# policy-map global_policy
ASA(config-pmap)#  class inspection_default
ASA(config-pmap-c)# no inspect esmtp
0
 
LVL 7

Assisted Solution

by:tolinrome
tolinrome earned 100 total points
ID: 40464457
in ASDM>Configuration>Firewall>Edit Global Policy Inspection_Default>Rule Actions Tab>Uncheck ESMTP
0

Featured Post

Webinar May 25: Cloud Security Strategies for SMBs

Small and mid-sized businesses are a driving force behind cloud adoption, and it’s no wonder: cloud benefits are BIG.  But for all the convenience that moving to the cloud provides, where does security come into play?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The article explains the protocols and technology which is involved when two computers on different TCP/IP networks communicate with each other. In the diagram, a router is used to segregate two networks. The networks are 192.168.1.0/24 and 192…
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question