To specify the
Protected Access Credential (PAC) encryption key, use the
pac key command in RADIUS server configuration mode. To delete the PAC
key, use the
no form of this
command.
pac keyencryption-key
no pac keyencryption-key
Syntax Description
encryption-key
The
encryption-key
can be
0 (specifies
that an unencrypted key follows),
6 (specifies that an advanced
encryption scheme [AES] encrypted key follows),
7 (specifies
that a hidden key follows), or a line specifying the unencrypted (clear-text)
server key.
Command Default
No PAC encryption
key is specified.
Command Modes
RADIUS server configuration (config-radius-server)
Command History
Release
Modification
15.2(2)T
This
command was introduced.
15.4(1)T
This command was modified. The
6 keyword was added.
Usage Guidelines
Both the
radius server
command, which enters RADIUS server configuration mode, and the
aaa new-model
command must be configured before accessing this command.
The configuration
of the
pac key command
allows the PAC-Opaque, which is a variable length field, to be sent to the
server during the Transport Layer Security (TLS) tunnel establishment phase.
The PAC-Opaque can be interpreted only by the server to recover the required
information for the server to validate the peer’s identity and authentication.
For example, the PAC-Opaque may include the PAC-Key and the PAC’s peer
identity. The PAC-Opaque format and contents are specific to the issuing PAC
server.
In seed devices,
the PAC-Opaque has to be provisioned so that all RADIUS exchanges can use this
PAC-Opaque to enable automatic PAC provisioning for the server being used. All
nonseed devices obtain the PAC-Opaque during the authentication phase of a link
initialization.
Use the
password encryption aes command to configure
type 6 AES encrypted keys.
Examples
The following
example shows how to configure the RADIUS server accounting and authentication
parameters for PAC provisioning and the specification of the PAC key:
Enables
new RADIUS and AAA access control commands and functions and disables old
commands.
address ipv4
Configures
the RADIUS server accounting and authentication parameters for PAC
provisioning.
password encryption aes
Enables a type 6 encrypted preshared key.
radius server
Specifies the name for the RADIUS server configuration for PAC
provisioning and enters RADIUS server configuration mode.
parameter
To specify parameters for an enrollment profile, use the parameter command in ca-profile-enroll configuration mode. To disable specified parameters, use the no form of this command.
parameternumber
{ valuevalue | promptstring }
noparameternumber
{ valuevalue | promptstring }
Syntax Description
number
User parameters. Valid values range from 1 to 8.
valuevalue
To be used if the parameter has a constant value.
promptstring
To be used
if the parameter is supplied after the cryptocaauthenticate command or the cryptocaenroll command has been entered.
Note
The value of the string argument does not have an effect on the value that is used by the router.
Command Default
No enrollment profile paramters are specified.
Command Modes
Ca-profile-enroll configuration
Command History
Release
Modification
12.2(13)ZH
This command was introduced.
12.3(4)T
This command was integrated into Cisco IOS Release 12.3(4)T.
Usage Guidelines
The parameter command can be used within an enrollment profile after the authenticationcommandcommandortheenrollmentcommand has been enabled.
Examples
The following example shows how to specify parameters for the enrollment profile named “E”:
crypto ca trustpoint Entrust
enrollment profile E
serial
crypto ca profile enrollment E
authentication url http://entrust:81
authentication command GET /certs/cacert.der
enrollment url http://entrust:81/cda-cgi/clientcgi.exe
enrollment command POST reference_number=$P2&authcode=$P1
&retrievedAs=rawDER&action=getServerCert&pkcs10Request=$REQ
parameter 1 value aaaa-bbbb-cccc
parameter 2 value 5001
Related Commands
Command
Description
authenticationcommand
Specifies the HTTP command that is sent to the CA for authentication.
cryptocaprofileenrollment
Defines an enrollment profile.
enrollmentcommand
Specifies the HTTP command that is sent to the CA for enrollment.
parameter-map type
To create or modify a parameter map, use the parameter-maptypecommand in global configuration mode. To delete a parameter map from the configuration, use the no form of this command.
Defines an inspect type parameter map, which configures connection thresholds, timeouts, and other parameters pertaining to the inspect action.
urlfilter
Defines a URL-filter-specific parameter map.
protocol-info
Defines an application-specific parameter map.
Note
Protocol-specific parameter maps can be created only for Instant Messenger (IM) applications (AOL, I Seek You (ICQ), MSN Messenger, Yahoo Messenger and Windows Messenger).
consent
Defines an authentication proxy consent parameter map.
parameter-map-name
Name of the parameter map.
Command Default
None
Command Modes
Global configuration (config)#
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.4(9)T
The protocol-info keyword was added.
12.4(15)T
The consent keyword was added.
12.4(20)T
Support for ICQ and Windows Messenger was added.
Usage Guidelines
A parameter map allows you to specify parameters that control the behavior of actions and match criteria specified under a policy map and a class map, respectively.
There are currently four types of parameter maps:
Inspect parameter map
An inspect parameter map is optional. If you do not configure a parameter map, the software uses default parameters. Parameters associated with the inspect action apply to all nested actions (if any). If parameters are specified in both the top and lower levels, those in the lower levels override those in the top levels.
URL filter parameter map
A parameter map is required for URL filtering (via the URL filter action in a Layer 3 or Layer 4 policy map and the URL filter parameter map).
Protocol-specific parameter map
A parameter map is required for an IM application (Layer 7) policy map.
The following example shows how to configure an IM-based firewall policy. In this example, all Yahoo Messenger and ICQ traffic is allowed to pass through, while all MSN Messenger, AOL and Windows Messenger traffic is blocked. Also, parameter maps are defined to control all Yahoo Messenger and ICQ traffic on a more granular level.
!
!
parameter-map type protocol-info ymsgr-servers
server name messenger.yahoo.akadns.net
server name .*.yahoo.com snoop
server ip 192.0.2.100
server ip range 192.0.2.115 192.0.2.180
parameter-map type protocol-info icq-servers
server name login.oscar.aol.com
server name .*.aol.com snoop
server ip 192.0.2.200
server ip range 192.0.2.215 192.0.2.230
!
!
class-map type inspect match-all l4-cmap-ymsgr
match protocol ymsgr ymsgr-servers
class-map type inspect ymsgr match-any l7-cmap-ymsgr
match service text-chat
class-map type inspect match-all l4-cmap-icq
match protocol icq icq-servers
class-map type inspect icq match-any l7-cmap-icq
match service text-chat
match service any
!
!
policy-map type inspect im l7-pmap-ymsgr
class type inspect ymsgr l7-cmap-ymsgr
allow
log
policy-map type inspect im l7-pmap-icq
class type inspect icq l7-cmap-icq
allow
log
policy-map type inspect to_internet
class type inspect l4-cmap-ymsgr
inspect
service-policy im l7-pmap-ymsgr
class type inspect l4-cmap-icq
inspect
service-policy im l7-pmap-icq
class class-default
drop
!
!
The following example shows a typical URL filter parameter map configuration:
parameter-map type urlfilter eng-filter-profile
server vendor n2h2 172.16.1.2 port 3128 outside log timeout 10 retrans 6
max-request 80
max-resp-pak 200
cache 200
exclusive-domain permit cisco.com
exclusive-domain deny gaming.com
The following example shows a sample inspect type parameter map configuration:
parameter-map type inspect eng_network_profile
audit-trail on
alert off
max-incomplete low 2000
max-incomplete high 3000
one-minute low 5000
one-minute high 8000
udp idle-time 75
dns-timeout 25
tcp idle-time 90
tcp finwait-time 20
tcp synwait-time 10
tcp block-non-session
tcp max-incomplete host 2000 block-time 120
The following example shows how to define the consent-specific parameter map “consent_parameter_map” and a default consent parameter map:
To configure a global content-scan parameter map and enter parameter-map type inspect configuration mode, use the
parameter-map type content-scan global command in global configuration mode. To delete a global content-scan parameter map, use the
no form of this command.
parameter-map type content-scan global
no parameter-map type content-scan global
Syntax Description
This command has no arguments or keywords.
Command Default
A global content-scan parameter map is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.2(1)T1
This command was introduced.
Usage Guidelines
When you configure the
content-scan out
command on an interface, the global content-scan parameter map is also applied to that interface.
Examples
The following example shows how to configure a global content-scan parameter map:
Router(config)# parameter-map type content-scan global
Related Commands
Command
Description
content-scan out
Enables content scanning on an egress interface.
parameter-map type inspect
To configure an inspect-type parameter map for connecting thresholds, timeouts, and other parameters pertaining to the
inspect action, use the
parameter-maptypeinspectcommand in global configuration mode. To delete an inspect-type parameter map, use the
no form of this command.
parameter-maptypeinspect
{ parameter-map-name | global | default }
noparameter-maptypeinspect
{ parameter-map-name | global | default }
Syntax Description
parameter-map-name
Name of the inspect parameter map.
global
Defines a global inspect parameter map.
default
Defines a default inspect parameter map.
Command Default
No inspect-type parameter maps are set.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(6)T
This command was introduced.
15.1(1)T
This command was modified. The keywords
global and
default were added.
15.1(2)T
This command was modified. Support for IPv6 was added.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
Usage Guidelines
After you enter the
parameter-maptypeinspect command, you can enter the commands listed in the table below in parameter-map type inspect configuration mode.
Specifies the Domain Name System (DNS) idle timeout.
gtp
Configures the inspection parameters for General Packet Radio Service (GPRS) Tunneling Protocol (GTP).
icmpidle-timeoutseconds
Configures the timeout for Internet Control Message Protocol (ICMP) sessions.
max-incomplete {low|
high}number-of-connections
Defines the number of existing half-open sessions that will cause the software to start and stop deleting half-open sessions.
one-minute {low|
high}number-of-connections
Defines the rate of new half-open session initiation in one minute that will cause the system to start deleting half-open sessions and stop deleting half-open sessions.
tcpfinwait-timeseconds
Specifies how long a TCP session will be managed after the Cisco IOS firewall detects a FIN-exchange.
tcpidle-timeseconds
Configures the timeout for TCP sessions.
tcpmax-incompletehostthreshold[block-timeminutes}
Specifies threshold and blocking time values for TCP host-specific denial-of-service (DoS) detection and prevention.
tcpsynwait-timeseconds
Specifies how long the software will wait for a TCP session to reach the established state before dropping the session.
udpidle-timeseconds
Configures the timeout of UDP sessions going through the firewall.
For more detailed information about these commands, see their individual command descriptions.
Examples
The following example shows a sample inspect parameter map with the Cisco IOS stateful packet inspection alert messages enabled:
parameter-map type inspect eng-network-profile
alert on
The following example shows a sample inspect type parameter map configuration:
parameter-map type inspect eng_network_profile
audit-trail on
alert on
max-incomplete low unlimited
max-incomplete high unlimited
one-minute low unlimited
one-minute high unlimited
udp idle-time 30
icmp idle-time 10
dns-timeout 5
tcp idle-time 3600
tcp finwait-time 5
tcp synwait-time 30
tcp block-non-session
tcp max-incomplete host 1-2147483647 block-time unlimited
sessions maximum:2147483647
Related Commands
Command
Description
alert
Turns on Cisco IOS stateful packet inspection alert messages.
audit-trail
Turns audit trail messages on and off.
dns-timeout
Specifies the DNS idle timeout.
gtp
Configures the inspection parameters for GTP.
icmpidle-timeout
Configures the timeout for ICMP sessions.
inspect
Enables Cisco IOS stateful packet inspection.
max-incomplete
Defines the number of existing half-open sessions that will cause the software to start and stop deleting half-open sessions.
ipv6routing-enforcement-headerloose
Provides backward compatibility with the legacy IPv6 inspection.
one-minute
Defines the number of new unestablished sessions that will cause the system to start deleting half-open sessions and stop deleting half-open sessions.
tcpfinwait-time
Specifies how long a TCP session will be managed after the Cisco IOS firewall detects a FIN exchange.
tcpidle-time
Configures the timeout for TCP sessions.
tcpmax-incompletehost
Specifies the threshold and blocking time values for TCP host-specific DoS detection and prevention.
tcpsynwait-time
Specifies how long the software will wait for a TCP session to reach the established state before dropping the session.
udpidle-time
Configures the timeout of UDP sessions going through the firewall.
parameter-map type inspect-global
To configure a global parameter map and enter parameter-map type inspect configuration mode, use the
parameter-map type inspect-global
command in global configuration mode. To delete a global parameter map, use the
no
form of this command.
parameter-map type inspect-global
[ gtp ]
no parameter-map type inspect-global
[ gtp ]
Syntax Description
gtp
(Optional) Specifies the General Packet Radio Service (GPRS) Tunneling Protocol (GTP).
Command Default
Global parameter maps are not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE Release 3.5S
This command was introduced.
Cisco IOS XE Release 3.7S
This command was modified. The gtp keyword was added.
Usage Guidelines
When you configure the
parameter-map type inspect-global command, the default VPN routing and forwarding (VRF) instance gets bound to the default VRF. Use the
parameter-map type inspect-global command to enter parameter-map type inspect configuration mode and make changes to existing configurations or to configure features like aggressive aging on the default VRF.
You cannot configure the
parameter-map type inspect global
command and the
parameter-map type inspect-global
command simultaneously. The device will accept only one of these commands.
Note
The
parameter-map type inspect-global
will replace the
parameter-map type inspect global
in a future release.
You need to configure the global VRF (also known as the default VRF) by using the
parameter-map type inspect-global
vrf command and the per-box (box refers to the entire firewall session table) configuration by using the
per-box command, after configuring the
parameter-map type inspect global command. However, when you configure the
parameter-map type inspect-global command, the global VRF is bound to the inspect-VRF parameter map by default.
Examples
The following example shows how to configure a global parameter map and enter parameter-map type inspect configuration mode:
Device(config)# parameter-map type inspect-global
Device(config-profile)#
Related Commands
Command
Description
aggressive-aging
Enables aggressive aging of half-opened firewall sessions.
Logs the firewall activity for an inspect parameter map.
max-incomplete
Configures the half-opened session limit for a VRF.
parameter-map type inspect global
Defines a global inspect-type parameter map.
show parameter-map type inspect-global
Displays global parameter map information.
tcp syn-flood limit
Configures a limit to the number of TCP half-opened sessions before triggering SYN cookie processing for new SYN packets.
parameter-map type inspect-vrf
To configure an inspect VPN Routing and Forwarding (VRF)-type parameter map, use the parameter-maptypeinspect-vrf command in global configuration mode. To delete an inspect VRF type parameter map, use the no form of this command.
parameter-maptypeinspect-vrfvrf-pmap-name
noparameter-maptypeinspect-vrfvrf-pmap-name
Syntax Description
vrf-pmap-name
Name of the parameter map.
Command Default
An inspect VRF-type parameter map is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE Release 3.3S
This command was introduced.
Examples
The following example shows how to configure an inspect VRF-type parameter map named inspect-pmap:
Router(config)# parameter-map type inspect-vrf inspect-pmap
Related Commands
Command
Description
parameter-maptype
Creates or modifies a parameter map.
showparameter-maptypeinspect-vrf
Displays information about the configured inspect VRF-type parameter maps.
parameter-map type inspect-zone
To configure an inspect zone-type parameter map, use the parameter-maptypeinspect-zone command in global configuration mode. To remove an inspect zone type parameter map, use the no form of this command.
parameter-maptypeinspect-zonezone-pmap-name
noparameter-maptypeinspect-zonezone-pmap-name
Syntax Description
zone-pmap-name
Name of the parameter map.
Command Default
Inspect zone-type parameter maps are not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE Release 3.3S
This command was introduced.
Examples
The following example shows how to create an inspect zone-type parameter map named zone-pmap:
Router(config)# parameter-map type inspect-zone zone-pmap
Related Commands
Command
Description
parameter-maptype
Creates or modifies a parameter map.
showparameter-maptypeinspect-zone
Displays information about the configured inspect zone-type parameter maps.
parameter-map type mitigation
To configure a mitigation type parameter map for Transitory Messaging Services (TMS), use the
parameter-map command in global configuration mode. To remove the parameter map from the router configuration file, use the
no form of this command.
Note
Effective with Cisco IOS Release 12.4(20)T, the
parameter-map command is not available in Cisco IOS software.
parameter-maptypemitigationname
noparameter-maptypemitigationname
Syntax Description
name
The name of the mitigation type parameter map.
Command Default
A mitigation type parameter map is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.4(15)XZ
This command was integrated into Cisco IOS Release 12.4(15)XZ.
Usage Guidelines
The mitigation type parameter map is a container for TMS Rules Engine configuration parameters. The mitigation parameter map is configured on the consumer. Entering the
parameter-maptypemitigation command places the router in parameter-map configuration mode.
The mitigation type parameter map contains the next-hop variable in the mitigation type service policy (TMS Rules Engine configuration). The Rules Engine is a flexible mechanism that allows you to apply a rule on only a single consumer or to override an enforcement action sent from the controller. You can configure an enforcement action to route traffic to a null interface (black hole), route traffic to a specific interface for collection and analysis, or configure a nonstandard primitive.
Note
Nonstandard primitives are predefined in the threat definition file that is loaded on the controller.
Configuring a Mitigation Type Service Policy (TMS Rules Engine Configuration)
A mitigation type service policy is created by configuring and linking mitigation type parameter and class maps to a mitigation type policy map. The mitigation type class map is configured to define threat primitive and priority traffic matching conditions. The mitigation type parameter map is configured to apply a next-hop variable to the class of traffic. The class and parameter maps are attached to a mitigation type policy map. The mitigation type service policy is activated by attaching the mitigation type policy map to a TMS type policy map, which is attached to the global consumer process.
Examples
Examples
The following example configures the TMS Rules Engine to set the next hop variable to 192.168.1.1 for traffic that matches the mitigation class (priority 1 traffic and any primitive):
Router(config)# class-map type control mitigation match-all MIT_CLASS_1
Router(config-cmap)# match primitive any
Router(config-cmap)# match priority 1
Router(config-cmap)# exit Router(config)# parameter-map type mitigation MIT_PAR_1
Router(config-profile)# variable COLLECTION ipv4 192.168.1.1
Router(config-profile)# exit
Router(config)# policy-map type control mitigation MIT_POL_1
Router(config-pmap)# class MIT_CLASS_1
Router(config-pmap-c)# source parameter MIT_PAR_1
Router(config-pmap-c)# end
Examples
The following example configures the TMS Rules Engine to send priority 5 redirect threat mitigation traffic to a null interface (black hole):
Router(config)# parameter-map type mitigation MIT_PAR_2
Router(config-profile)# variable RTBH NULL0
Router(config-profile)# exit
Router(config)# class-map type control mitigation match-all MIT_CLASS_2
Router(config-cmap)# match priority 5
Router(config-cmap)# match primitive redirect
Router(config-cmap)# exit
Router(config)# policy-map type control mitigation MIT_POL_2
Router(config-pmap)# class MIT_CLASS_2
Router(config-pmap-c)# source parameter MIT_PAR_2
Router(config-pmap-c)# redirect route $RTBH
Router(config-pmap-c)# end
Related Commands
Command
Description
acldrop
Configures an ACL drop enforcement action in a TMS Rules Engine configuration.
class-maptypecontrolmitigation
Configures a mitigation type class map.
ignore(TMS)
Configures the TMS Rules Engine to ignore a mitigation enforcement action.
matchprimitive
Configures a primitive match in a mitigation type class map.
matchpriority
Configures the match priority level for a mitigation enforcement action.
policy-maptypecontrolmitigation
Configures a mitigation type policy map.
redirectroute
Configures a redirect enforcement action in a mitigation type policy map.
sourceparameter
Attaches a mitigation type parameter map to a policy-map class configuration.
tms-class
Associates an interface with an ACL drop enforcement action.
variable
Defines the next-hop variable in a mitigation type parameter map.
parameter-map type ooo global
To configure an Out-of-Order (OoO) global parameter map for all firewall policies, use the parameter-map type ooo global command in global configuration mode. To remove an OoO global parameter map, use the no form of this command.
parameter-map type ooo global
no parameter-map type ooo global
Syntax Description
This command has no arguments or keywords.
Command Default
OoO global parameter maps are not configured for firewall policies.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.0(1)M
This command was introduced.
Usage Guidelines
OoO packet-processing support for the Common Classification Engine (CCE) firewall application and CCE adoptions of the Cisco Intrusion Prevention System (IPS) allows packets that arrive out of order to be copied and reassembled in the correct order. OoO packet processing reduces the need to retransmit dropped packets and reduces the bandwidth needed for the transmission of traffic on a network.
OoO packets are dropped when Cisco IPS and the zone-based policy firewall
with Layer 4 inspection are enabled.
Examples
The following example shows how to configure an OoO global parameter map:
Device# configure terminal
Device(config)# parameter-map type ooo global
Device(config-profile)#
Related Commands
show parameter-map type ooo global
Displays OoO global parameter-map information.
tcp reassembly
Changes the default parameters for OoO queue processing of TCP sessions.
tcp reassembly memory limit
Specifies the limit of the OoO queue size for TCP
sessions.
parameter-map type protocol-info
To create or modify a protocol-specific parameter map and enter parameter-map type configuration mode, use the parameter-maptypeprotocol-infocommand in global configuration mode. To delete a protocol-specific parameter map from the configuration, use the no form of this command.
(Optional) Defines a Microsoft Remote Procedure Call (MSRPC) protocol-info parameter map.
sip
(Optional) Defines a Session Initiation Protocol (SIP) protocol-info parameter map.
stun-ice
(Optional) Defines a Session Traversal Utilities for Network Address Translation (NAT) and Interactive Connectivity Establishment (STUN-ICE) protocol-info parameter map.
parameter-map-name
Name of the parameter map.
Command Default
No protocol-specific parameter maps are created.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(11)T
This command was introduced.
15.0(1)M
This command was modified. The sip keyword was added.
15.1(4)M
This command was modified. The msrpc keyword was added.
Usage Guidelines
A protocol-specific parameter map allows you to specify the parameters that control the behavior of actions specified under a policy map and match criteria specified under a class map.
Protocol-specific parameter maps can be created for real-time voice, video, and text messaging applications (such as AOL, MSN Messenger, or Windows Messenger).
Examples
The following example shows a sample SIP protocol type parameter map configuration. In this example, the parameter map is configured to not open a media channel when attached to a SIP class map:
Router(config)# parameter-map type protocol-info sip pmap-sip
Router(config-profile)# disable open-media channel
The following example shows a sample STUN-ICE protocol type parameter map configuration. In this example, the parameter map is configured to not open a media channel when attached to a SIP class map:
The following example shows how to configure an Instant Messaging-based firewall policy. In this example, all Yahoo Messenger and I Seek You (ICQ) traffic is allowed to pass through, while all MSN Messenger, AOL, and Windows Messenger traffic is blocked. Also, parameter maps are defined to control all Yahoo Messenger and ICQ traffic on a more granular level.
Router(config)# parameter-map type protocol-info ymsgr-servers
Router(config-profile)# server name messenger.yahoo.akadns.net
Router(config-profile)# server name .*.yahoo.com snoop
Router(config-profile)# server ip 192.0.2.100
Router(config-profile)# server ip range 192.0.2.115 192.0.2.180
Router(config-profile)# exit
Router(config)# parameter-map type protocol-info icq-servers
Router(config-profile)# server name login.oscar.aol.com
Router(config-profile)# server name .*.aol.com snoop
Router(config-profile)# server ip 192.0.2.200
Router(config-profile)# server ip range 192.0.2.215 192.0.2.230
Router(config-profile)# exit
Router(config)# class-map type inspect match-all l4-cmap-ymsgr
Router(config-cmap)# match protocol ymsgr ymsgr-servers
Router(config-cmap)# exit
Router(config)# class-map type inspect ymsgr match-any l7-cmap-ymsgr
Router(config-cmap)# match service text-chat
Router(config-cmap)# exit
Router(config)# class-map type inspect match-all l4-cmap-icq
Router(config-cmap)# match protocol icq icq-servers
Router(config-cmap)# exit
Router(config)# class-map type inspect icq match-any l7-cmap-icq
Router(config-cmap)# match service text-chat
Router(config-cmap)# match service any
Router(config-cmap)# exit
Router(config)# policy-map type inspect im l7-pmap-ymsgr
Router(config-pmap)# class type inspect ymsgr l7-cmap-ymsgr
Router(config-pmap-c)# allow
Router(config-pmap-c)# log
Router(config-pmap-c)# exit
Router(config)# policy-map type inspect im l7-pmap-icq
Router(config-pmap)#class type inspect icq l7-cmap-icq
Router(config-pmap-c)# allow
Router(config-pmap-c)# log
Router(config-pmap-c)# exit
Router(config)# policy-map type inspect to_internet
Router(config-pmap)# class type inspect l4-cmap-ymsgr
Router(config-pmap-c)# inspect
Router(config-pmap-c)# service-policy im l7-pmap-ymsgr
Router(config-pmap-c)# exit
Router(config-pmap)# class type inspect l4-cmap-icq
Router(config-pmap-c)# inspect
Router(config-pmap-c)# service-policy im l7-pmap-icq
Router(config-pmap-c)# exit
Router(config-pmap)# class class-default
Router(config-pmap-c)# drop
Related Commands
Command
Description
disableopen-media-channel
Prevents the creation of RTP or RTCP media channels when a SIP class map is used for SIP inspection.
parameter-maptypeinspect
Configures an inspect type parameter map for connecting thresholds, timeouts, and other parameters pertaining to the inspect action.
parameter-map type regex
To configure a parameter-map type to match a specific traffic pattern, use the
parameter-maptyperegex command in global configuration mode. To delete a parameter-map type with a regular expression (regex), use the
no form of this command.
parameter-maptyperegexparameter-map-name
noparameter-maptyperegex
Syntax Description
parameter-map-name
Name of the parameter map. The name can have a maximum of 228 alphanumeric characters.
Note
The use of blank spaces is not recommended. The system interprets the first blank space as the end of the parameter-map name unless the string is delimited by quotation marks.
Command Default
A regex parameter map is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(9)T
This command was introduced.
Cisco IOS XE Release 3.2S
This command was integrated into Cisco IOS XE Release 3.2S.
Usage Guidelines
You can enter a regex to match text strings either literally as an exact string or by using metacharacters to match multiple variants of a text string. You can use a regex to match the content of certain application traffic; for example, you can match a uniform resource identifier (URI) string inside an HTTP packet using the
matchrequestregexcommand under an HTTP inspection class map.
Use Ctrl-V to ignore all of the special characters in the CLI, such as a question mark (?) or a tab. For example, type
d[Ctrl-V]gto enterd?g in the configuration.
The table below lists the metacharacters that have special meanings.
Table 1 regex Metacharacters
Character
Description
Notes
.
Dot
Matches any single character. For example,
d.gmatches dog, dag, dtg, and any word that contains those characters.
(xxx)
Subexpression
A subexpression segregates characters from surrounding characters so that you can use other metacharacters on the subexpression. For example,
d(o|a)g matches dog and dag, but
do|agmatches do and ag. A subexpression can also be used with repeat quantifiers to differentiate the characters meant for repetition. For example,
ab(xy){3}z matches abxyxyxyz.
|
Alternation
Matches either of the expressions that it separates. For example,
dog|cat matches dog or cat.
?
Question mark
A quantifier that indicates that there are 0 or 1 of the previous expression. For example,
lo?se matches lse or lose.
Note
You must enter
Ctrl-V and then the question mark or else the help function is invoked.
*
Asterisk
A quantifier that indicates that there are 0, 1, or any number of the previous expression. For example,
lo*se matches lse, lose, loose, and so on.
+
Plus
A quantifier that indicates that there is at least one occurrence of the previous expression. For example,
lo+se matches lose and loose, but not lse.
{x}
Repeat quantifier
Repeat exactly
x times. For example,
ab(xy){3}z matches abxyxyxyz.
{x,}
Minimum repeat quantifier
Repeat at least
x times. For example,
ab(xy){2,}zmatches abxyxyz, abxyxyxyz, and so on.
[abc]
Character class
Matches any character in the bracket. For example,
[abc] matches a, b, or c.
[^abc]
Negated character class
Matches a single character that is not contained within brackets. For example,[^abc] matches any character other than a, b, or c; and
[^A-Z]matches any single character that is not an uppercase letter.
[a-c ]
Character range class
Matches any character in the specified range.
[a-z] matches any lowercase letter. You can mix characters and ranges; for example,
[abcq-z] matches a, b, c, q, r, s, t, u, v, w, x, y, z, and so does
[a-cq-z].
Note
The dash (-) character is literal only if it is the last or the first character within the brackets,[abc-] or
[-abc].
“”
Quotation marks
Preserves trailing or leading spaces in the string. For example,
“test” preserves the leading space when it looks for a match.
^
Caret
Specifies the beginning of a line.
\
Escape character
When preceding a literal character, it matches the literal character. For example,
\[matches the left square bracket.
char
Character
When the character is not a metacharacter, it matches the literal character.
\r
Carriage return
Matches a carriage return 0x0d.
\n
New line
Matches a new line 0x0a.
\t
Tab
Matches a tab 0x09.
\f
Formfeed
Matches a form feed 0x0c.
\xnn
Escaped hexadecimal number
Matches an ASCII character using hexadecimal numbers (exactly two digits).
\nnn
Escaped octal number
Matches an ASCII character as an octal number (exactly three digits). For example, the character 040 represents a space.
Examples
The following example shows how to configure and apply a regex parameter map to an HTTP application firewall parameter-map type whose URI matches any of the following regular expressions:
“.*cmd.exe”
“.*money”
“.*shopping”
Router# configure terminal
Router(config)# parameter-map type regex uri-regex-cm
Router(config-profile)# pattern ".*cmd.exe"
Router(config-profile)# pattern ".*money"
Router(config-profile)# pattern ".*shopping"
Router(config-profile)# exit
Router(config)# class-map type inspect http uri-check-cm
Router(config-cmap)# match request uri regex uri-regex-cm
Router(config-cmap)# exit
Router(config)# policy-map type inspect http uri-check-pm
Router(config-pmap)# class type inspect http uri-check-cm
Router(config-pmap-c)# reset
The following example shows how to configure a regex parameter map whose case-insensitive pattern matches multiple variants of the string “hello”:
Router# configure terminal
Router(config)# parameter-map type regex body_regex
Router(config-profile)# pattern ".*[Hh][Ee][Ll][Ll][Oo]"
Router(config-profile)# end
Related Commands
Command
Description
class-map type inspect
Creates a Layer 3 and Layer 4 or a Layer 7 (application-specific) inspect-type class map.
class type inspect
Specifies the traffic (class) on which an action is to be performed.
match request regex
Configures an HTTP firewall policy to permit or deny HTTP traffic on the basis of request messages whose URI or arguments (parameters) match a defined regular expression.
parameter-maptype
Creates or modifies a parameter map.
policy-map type inspect
Creates a Layer 3 and Layer 4 or a Layer 7 (application-specific) inspect-type policy map.
parameter-map type trend-global
To create or modify the parameter map for global parameters associated with a Trend Router Provisioning Server (TRPS) and to place the system in parameter map configuration mode, use the parameter-maptypetrend-global command in global configuration mode. To delete the global parameters associated with a TRPS from the configuration, use the no form of this command.
parameter-maptypetrend-globalparameter-map-name
noparameter-maptypetrend-globalparameter-map-name
Syntax Description
parameter-map-name
Name of the parameter map for the global parameters associated with the TRPS.
Command Default
No parameter map for the global TRPS parameters is created.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(15)XZ
This command was introduced.
12.4(20)T
This command was integrated into Cisco IOS Release 12.4(20)T.
15.1(2)T
This command was modified. The pipeline, on, and offkeywords were added.
Usage Guidelines
Use the parameter-maptypetrend-globalcommand to specify global parameters for the TRPS. You can specify only one trend-global parameter map on the system. To specify per-policy parameters, use the parameter-maptypeurlfpolicy command.
When you create or modify a global TRPS parameter map, use the following commands in parameter map configuration mode to set the values for the global TRPS parameters:
alert{on | off}--Turns on or off URL-filtering server alert messages that are displayed on the console. The default is on.
cache-entry-lifetimehours--
Specifies how long, in hours, an entry remains in the cache table. Cache entries remain in the table until the cache-entry-lifetime value for the entry expires or until the cache is full, whichever occurs first. When the cache is full, the entry is removed to make room for subsequent entries. The range is from 1 to 120. The default is 24.
cache-sizemaximum-memorykilobyte--
Specifies the maximum size of the categorization cache, in kilobytes. The range is from 0 to 128000. The default is 256.
exit--Exits from the parameter map.
no--Negates or sets default values for a command.
server{server-name|ip-address} [http-portport-number] [https-portport-number] [retransretransmission-count] [timeoutseconds] [pipeline {on | off}]--Specifies information about the TRPS. Use the server command in profile configuration mode.
http-portport-number--Specifies the HTTP port that is listening for requests. The range is from 1 to 65535. The default is 80.
https-portport-number--Specifies the HTTPS port that is listening for secure HTTP requests. The range is from 1 to 65535. The default is 443.
pipeline {on | off}--Turns on or off the TRPS pipeline requests. The default is on.
retransretransmission-count--Specifies the number of times the router retransmits the lookup request when a response is not received from the TRPS. The range is from 1 to 5. The default is 3.
server {server-name | ip-address}--Specifies the domain name or the IP address of the server. The default is trps.trendmicro.com.
timeoutseconds--Specifies the number of seconds that the router waits for a response from the TRPS. The range is from 1 to 300. The default is 60.
Examples
The following shows an example of how to specify global TRPS parameters in a parameter map named global-parameter-map:
parameter-map type trend-global global-parameter-map
server server.example.com retrans 5 timeout 200
cache-size maximum-memory 128000
cache-entry-lifetime 1
Related Commands
Command
Description
alert
Turns on or off URL-filtering system alert messages that are displayed on the console.
cache-entrylifetime
Specifies how long an entry remains in the cache table.
cache-sizemaximum-memory
Specifies the size of the categorization cache.
parameter-maptypeurlfpolicy
Specifies per-policy URL filtering parameters.
server
Specifies information about the TRPS.
parameter-map type urlfilter
Note
This command is hidden in releases later than Cisco IOS Release 12.4(20)T, but it continues to work. The parameter-maptypeurlfpolicy command can also be used. This command is used to create URL filtering parameters for local, trend, Websense Internet filtering, and the N2H2 Internet blocking program. We recommend the use of the URL filter policy rather than the URL filter action for Cisco IOS Release 12.4(20)T. All the use-cases supported by URL filter as an action are also supported by URL filter policy.
To create or modify a parameter map for URL filtering parameters, use the parameter-maptypeurlfilter command in global configuration mode. To delete a URL filter parameter map, use the no form of this command.
parameter-maptypeurlfilterparameter-map-name
noparameter-maptypeurlfilterparameter-map-name
Syntax Description
parameter-map-name
Name of the URL parameter map.
Command Default
None
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.4(15)XZ
This command was removed.
Usage Guidelines
When you are creating or modifying a URL parameter map, you can enter the following subcommands after you enter the parameter-maptypeurlfiltercommand. For more detailed information about the subcommands, see their individual command descriptions by going to the “Command Reference” section on page 45.
alert {on | off}
Turns on or off URL-filtering system alert messages that are displayed on the console.
allow-mode {on | off}
Turns on or off the default mode (allow mode) of the filtering algorithm.
audit-trail {on | off}
Turns on or off the logging of URL information into the syslog server or router.
cachenumber-of-entries
Configures cache parameters.
exclusive-domain {deny | permit} domain-name
Adds or removes a domain name to or from the exclusive domain list so that the Cisco IOS firewall does not have to send lookup requests to the vendor server.
max-requestnumber-of-requests
Specifies the maximum number of outstanding requests that can exist at any given time.
max-resp-paknumber-of-responses
Specifies the maximum number of HTTP responses that the Cisco IOS firewall can keep in its packet buffer.
Specifies the interface whose IP address will be used as the source IP address while making a TCP connection to the URL filter server (websense or N2h2).
Examples
The following example shows a sample URL parameter map:
parameter-map type urlfilter eng-network-profile
server vendor n2h2 10.64.64.22 port 4128 outside retrans 4 timeout 8
The following example shows a typical URL filter configuration:
parameter-map type urlfilter eng-network-profile
server vendor n2h2 10.64.65.22 port 3128 outside log retrans 6 timeout 10
max-request 80
max-resp-pak 200
cache 200
exclusive-domain permit cisco.com
exclusive-domain deny gaming.com
Related Commands
Command
Description
alert
Turns on or off URL-filtering system alert messages that are displayed on the console.
allow-mode
Turns on or off the default mode (allow mode) of the filtering algorithm.
audit-trail
Turns on or off the logging of URL information into the syslog server or router.
cache
Configures cache parameters.
exclusive-domain
Adds or removes a domain name to or from the exclusive domain list so that the Cisco IOS firewall does not have to send lookup requests to the vendor server.
max-request
Specifies the maximum number of outstanding requests that can exist at any given time.
max-resp-pak
Specifies the maximum number of HTTP responses that the Cisco IOS firewall can keep in its packet buffer.
servervendor
Specifies a vendor server for URL filtering.
parameter-map type urlfpolicy
To create or modify a parameter map for a URL filtering policy and to place the system in parameter map configuration mode, use the
parameter-maptypeurlfpolicycommand in global configuration mode. To delete the parameter map for a URL filtering policy from the configuration, use the
no form of this command.
Specifies that the parameters are for a local URL filtering policy.
trend
Specifies that the parameters are for a Trend Micro URL filtering policy.
n2h2
Specifies that the parameters are for a SmartFilter (previously N2H2) URL filtering policy.
websense
Specifies that the paramaters are for a Websense URL filtering policy.
parameter-map-name
The name of the parameter map for a URL filtering policy.
Command Default
No parameter maps for a URL filtering policy are created.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(15)XZ
This command was introduced.
Usage Guidelines
Use the
parameter-maptypeurlfpolicycommand to create a paramater map for a URL filtering policy. The commands that you use to specify the paramaters for a filtering policy depend on the URL filtering server you are using.
The first table below defines the parameters for a local URL filtering policy.
The second table below defines the per-policy parameters for a Trend Micro URL filtering policy. These parameters are in addition to the global Trend Micro policy parameters specified with the
parameter-maptypetrend-global command.
The third table below defines the per-policy parameters for SmartFilter (N2H2) and Websense URL filtering policies.
Table 2 Parameters for Local URL Filtering Policies
Syntax
Description
alert {on |
off}
Turns on or off URL filtering alert messages that are displayed on the console. The default is
off.
allow-mode{on |
off}
Specifies whether to allow or block URL requests when the URL filtering process does not have connectivity to a URL filtering database. When
allow-mode is
on, all unmatched URL requests are allowed; when
off, all unmatched URL requests are blocked. The default is
off.
block-page{messagestring |redirect-urlurl }
Specifies the response to a blocked URL request.
messagestring --Specifies the message text to be displayed when a URL request is blocked.
redirect-urlurl --Specifies the URL of the web page to be displayed when a URL request is blocked.
exit
Exits from the parameter map.
no
Negates or sets default values for a command.
Table 3 Parameters for Trend Micro URL Filtering Policies
Syntax
Description
allow-mode{on |
off}
Specifies whether to allow or block URL requests when the URL filtering process does not have connectivity to a URL filtering database. When
allow-mode is
on, all unmatched URL requests are allowed; when
off, all unmatched URL requests are blocked. The default is
off.
block-page{messagestring |
redirect-urlurl }
Specifies the response to a blocked URL request.
messagestring --Specifies the message text to be displayed when a URL request is blocked.
redirect-urlurl --Specifies the URL of the web page to be displayed when a URL request is blocked.
exit
Exits from the parameter map.
max-requestnumber-requests
Specifies the maximum number of pending requests. The range is from 1 to 2147483647. The default is 1000.
max-resp-paknumber-responses
Specifies the number of HTTP responses that can be buffered. The range is from 0 and 20000. The default is 200.
no
Negates or sets default values for a command.
truncatehostname
Specifies that URLs be truncated at the end of the domain name.
Table 4 Parameters for SmartFilter and Websense URL Filtering Policies
Syntax
Description
alert {on |
off}
Turns on or off URL filtering alert messages that are displayed on the console. The default is
off.
allow-mode{on |
off}
Specifies whether to allow or block URL requests when the URL filtering process does not have connectivity to a URL filtering database. When
allow-mode is
on, all unmatched URL requests are allowed; when
off, all unmatched URL requests are blocked. The default is
off.
block-page{messagestring|redirect-urlurl }
Specifies the response to a blocked URL request.
messagestring --Specifies the message text to be displayed when a URL request is blocked.
redirect-urlurl --Specifies the URL of the web page to be displayed when a URL request is blocked.
cache-entry-lifetimehours
Specifies how long, in hours, an entry remains in the cache table. The default is 24.
cache-sizemaximum-entriesnumber-entries
Specifies the maximum number of entries that can be stored in the categorization cache. The default is 5000.
exit
Exits from the parameter map.
max-requestnumber-requests
Specifies the maximum number of pending requests. The range is from 1 to 2147483647. The default is 1000.
max-resp-paknumber-responses
Specifies the number of HTTP responses that can be buffered. The range is from 0 and 20000. The default is 200.
Specifies the parameters for the URL filtering server.
server {server-name |
ip-address}
Specifies the domain name or the IP address of the URL filtering server.
[source-interfaceinterface-name]
Specifies the interface whose IP address will be used as the source IP address when a TCP connection is established between the system and the URL filtering server.
outside
Specifies whether the URL filtering server is outside the network.
portport-number
Specifies the port that is listening for requests. The range is from 1 to 65535. The default is 80.
retransretransmission-count
Specifies the number of times the Cisco IOS firewall retransmits the lookup request when a response is not received from the Trend Router Provisioning Server (TRPS). The range is from 1 to 5. The default is 3.
timeoutseconds
Specifies the number of seconds that the Cisco IOS firewall waits for a response from the TRPS. The range is from 1 to 300. The default is 60.
truncate{hostname|script-options}
Specifies that URLs be truncated.
hostname
Specifies that URLs be truncated at the end of the domain name.
script-options
Specifies that URLs be truncated at the left-most question mark in the URL.
urlf-server-log{on|off}
Enables sending information about HTTP requests to the URL filtering server’s log server. The information includes the URL, the hostname, the source IP address, and the destination IP address.
Examples
The following example shows a parameter map for a local URL filtering policy that does not send alert messages and displays the message "URL is blocked by local filters" when a URL is blocked:
parameter-map type urlfpolicy local local-param-map
alert off
block-page message "URL is blocked by local-filters"
The following example shows a configuration for global parameters and per-policy parameters for a Trend Micro URL filtering policy:
parameter-map type trend-global global-param-map
server mytrps.trendmicro.com retrans 5 timeout 200
cache-size maximum-memory 128000
cache-entry-lifetime 1
parameter-map type urlfpolicy trend trend-param-map
max-request 2147483647
max-resp-pak 20000
truncate hostname
block-page message "group2 is blocked by trend"
The following example shows the configuration for per-policy parameters for a SmartFilter URL filtering policy:
Specifies the global parameters associated with Trend Micro URL filtering policies.
parameter-map type urlf-glob
To create or modify a parameter map used to specify a list of domains, URL keywords, or URL metacharacters that should be allowed or blocked by local URL filtering, use the parameter-map type urlf-glob command in global configuration mode. To delete the parameter map, use the no form of this command.
parameter-maptypeurlf-globparameter-map-name
noparameter-maptypeurlf-globparameter-map-name
Syntax Description
parameter-map-name
Name of the parameter map for a local URL filtering policy.
Command Default
No URL filtering parameter maps are created.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(15)XZ
This command was introduced.
12.4(20)T
This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
The parameter-map type urlf-glob command can be used to create a parameter map for trusted domains, a parameter map for untrusted domains, and a parameter map for URL keywords. The following sub-commands are available in parameter map configuration mode to specify matching parameters when the parameter-map type urlf-glob command is issued:
exit--Exits from URL filtering parameter map configuration mode.
no--Negates or sets default values for a command.
pattern expression--Configures a matching pattern that refers to a domain name, URL keyword, URL metacharacter entry, or URL keyword and URL metacharacter combination. The characters /, {, and } are not allowed in the expression. The question mark (?) is not allowed because it is reserved for the help function in the command-line interface (CLI).
URL pattern matching is improved because the period (.) is interpreted as a dot, and not as a wildcard entry representing a single character, as is the case with regex regular expression pattern matching.
A URL keyword is a complete word that occurs after the domain name and that is between the forward slash (/) path delimiters. For example in the URL http://www.example.com/hack/123.html, only “hack” and “123.html” are treated as keywords. Anything in the host or domain name can be allowed or blocked using a domain name, and thus a URL keyword should be a word that comes after the domain name. The entire keyword in the URL must match the pattern. For example if you have pattern hack, the URL www.example.com/hacksite/123.html doesn't match the pattern. In order to match this URL, you must have hacksite.
URL metacharacters allow pattern matching of single characters or ranges of characters to URLs, similar to the way a UNIX style glob expression works. The URL metacharacters are presented in the table below.
Table 5 URL Metacharacters for URL Pattern Matching
Character
Description
*
Asterisk--matches any sequence of 0 or more characters.
[abc]
Character class--matches any character in the brackets. The character matching is case sensitive. For example,
[abc] matches a, b, or c.
[a-c ]
Character range class. Matches any character in the range. The character matching is case sensitive.
[a-z] matches any lowercase letter. You can mix characters and ranges; for example,
[abcq-z] matches a, b, c, q, r, s, t, u, v, w, x, y, z, and so does
[a-cq-z].
Note
The dash (-) character is literal only if it is the last or the first character within the brackets,[abc-] or
[-abc].
[0-9]
Numerical range class. Matches any number in the brackets. For example [0-9] matches 0, 1, 2, 3, 4, 5, 6, 7, 8, or 9.
URL metacharacters are combined with domain names and URL keywords for pattern matching. For example, pattern *.example.com will match the domain name www.example.com and pattern www.[ey]xample.com can be used to block both www.example.com and www.yxample.com. Also, pattern www.example[0-9][0-9].com can be used to block www.example01.com, www.example33.com, and www.example99.com. An example of combining a keyword and metacharacter for pattern matching is using pattern hack* to block www.example.com/hacksite/123.html.
Examples
The following shows an example of specifying the parameter map for trusted domains:
The following shows an example of a parameter map specifying URL metacharacters to be blocked:
Router(config)# parameter-map type urlf-glob metacharacter-param
Related Commands
Command
Description
class-maptypeurlfilter
Creates a class map that specifies the traffic to which a URL filtering policy applies.
pattern(parameter-map)
Configures a matching pattern that specifies a list of domains, URL keywords, or URL metacharacters that should be allowed or blocked by local URL filtering.
parser view
To create or change
a command-line interface (CLI) view and enter view configuration mode, use the
parserview command in global configuration mode. To
delete a view, use the
no form of this
command.
parserviewview-name[inclusive]
noparserviewview-name[inclusive]
Syntax Description
view-name
View
name, which can include 1 to 30 alphanumeric characters.
Theview-name argument must not have a number as the
first character; otherwise, you will receive the following error message:
“Invalid view name.”
inclusive
(Optional) Specifies that all commands are included by default.
Command Default
A CLI view does not
exist.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.3(7)T
This
command was introduced.
12.2(33)SRB
This
command was integrated into Cisco IOS Release 12.2(33)SRB.
Cisco IOS
XE Release 2.1
This
command was integrated into Cisco IOS XE Release 2.1.
12.2(33)SXI
This
command was integrated into Cisco IOS Release 12.2(33)SXI.
15.4(1)T
This
command was integrated into Cisco IOS Release 15.4(1)T.
15.4(1)S
This
command was integrated into Cisco IOS Release 15.4(1)S.
Cisco
IOS XE Release 3.11S
This
command was integrated into Cisco IOS XE Release 3.11S.
Usage Guidelines
A CLI view is a set
of operational commands and configuration capabilities that restrict user
access to the CLI and configuration information; that is, a view allows users
to define what commands are accepted and what configuration information is
visible.
After you have
issued the
parserview command, you can configure the view via the
secret5 command and the
commands
command.
To invoke the
parserview command, the system of the user must be set
to root view. The root view can be enabled via theenableview command.
To create a view
including all commands by default, use the
inclusive
keyword. An
inclusive-exclusive command does not appear
in other standard CLI views or in any other standard CLI inclusive views.
Note
To modify the
standard CLI view settings, you must delete and re-create the CLI view without
the
inclusive
keyword.
Examples
The following
example shows how to configure two CLI views, “first” and “second”:
Device(config)# parser view first inclusive
Device(config-view)# secret 5 firstpass
Device(config-view)# command exec exclude show version
Device(config-view)# command exec exclude configure terminal
Device(config-view)# command exec exclude all show ip
Device(config-view)# exit
Device(config)# parser view second
Device(config-view)# secret 5 secondpass
Device(config-view)# command exec include-exclusive show ip interface
Device(config-view)# command exec include logout
Device(config-view)# exit
Related Commands
Command
Description
commands(view)
Adds
commands to a CLI view.
secret5
Associates a CLI view or a superview with a password.
parser view superview
To create a superview and enter view configuration mode, use the parserviewsuperview command in global configuration mode. To delete a superview, use the no form of this command.
parserviewsuperview-namesuperview
noparserviewsuperview-namesuperview
Syntax Description
superview-name
Superview name, which can include 1 to 30 alphanumeric characters.
Thesuperview-name argument must not have a number as the first character.
Command Default
A superview does not exist.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.3(11)T
This command was introduced.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
Cisco IOS XE
Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
12.2(33)SXI
This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines
A superview consists of one or more command-line interface (CLI) views, which allow users to define what commands are accepted and what configuration information is visible. Superviews allow a network administrator to easily assign all users within configured CLI views to a superview instead of having to assign multiple CLI views to a group of users.
Superviews contain the following characteristics:
A CLI view can be shared among multiple superviews.
Commands cannot be configured for a superview; that is, you must add commands to the CLI view and add that CLI view to the superview.
Users who are logged in to a superview can access all of the commands that are configured for any of the CLI views that are part of the superview.
Each superview has a password that is used to switch between superviews or from a CLI view to a superview.
Adding CLI Views to a Superview
You can add a view to a superview only after a password has been configured for the superview (via the secret5 command). Thereafter, issue the view command in view configuration mode to add at least one CLI view to the superview.
Note
Before adding a CLI view to a superview, ensure that the CLI views that are added to the superview are valid views in the system; that is, the views have been successfully created via the parserview command.
Examples
The following example shows how to create a superview (su_view1) and enter view configuration mode; two CLI views (view_one, view_two) are added to the superview also:
Creates or changes a CLI view and enters view configuration mode.
secret5
Associates a CLI view or a superview with a password.
view
Adds a normal CLI view to a superview.
pass
To allow packets to be sent to the router without being inspected, use the
pass command in policy-map-class configuration mode.
pass [log]
Syntax Description
log
(Optional) Logs the packets passed by the firewall pass policy.
Command Default
Traffic is not passed; that is, it is dropped.
Command Modes
Policy-map-class configuration
Command History
Release
Modification
12.4(6)T
This command was introduced.
Cisco IOS-XE 2.4
This command was integrated into Cisco IOS-XE Release 2.4. The
log keyword was added.
Usage Guidelines
You can use this command only after entering the
policy-maptypeinspect,
classtypeinspect, and
parameter-maptypeinspect commands.
Examples
The following example specifies that policy map p1 passes and logs the traffic:
policy-map type inspect p1
class type inspect c1
pass log
Related Commands
Command
Description
classtypeinspect
Specifies the traffic (class) on which an action is to be performed.
parameter-maptypeinspect
Configures an inspect parameter map for connecting thresholds, timeouts, and other parameters pertaining to the
inspect action.
policy-maptypeinspect
Creates a Layer 3 or Layer 4 inspect type policy map.
log (parameter-map type)
Logs the firewall activity for an inspect parameter map.
passive
To move a group member directly into passive mode, use the passive command in crypto gdoi group configuration mode. To disable the passive mode setting, use the no form of this command.
passive
nopassive
Syntax Description
This command has no arguments or keywords.
Command Default
The group member is in full crypto send and receive mode.
Command Modes
Crypto gdoi group configuration (crypto-gdoi-group)
Command History
Release
Modification
12.4(22)T
This command was introduced.
Cisco IOS XE Release 2.3
This command was implemented on the Cisco ASR 1000 series routers.
Usage Guidelines
By using the passive command, you avoid having to use the cryptogdoigmipsecdirectioninboundoptionalprivileged EXEC command, which is not persistent after a router reload and can be overriden by key server configuration from a rekey.
Examples
The following example shows that the group member group1 is being moved to passive mode:
crypto gdoi group group1
identity 2345
passive
server address ipv4 10.34.255.57
Related Commands
Command
Description
cryptogdoigm
Changes the IPsec SA status of group members.
password (ca-trustpoint)
To specify the revocation password for the certificate, use the password command in ca-trustpoint configuration mode. To erase any stored passwords, use the no form of this command.
passwordstring
nopassword
Syntax Description
string
Name of the password.
Command Default
You are prompted for the password during certificate enrollment.
Command Modes
Ca-trustpoint configuration
Command History
Release
Modification
12.2(8)T
This command was introduced.
12.4(24)T
Support for IPv6 Secure Neighbor Discovery (SeND) was added.
Usage Guidelines
Before you can issue the password command, you must enable the cryptocatrustpointcommand, which declares the certification authority (CA) that your router should use and enters ca-trustpoint configuration mode.
This command allows you to specify the revocation password for the certificate before actual certificate enrollment begins. The specified password is encrypted when the updated configuration is written to NVRAM by the router.
If this command is enabled, you will not be prompted for a password during certificate enrollment.
Examples
The following example shows how to specify the password “revokeme” for the certificate request:
To specify the password for an 802.1X credentials profile, use the password command in dot1x credentials configuration mode. To remove the password, use the no form of this command.
password
[ 0 | 7 ]
password
nopassword
Syntax Description
0
(Optional) A plain text password will follow. The default is 0.
7
(Optional) An encrypted password will follow. The default is 0.
password
The password.
Command Default
A password is not specified.
Command Modes
Dot1x credentials configuration
Command History
Release
Modification
12.4(6)T
This command was introduced.
Usage Guidelines
Before using this command, thedot1xcredentials command must have been configured.
Examples
The following example shows which credentials profile should be used when configuring a supplicant. The password is “secret.”
dot1x credentials basic-user
username router
password secret
description This credentials profile should be used for most configured ports
The credentials structure can be applied to an interface along with the dot1xpaesupplicant command and keyword to enable supplicant functionality on that interface.
Specifies the 802.1X credentials profile to be used.
password (line configuration)
To specify a password on a line, use the password command in line configuration mode. To remove the password, use the no form of this command.
passwordpassword
nopassword
Syntax Description
password
Character string that specifies the line password. The first character cannot be a number. The string can contain any alphanumeric characters, including spaces, up to 80 characters. You cannot specify the password in the format number-space-anything. The space after the number causes problems. For example, hello 21 is a legal password, but 21 hello is not. The password checking is case sensitive. For example, the password Secret is different than the password secret.
Command Default
No password is specified.
Command Modes
Line configuration
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS release 12.(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
When an EXEC process is started on a line with password protection, the EXEC prompts for the password. If the user enters the correct password, the EXEC prints its normal privileged prompt. The user can try three times to enter a password before the EXEC exits and returns the terminal to the idle state.
Examples
The following example removes the password from virtual terminal lines 1 to 4:
line vty 1 4
no password
Related Commands
Command
Description
enablepassword
Sets a local password to control access to various privilege levels.
password 5
Note
Effective with Cisco IOS Release 12.3(14)T, this command is replaced by the secret command.
To associate a command-line interface (CLI) view or a superview with a password, use the password5command in view configuration mode.
password5password
Syntax Description
password
Password for users to enter the CLI view or superview. A password can contain any combination of alphanumeric characters.
Note
The password is case sensitive.
Command Default
A user cannot access a CLI view or superview.
Command Modes
View configuration
Command History
Release
Modification
12.3(7)T
This command was introduced.
12.3(11)T
This command was enhanced to support superviews.
12.3(14)T
This command was replaced by the secret command.
Usage Guidelines
A user cannot access any commands within the CLI view or superview until the password5command has been issued.
Examples
The following example show how to configure two CLI views, “first” and “second” and associate each view with a password:
Router(config)# parser view first
00:11:40:%PARSER-6-VIEW_CREATED:view 'first' successfully created.
Router(config-view)# password 5 firstpass
Router(config-view)# command exec include show version
Router(config-view)# command exec include configure terminal
Router(config-view)# command exec include all show ip
Router(config-view)# exit
Router(config)# parser view second
00:13:42:%PARSER-6-VIEW_CREATED:view 'second' successfully created.
Router(config-view)# password 5 secondpass
Router(config-view)# command exec include-exclusive show ip interface
Router(config-view)# command exec include logout
Router(config-view)# exit
Related Commands
Command
Description
parser view
Creates or changes a CLI view and enters view configuration mode.
password encryption aes
To enable a type 6 encrypted preshared key, use the passwordencryptionaescommand in global configuration mode. To disable password encryption, use the no form of this command.
passwordencryptionaes
nopasswordencryptionaes
Syntax Description
This command has no arguments or keywords.
Command Default
Preshared keys are not encrypted.
Command Modes
Global configuration
Command History
Release
Modification
12.3(2)T
This command was introduced.
12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.2(33)SRA
This command was integrated into Cisco IOS release 12.(33)SRA.
Usage Guidelines
You can securely store plain text passwords in type 6 format in NVRAM using a command-line interface (CLI). Type 6 passwords are encrypted. Although the encrypted passwords can be seen or retrieved, it is difficult to decrypt them to find out the actual password. Use the keyconfig-keypassword-encryptioncommand with the passwordencryptionaescommand to configure and enable the password (symmetric cipher Advanced Encryption Standard [AES] is used to encrypt the keys). The password (key) configured using the keyconfig-keypassword-encryption command is the master encryption key that is used to encrypt all other keys in the router.
If you configure the passwordencryptionaescommand without configuring the keyconfig-keypassword-encryptioncommand, the following message is printed at startup or during any nonvolatile generation (NVGEN) process, such as when the showrunning-config or copyrunning-configstartup-config commands have been configured:
“Can not encrypt password. Please configure a configuration-key with ‘key config-key’”
Note
For Cisco 836 routers, please note that support for Advanced Encryption Standard (AES) is available only on IP plus images.
Changing a Password
If the password (master key) is changed, or reencrypted, using the keyconfig-keypassword-encryptioncommand), the list registry passes the old key and the new key to the application modules that are using type 6 encryption.
Deleting a Password
If the master key that was configured using the keyconfig-keypassword-encryptioncommand is deleted from the system, a warning is printed (and a confirm prompt is issued) that states that all type 6 passwords will become useless. As a security measure, after the passwords have been encrypted, they will never be decrypted in the Cisco IOS software. However, passwords can be reencrypted as explained in the previous paragraph.
Caution
If the password configured using the keyconfig-keypassword-encryptioncommand is lost, it cannot be recovered. The password should be stored in a safe location.
Unconfiguring Password Encryption
If you later unconfigure password encryption using the nopasswordencryptionaes command, all existing type 6 passwords are left unchanged, and as long as the password (master key) that was configured using the keyconfig-keypassword-encryptioncommand exists, the type 6 passwords will be decrypted as and when required by the application.
Storing Passwords
Because no one can “read” the password (configured using the keyconfig-keypassword-encryptioncommand), there is no way that the password can be retrieved from the router. Existing management stations cannot “know” what it is unless the stations are enhanced to include this key somewhere, in which case the password needs to be stored securely within the management system. If configurations are stored using TFTP, the configurations are not standalone, meaning that they cannot be loaded onto a router. Before or after the configurations are loaded onto a router, the password must be manually added (using the keyconfig-keypassword-encryptioncommand). The password can be manually added to the stored configuration but is not recommended because adding the password manually allows anyone to decrypt all passwords in that configuration.
Configuring New or Unknown Passwords
If you enter or cut and paste cipher text that does not match the master key, or if there is no master key, the cipher text is accepted or saved, but an alert message is printed. The alert message is as follows:
“ciphertext>[for username bar>] is incompatible with the configured master key.”
If a new master key is configured, all the plain keys are encrypted and made type 6 keys. The existing type 6 keys are not encrypted. The existing type 6 keys are left as is.
If the old master key is lost or unknown, you have the option of deleting the master key using the nokeyconfig-keypassword-encryptioncommand. Deleting the master key using the nokeyconfig-keypassword-encryptioncommand causes the existing encrypted passwords to remain encrypted in the router configuration. The passwords will not be decrypted.
Examples
The following example shows that a type 6 encrypted preshared key has been enabled:
Router (config)# password encryption aes
Related Commands
Command
Description
keyconfig-keypassword-encryption
Stores a type 6 encryption key in private NVRAM.
password logging
Provides a log of debugging output for a type 6 password operation.
password logging
To get a log of debugging output for a type 6 password operation, use the passwordloggingcommand in global configuration mode. To disable the debugging, use the no form of this command.
passwordlogging
nopasswordlogging
Syntax Description
This command has no arguments or keywords.
Command Default
Debug logging is not enabled.
Command Modes
Global Configuration #
Command History
Release
Modification
12.3(2)T
This command was introduced.
12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.2(33)SRA
This command was integrated into Cisco IOS release 12.(33)SRA.
Examples
The following example shows that debug logging is configured:
Router# password logging
Related Commands
Command
Description
keyconfig-keypassword-encryption
Stores an encryption key in private NVRAM.
password encryption aes
Enables a type 6 encrypted preshared key.
pattern (parameter-map)
To configure a matching pattern that specifies a list of domains, URL keywords, or URL metacharacters that must be allowed or blocked by the local URL filtering, use the
pattern command in parameter-map type inspect configuration mode. To remove the matching pattern, use the
no form of this command.
patternexpression
nopatternexpression
Syntax Description
expression
Matching pattern argument that refers to a domain name, URL keyword, URL metacharacter entry, or a URL keyword and URL metacharacter combination.
Command Default
No pattern is created for the parameter map.
Command Modes
Parameter-map type inspect configuration (config-profile)
Command History
Release
Modification
12.4(15)XZ
This command was introduced.
12.4(20)T
This command was integrated into Cisco IOS Release 12.4(20)T.
Cisco IOS XE Release 3.2S
This command was integrated into Cisco IOS XE Release 3.2S.
Usage Guidelines
A matching pattern expression is configured for a parameter map created by the
parameter-maptyperegex or the
parameter-maptypeurlf-glob command.
In a pattern expression, the characters /, {, and } are not allowed. The question mark (?) character is not allowed because it is reserved for the CLI help function. The asterisk (*) character is not allowed at the beginning of a pattern.
For URL pattern matching, the period (.) character is interpreted as a dot and not as a wildcard entry that represents a single character, as is the case with regular expression pattern matching. Any character in the host or domain name can be allowed or blocked through URL filtering.
A URL keyword is a complete word that comes after the domain name and is between the forward slash (/) path delimiters. For example, in the URL http://www.example.com/hack/123.html, only “hack” is treated as a keyword. The entire keyword in the URL must match a pattern. For example, if you have configured a pattern named “hack,” the URL www.example.com/hacksite/123.html will not match the pattern. To match the URL, your pattern must have “hacksite.”
URL metacharacters allow pattern matching of single characters or ranges of characters to URLs, similar to the way a UNIX glob expression works. URL metacharacters are described in the following table.
Table 6 URL Metacharacters for URL Pattern Matching
Character
Description
*
Asterisk—matches any sequence of 0 or more characters.
[abc]
Character class—matches any character within brackets. The character matching is case sensitive. For example,
[abc] matches a, b, or c.
[a-c ]
Character range class—matches any character in a specified range. The character matching is case sensitive. For example,
[a-z] matches any lowercase letter. You can also mix characters and ranges; for example,
[abcq-z] matches a, b, c, q, r, s, t, u, v, w, x, y, z, and so does
[a-cq-z].
Note
The dash (-) character is matched only if it is the last or the first character within brackets. For example,
[abc-] or
[-abc].
[0-9]
Numerical range class—matches any number within brackets. For example, [0-9] matches 0, 1, 2, 3, 4, 5, 6, 7, 8, or 9.
URL metacharacters are combined with domain names and URL keywords for pattern matching. For example, pattern *.example.com will match the domain name www.example.com and pattern www.[ey]xample.com can be used to block both www.example.com and www.yxample.com. Also, you can use pattern www.example[0-9][0-9].com to block www.example01.com, www.example33.com, www.example99.com, and so on. You can combine a keyword and a metacharacter and create a matching pattern to block a URL. For example, you can use pattern hack* to block www.example.com/hacksite/123.html.
When you configure the
parameter-map type regex
command and then the
pattern command, patterns that are specified in the
pattern command are used as filters in General Packet Radio Service (GPRS) Tunneling Protocol (GTP) classes.
Examples
The following example shows how to configure a parameter map for trusted domains:
The following example shows how to configure a parameter map that specifies the URL metacharacters to be blocked:
Device(config)# parameter-map type urlf-glob metacharacter-param
Device(config-profile)# pattern www.example[4-9].com
The following example shows how to specify a case-insensitive pattern that matches multiple variants of the string “hello”:
Device(config)# parameter-map type regex body-regex
Device(config-profile)# pattern ".*[Hh][Ee][Ll][Ll][Oo]"
The following example shows an error message that appears on the console when an asterisk (*) character is specified at the beginning of a pattern:
Device(config)# parameter-map type regex gtp-map
Device(config-profile)# pattern *.gprs.com
%Invalid first char + or * in regex pattern
Related Commands
Command
Description
class-maptypeurlfilter
Creates a class map that specifies the traffic to which a URL filtering policy applies.
parameter-map type regex
Configures a regex parameter map that matches a specific regular expression pattern and enters parameter-map type inspect configuration mode.
parameter-maptypeurlf-glob
Creates or modifies a parameter map that specifies a list of domains, URL keywords, or URL metacharacters that should be allowed or blocked by local URL filtering and enters parameter-map type inspect configuration mode.
peer
To define a static peer for the FlexVPN client, use the
peer command in IKEv2 FlexVPN client profile configuration mode. To remove the peer, use the
no form of this command.
This command was modified. Support for IPv6 addresses and hostnames was added.
Cisco IOS XE Release 3.7S
This command was integrated into Cisco IOS XE Release 3.7S.
Usage Guidelines
Before you enable this command, you must configure the
crypto ikev2 client flexvpn command.
Peers are ordered by preference; the lower the sequence number, the higher the preference. If a peer has the same priority as an existing peer, the old peer is overridden. Sequence numbering is ideal for easy management.
If a peer is referenced by FQDN, the peer is resolved during configuration unless the
dynamic keyword is used to resolve the peer when the peer chooses to connect.
A peer address can be used only if it can be routed in the tunnel VRF of the tunnel interface.
Examples
The following example shows how to define a static peer:
To configure a Group Domain of Interpretation (GDOI) redundant peer key server, use thepeeraddressipv4command in GDOI redundancy configuration mode. To remove the peer key server that was configured, use the no form of this command.
peeraddressipv4ip-address
nopeeraddressipv4ip-address
Syntax Description
ip-address
IP address of the peer key server.
Command Default
(Redundancy does not function correctly if at least one peer is not configured under the local key server configuration on a key server.)
This command was implemented on the Cisco ASR 1000 series routers.
Usage Guidelines
For redundancy between key servers to operate correctly, there have to be at least two key servers in a redundant group. Therefore, at least one other peer must be defined on a key server using the peeraddressipv4 command. The local key server sets up an Internet Key Exchange (IKE) session with the peer that is defined using this command and proceeds to communicate using IKE informational messages to complete the election process using the specified IP address of the peer.
Examples
The following example shows that two peer key servers have been configured: 10.41.2.5 and 10.33.5.6.
Sets the source address, which is used as the source for packets originated by the local key server.
local priority
Sets the local key server priority.
redundancy
Enters GDOI redundancy configuration mode and allows for key server redundancy.
serverlocal
Designates a device as a GDOI key server and enters GDOI local server configuration mode.
peer (IKEv2 keyring)
To define a peer or a peer group for the Internet Key Exchange Version 2 (IKEv2) keyring, use the
peer command in IKEv2 keyring configuration mode. To remove the peer, use the
no form of this command.
This command was integrated into Cisco IOS XE Release 3.3S.
15.2(4)S
This command was integrated into Cisco IOS Release 15.2(4)S.
Usage Guidelines
Use this command to define the name of a peer or peer group. This command enters IKEv2 keyring peer configuration mode. A peer subblock identifies a peer or peer-group using identity, hostname or address statements. A peer subblock must have atleast one statement identifying a peer or peer group. A peer subblock can have a single statement of each type identifying a peer or peer group. A peer subblock can have a single key or key-pair.
Examples
The following example shows how to configure an IKEv2 keyring with multiple peer subblocks:
Specifies the IPv4 address or the range of the peers in IKEv2 keyring.
cryptoikev2keyring
Defines an IKEv2 keyring.
description(ikev2 keyring)
Describes an IKEv2 peer or a peer group for the IKEv2 keyring.
hostname (ikev2 keyring)
Specifies the hostname for the peer in the IKEv2 keyring.
identity (ikev2 keyring)
Identifies the peer with IKEv2 types of identity.
pre-shared-key
(ikev2keyring)
Defines a preshared key for the IKEv2 peer.
peer reactivate
To enable the reactivate primary peer feature, use the
peer reactivate command in IKEv2 FlexVPN client profile configuration mode. To disable the feature, use the
no form of this command
peerreactivate
no peerreactivate
Command Default
The peer reactivate feature is disabled by default.
This command was integrated into Cisco IOS XE Release 3.7S.
Usage Guidelines
Before you enable this command, you must configure the
crypto ikev2 client flexvpn command.
The peer reactivate feature provides the ability to establish connection with a new peer. If a FlexVPN client is connected to a peer with a lower priority and the track object comes UP for another peer associated with this track object having a higher priority, the existing session is brought down and the connection is established with the new peer.
For example, there are two peers: peer1 with sequence 0 associated with track1 and peer 2 with sequence 1. If the FlexVPN client is connected to peer 2 and track 1 associated with peer 1 comes up, FlexVPN client deletes the existing session and brings up a new session with peer1. If the peer reactivate feature is not configured, FlexVPN continues the session with peer 2 even though the track 1 associated with peer 1 comes up.
Note
If a session with peer reactivate feature is UP and the feature is deleted, the session is not terminated. However, if a session without peer reactivate is UP and the feature is enabled, the session is terminated.
Examples
The following example shows how to enable the peer reactivate feature:
To enable aggressive aging of all firewall sessions listed in the firewall session table (the "box"), use the
per-box aggressive-aging
command in parameter-map type inspect configuration mode. To disable the aggressive aging of global firewall sessions, use the
no
form of this command.
per-box aggressive-aging high
{ valuelowvalue | percentpercentlow percentpercent }
no per-box aggressive-aging high
{ valuelowvalue | percentpercentlow percentpercent }
Syntax Description
high
Specifies the high watermark for aggressive aging.
value
High watermark in absolute values. Valid values are from 1 to 4294967295.
low
Specifies the low watermark values for aggressive aging.
value
Low watermark in absolute values. Valid values are from 1 to 4294967295.
percentpercent
Specifies the high watermark percentage for aggressive aging. Valid values are from 1 to 100.
low percentpercent
Specifies the low watermark percentage for aggressive aging. Valid values are from 1 to 100.
Command Default
The aggressive aging of firewall sessions is not enabled.
Command Modes
Parameter-map type inspect configuration (config-profile)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
The Aggressive Aging feature allows the firewall to aggressively age out sessions to make room for new sessions. Per-box aggressive aging protects the firewall session table from getting filled. When you enable aggressive aging on a router, only active sessions on the router are deleted.
You must configure the
parameter-map type inspect global
command before you configure the
per-box aggressive-aging
command.
Examples
The following example shows how to enable the aggressive aging of firewall sessions:
Router(config)# parameter-map type inspect global
Router(config-profile)# per-box aggressive-aging high percent 75 low percent 35
Router(config-profile)# end
Related Commands
Command
Description
max-incomplete aggressive-aging
Configures the aggressive aging of half-opened firewall sessions for inspect parameter maps.
parameter-map type inspect global
Configures a global parameter map and enters parameter-map type inspect configuration mode.
per-box max-incomplete
To configure the half-opened session limit for each session listed in the firewall session table (the "box"), use the
per-box max-incomplete command in parameter-map type inspect configuration mode. To disable the configuration, use the
no form of this command.
per-box max-incomplete
[ icmp
| tcp
| udp ]
number
no per-box max-incomplete
[ icmp
| tcp
| udp ]
number
Syntax Description
icmp
(Optional) Specifies the maximum half-opened Internet Control Message Protocol (ICMP) connections for the firewall session table.
tcp
(Optional) Specifies the maximum half-opened TCP connections for the firewall session table.
udp
(Optional) Specifies the maximum half-opened UDP connections for the firewall session table.
number
Number of half-opened sessions. Valid values are from 1 to 4294967295.
Command Default
The half-opened session limit is not set.
Command Modes
Parameter-map type inspect configuration (config-profile)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
A half-opened session is a session that has not reached the established state.
You must configure the
parameter-map type inspect global
command before you configure the
per-box max-incomplete
command.
Examples
The following example shows how to configure the maximum half-opened session limit to 3456:
Router(config)# parameter-map type inspect global
Router(config-profile)# per-box max-incomplete 3456
Router(config-profile)# end
Related Commands
Command
Description
max-incomplete (inspect-vrf)
Configures the half-opened session limit for a VRF.
parameter-map type inspect global
Configures a global parameter map and enters parameter-map type inspect configuration mode.
per-box max-incomplete aggressive-aging
To configure aggressive aging of half-opened firewall sessions listed in the firewall session table (the "box"), use the
per-box max-incomplete aggressive-aging
command in parameter-map type inspect configuration mode. To disable the configuration, use the
no form of this command.
no per-box max-incompletenumberaggressive-aginghigh
{ valuelowvalue | percentpercentlow percentvalue }
Syntax Description
number
Number of half-opened sessions. Valid values are from 1 to 4294967295.
high
Specifies the high watermark for aggressive aging.
value
High watermark in absolute values. Valid values are from 1 to 4294967295.
low
Specifies the low watermark values for aggressive aging.
value
Low watermark in absolute values. Valid values are from 1 to 4294967295.
percentpercent
Specifies the high watermark percentage for aggressive aging. Valid values are from 1 to 100.
low percentpercent
Specifies the low watermark percentage for aggressive aging. Valid values are from 1 to 100.
Command Default
The aggressive aging of half-opened sessions is not configured.
Command Modes
Parameter-map type inspect configuration (config-profile)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
The Aggressive Aging feature allows the firewall to aggressively age out half-opened sessions to make room for new sessions. Per-box aggressive aging protects the firewall session table from getting filled with sessions. When you enable aggressive aging on a router, only active sessions on the router are deleted.
You must configure the
parameter-map type inspect global
command before you configure the
per-box max-incomplete aggressive-agingcommand.
Examples
The following example shows how to configure aggressive aging of half-opened sessions in a firewall session table:
Router(config)# parameter-map type inspect global
Router(config-profile)# per-box max-incomplete 3456 aggressive-aging high 7890 low 5436
Router(config-profile)# end
Related Commands
Command
Description
max-incomplete aggressive-aging
Configures aggressive aging of half-opened firewall sessions for inspect parameter maps.
parameter-map type inspect global
Configures a global parameter map and enters parameter-map type inspect configuration mode.
per-box tcp syn-flood limit
To configure the TCP synchronization (SYN) flood limit for each session listed in the firewall session table (the "box), use the
per-box tcp syn-flood limit command in parameter-map type inspect configuration mode. To disable the TCP SYN flood limit configuration, use the
no form of this command.
per-box tcp syn-flood limitnumber
no per-box tcp syn-flood limitnumber
Syntax Description
number
The number of half-opened connections that triggers TCP SYN cookie protection. Valid values are from 1 to 4294967295.
Command Default
The TCP SYN flood limit is not configured.
Command Modes
Parameter-map type inspect configuration (config-profile)
Command History
Release
Modification
Cisco IOS XE Release 3.4S
This command was introduced.
Usage Guidelines
Per-box refers to the entire firewall session table.
TCP SYN-flooding attacks are a type of denial-of-service (DoS) attack. TCP SYN-flooding can take up all resources on a firewall or an end host, thereby causing denials of service to legitimate traffic. The Firewall TCP SYN Cookie feature protects the firewall from TCP SYN-flooding attacks. To prevent TCP SYN flooding on a firewall and the end hosts behind the firewall, configure the Firewall TCP SYN Cookie feature.
A half-opened session is a session that has not reached the established state.
You must configure the
parameter-map type inspect global command before you configure the
per-box tcp syn-flood limit
command.
Examples
The following example shows how to configure the TCP SYN flood limit to 3400:
Router(config)# parameter-map type inspect global
Router(config-profile)# per-box tcp syn-flood limit 3400
Router(config-profile)# end
Related Commands
Command
Description
parameter-map type inspect global
Configures a global parameter map and enters parameter-map type inspect configuration mode.
permit
To set conditions in named IP access list or object group access control list (OGACL) that will permit packets, use the
permit command in the appropriate configuration mode. To remove a condition from an IP access list or an OGACL, use the
no form of this command.
Name or number of a protocol; valid values are; valid values are
ahp,
eigrp,
esp,
gre,
icmp,
igmp,
igrp,
ip,
ipinip,
nos,
ospf,
object-group,
tcp,
pcp,
pim,
udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including Internet Control Message Protocol (ICMP), TCP, and User Datagram Protocol (UDP), use the keyword
ip. See the “Usage Guidelines” section for additional qualifiers.
source-addr
(Optional) Number of the network or host from which the packet is being sent in a 32-bit quantity in four-part, dotted-decimal format.
source-wildcard
(Optional) Wildcard bits to be applied to the source in four-part, dotted-decimal format. Place ones in the bit positions you want to ignore.
any
Specifies any source or any destination host as an abbreviation for the
source-addror
destination-addrvalueand the
source-wildcard or
destination-wildcard value of 0.0.0.0 255.255.255.255.
hostaddressname
Specifies the source or destination address and name of a single host.
object-groupobject-group-name
Specifies the source or destination name of the object group.
destination-addr
Number of the network or host to which the packet is being sent in a 32-bit quantity in four-part, dotted-decimal format.
destination-wildcard
Wildcard bits to be applied to the destination in a 32-bit quantity in four-part, dotted-decimal format. Place ones in the bit positions you want to ignore.
object-groupdest-addr-group-name
Specifies the destination address group name.
dscpdscp-value
(Optional) Matches the packets with the given Differentiated Services Code Point (DSCP) value; see the “Usage Guidelines” section for valid values.
precedenceprecedence-value
(Optional) Specifies the precedence filtering level for packets; valid values are a number from 0 to 7 or by a name. See the “Usage Guidelines” section for a list of valid names.
fragmentsfragment-value
(Optional) Applies the access list entry to noninitial fragments of packets; the fragment is either permitted or denied accordingly. For more details about the
fragments keyword, see the "Access List or OGACL Processing of Fragments" and “Fragments and Policy Routing” sections in the “Usage Guidelines” section.
optionoption-value
(Optional) Matches the packets with the given IP options value number; see the “Usage Guidelines” section for valid values.
reflectaccess-list-name
(Optional) Create reflexive access list entry.
time-rangetime-range-value
(Optional) Specifies a time-range entry name.
ttlmatch-valuettl-value
(Optional) Specifies the match packets with given TTL value; see the “Usage Guidelines” section for valid values.
tostos-value
(Optional) Specifies the service filtering level for packets; valid values are a number from 0 to 15 or by a name as listed in the “Usage Guidelines” section of the
access-list(IP extended) command.
timeoutmax-time
Specifies the maximum time for a reflexive ACL to live; the valid values are from 1 to 2147483 seconds.
log
(Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the
loggingconsole command.)
The message for a standard list includes the access list number, whether the packet was permitted or denied, the source address, and the number of packets.
The message for an extended list includes the access list number; whether the packet was permitted or denied; the protocol; whether the protocol was TCP, UDP, ICMP, or a number; and, if appropriate, the source and destination addresses and port numbers and the user-defined cookie or router-generated hash value.
For both standard and extended lists, the message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval.
The logging facility might drop some logging message packets if there are too many to be handled or if there is more than one logging message to be handled in 1 second. This behavior prevents the router from reloading because of too many logging packets. Therefore, the logging facility should not be used as a billing tool or an accurate source of the number of matches to an access list.
After you specify the
log keyword (and the associated
word argument), you cannot specify any other keywords or settings for this command.
log-value
(Optional) User-defined cookie appended to the log message. The cookie:
cannot be more than characters
cannot start with hexadecimal notation (such as 0x)
cannot be the same as, or a subset of, the following keywords:
reflect,
fragment,
time-range
must contain alphanumeric characters only
The user-defined cookie is appended to the access control entry (ACE) syslog entry and uniquely identifies the ACE, within the access control list, that generated the syslog entry.
log-inputlog-input-value
(Optional) Matches the log against this entry, including the input interface.
After you specify the
log-input keyword (and the associated
log-input-value argument), you cannot specify any other keywords or settings for this command.
tcp
Specifies the TCP protocol.
udp
Specifies the UDP protocol.
object-groupsource-obj-group
Specifies the source address group name.
port-match-criteriaport-number
Matches only packets on a given port number; see the “Usage Guidelines” section for valid values.
Command Default
There are no specific conditions under which a packet passes the access list.
Command Modes
Standard access-list configuration (config-std-nacl)
Extended access-list configuration (config-ext-nacl)
Command History
Release
Modification
12.4(20)T
This command was introduced.
12.4(22)T
The
word argument was added to the
log and
log-input keywords.
Usage Guidelines
Use this command following the
ipaccess-list command to define the conditions under which a packet passes the access list.
In Cisco IOS 15.0(1)M and later Releases, to remove the log entry from the
permitipanyanylog command, use the
permitipanyany command.
In releases earlier than Cisco IOS Release15.0(1)M, to remove thelog option from the
permitipanyanylog command, use the
nopermitipanyanylog and the
permitipanyany commands.
In Cisco IOS 15.0(1)M and later releases, to remove the log entry and the user-defined cookie, use the
permitipanyany [log-value] command.
In releases earlier than Cisco IOS Release 15.0(1)M, to remove the log entry and user-defined cookies, use thenopermitipanyanylog [log-value] and
permitipanyany commands.
Access List or OGACL Processing of Fragments
The behavior of access-list entries regarding the use or lack of the
fragments keyword are summarized in the table below:
Table 7 Access list or OGACL Processing of Fragments
If the Access-List Entry Has...
Then...
...no
fragments keyword (the default behavior), and assuming all of the access-list entry information matches,
For an access-list entry containing only Layer 3 information:
The entry is applied to nonfragmented packets, initial fragments, and noninitial fragments.
For an access list entry containing Layer 3 and Layer 4 information:
The entry is applied to nonfragmented packets and initial fragments:
If the entry is a
permitstatement, the packet or fragment is permitted.
If the entry is a
denystatement, the packet or fragment is denied.
The entry is also applied to noninitial fragments in the following manner. Because noninitial fragments contain only Layer 3 information, only the Layer 3 portion of an access-list entry can be applied. If the Layer 3 portion of the access-list entry matches, and
If the entry is a
permitstatement, the noninitial fragment is permitted.
If the entry is a
deny statement, the next access-list entry is processed.
Note
The
deny statements are handled differently for noninitial fragments versus nonfragmented or initial fragments.
...the
fragments keyword, and assuming all of the access-list entry information matches,
Note
The access-list entry is applied only to noninitial fragments. The
fragments keyword cannot be configured for an access-list entry that contains any Layer 4 information.
Ensure that you do not add the
fragments keyword to every access list entry because the first fragment of the IP packet is considered a nonfragment and is treated independently of the subsequent fragments. An initial fragment will not match an access list
permit or
deny entry that contains the
fragmentskeyword, the packet is compared to the next access list entry, and so on, until it is either permitted or denied by an access list entry that does not contain the
fragments keyword. Therefore, you may need two access list entries for every
deny entry. The first
deny entry of the pair will not include the
fragments keyword, and applies to the initial fragment. The second
deny entry of the pair will include the
fragments keyword and applies to the subsequent fragments. In the cases where there are multiple
deny access list entries for the same host but with different Layer 4 ports, a single
deny access-list entry with the
fragments keyword for that host is all that needs to be added. Thus all the fragments of a packet are handled in the same manner by the access list.
Packet fragments of IP datagrams are considered individual packets and each counts individually as a packet in access list accounting and access list violation counts.
Note
The
fragmentskeyword cannot solve all cases involving access lists and IP fragments.
Fragments and Policy Routing
Fragmentation and the fragment control feature affect policy routing if the policy routing is based on the
matchipaddress command and the access list had entries that match on Layer 4 through 7 information. It is possible that noninitial fragments pass the access list and are policy routed, even if the first fragment was not policy routed or the reverse.
By using the
fragments keyword in access list entries as described earlier, a better match between the action taken for initial and noninitial fragments can be made and it is more likely policy routing will occur as intended.
The
source-addr and
destination-addrarguments allow you to create an object group based on a source or destination group. The following keywords and arguments are available:
dscpdscp-value--(Optional) Matches the packets with the given DSCP value; the valid values are as follows:
0 to
63--Differentiated services codepoint value
af11--Matches the packets with AF11 dscp (001010)
af12--Matches the packets with AF12 dscp (001100)
af13--Matches the packets with AF13 dscp (001110)
af21--Matches the packets with AF21 dscp (010010)
af22--Matches the packets with AF22 dscp (010100)
af23--Matches the packets with AF23 dscp (010110)
af31--Matches the packets with AF31 dscp (011010)
af32--Matches the packets with AF32 dscp (011100)
af33--Matches the packets with AF33 dscp (011110)
af41--Matches the packets with AF41 dscp (100010)
af42--Matches the packets with AF42 dscp (100100)
af43--Matches the packets with AF43 dscp (100110)
cs1--Matches the packets with CS1 (precedence 1) dscp (001000)
cs2--Matches the packets with CS2 (precedence 2) dscp (010000)
cs3--Matches the packets with CS3 (precedence 3) dscp (011000)
cs4--Matches the packets with CS4 (precedence 4) dscp (100000)
cs5--Matches the packets with CS5 (precedence 5) dscp (101000)
cs6--Matches the packets with CS6 (precedence 6) dscp (110000)
cs7--Matches the packets with CS7 (precedence 7) dscp (111000)
default--Matches the packets with default dscp (000000)
ef--Matches the packets with EF dscp (101110)
fragments--(Optional) Checks for noninitial fragments. See the table above.
log--(Optional) Logs the matches against this entry.
log-input--(Optional) Logs the matches against this entry, including the input interface.
optionoption-value--(Optional) Matches the packets with given IP Options value. The valid values are as follows:
0 to 255--IP Options value.
add-ext--Matches the packets with Address Extension Option (147).
any-options--Matches the packets with ANY Option.
com-security--Matches the packets with Commercial Security Option (134).
dps--Matches the packets with Dynamic Packet State Option (151).
encode--Matches the packets with Encode Option (15).
eool--Matches the packets with End of Options (0).
ext-ip--Matches the packets with Extended IP Option (145).
ext-security--Matches the packets with Extended Security Option (133).
finn--Matches the packets with Experimental Flow Control Option (205).
imitd--Matches the packets with IMI Traffic Desriptor Option (144).
lsr--Matches the packets with Loose Source Route Option (131).
match-all--Matches the packets if all specified flags are present.
match-any--Matches the packets if any specified flag is present.
mtup--Matches the packets with MTU Probe Option (11).
mtur--Matches the packets with MTU Reply Option (12).
no-op--Matches the packets with No Operation Option (1).
psh--Match the packets on the PSH bit.
nsapa--Matches the packets with NSAP Addresses Option (150).
reflect--Creates reflexive access list entry.
record-route--Matches the packets with Record Route Option (7).
rst--Matches the packets on the RST bit.
router-alert--Matches the packets with Router Alert Option (148).
sdb--Matches the packets with Selective Directed Broadcast Option (149).
security--Matches the packets with Basic Security Option (130).
ssr--Matches the packets with Strict Source Routing Option (137).
stream-id--Matches the packets with Stream ID Option (136).
syn--Matches the packets on the SYN bit.
timestamp--Matches the packets with Time Stamp Option (68).
traceroute--Matches the packets with Trace Route Option (82).
ump--Matches the packets with Upstream Multicast Packet Option (152).
visa--Matches the packets with Experimental Access Control Option (142).
zsu--Matches the packets with Experimental Measurement Option (10).
precedenceprecedence-value--(Optional) Matches the packets with given precedence value; the valid values are as follows:
0 to 7--Precedence value.
critical--Matches the packets with critical precedence (5).
flash--Matches the packets with flash precedence (3).
flash-override--Matches the packets with flash override precedence (4).
immediate--Matches the packets with immediate precedence (2).
internet--Matches the packets with internetwork control precedence (6).
network--Matches the packets with network control precedence (7).
priority--Matches the packets with priority precedence (1).
routine--Matches the packets with routine precedence (0).
reflectacl-name-- (Optional) Creates reflexive access list entry.
ttlmatch-valuettl-value-- (Optional) Specifies the match packets with given TTL value; the valid values are as follows:
eq--Matches packets on a given TTL number.
gt--Matches packets with a greater TTL number.
lt--Matches packets with a lower TTL number.
neq--Matches packets not on a given TTL number.
range--Matches packets in the range of TTLs.
time-rangetime-range-value--(Optional) Specifies a time-range entry name.
tos--(Optional) Matches the packets with given ToS value; the valid values are as follows:
0 to 15--Type of service value.
max-reliability--Matches the packets with the maximum reliable ToS (2).
max-throughput--Matches the packets with the maximum throughput ToS (4).
min-delay--Matches the packets with the minimum delay ToS (8).
min-monetary-cost--Matches the packets with the minimum monetary cost ToS (1).
normal--Matches the packets with the normal ToS (0).
timeoutmax-time-- (Optional) Specifies the maximum time for a reflexive ACL to live; the valid values are from 1 to 2147483 seconds.
Examples
The following example shows how to create an access list that permits packets from the users in my_network_object_group if the protocol ports match the ports specified in my_network_object_group:
The following example shows how to create an access list that permits packets from the users in my_network_object_group if the protocol ports match the ports specified in my_network_object_group. In addition, logging is enabled for the access list, and all syslog entries for this ACE include the word MyServiceCookieValue:
Sets conditions in a named IP access list or OGACL that will deny packets.
ipaccess-group
Applies an ACL or OGACL to an interface or a service policy map.
ipaccess-list
Defines an IP access list or OGACL by name or number.
ipaccess-listlogginghash-generation
Enables hash value generation for ACE syslog entries.
object-groupnetwork
Defines network object groups for use in OGACLs.
object-groupservice
Defines service object groups for use in OGACLs.
showipaccess-list
Displays the contents of IP access lists or OGACLs.
showobject-group
Displays information about object groups that are configured.
permit (Catalyst 6500 series switches)
To set conditions for a named IP access list, use the
permit command in access-list configuration mode. To remove a condition from an access list, use the
no form of this command.
permitprotocol
{ source-addrsource-wildcard | addrgroupobject-group-name | any | host
{ address | name } }
{ destination-addrdestination-wildcard | addrgroupobject-group-name | any | host
{ address | name } }
Name or number of a protocol; valid values are
eigrp,
gre,
icmp,
igmp,
igrp,
ip,
ipinip,
nos,
ospf,
tcp, or
udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including Internet Control Message Protocol (ICMP), TCP, and User Datagram Protocol (UDP), use the keyword
ip. See the “Usage Guidelines” section for additional qualifiers.
source-addr
Number of the network or host from which the packet is being sent in a 32-bit quantity in four-part, dotted-decimal format.
source-wildcard
Wildcard bits to be applied to source in four-part, dotted-decimal format. Place ones in the bit positions you want to ignore.
addrgroup
object-group-name
Specifies the source or destination name of the object group.
any
Specifies any source or any destination host as an abbreviation for the
source-addror
destination-addrvalueand the
source-wildcard or
destination-wildcard value of 0.0.0.0 255.255.255.255.
hostaddress
Specifies the source or destination address of a single host.
hostname
Specifies the source or destination name of a single host.
tcp
Specifies the TCP protocol.
udp
Specifies the UDP protocol.
addrgroup
source-addr-group-name
Specifies the source address group name.
destination-addr
Number of the network or host to which the packet is being sent in a 32-bit quantity in four-part, dotted-decimal format.
destination-wildcard
Wildcard bits to be applied to the destination in a 32-bit quantity in four-part, dotted-decimal format. Place ones in the bit positions you want to ignore.
eqport
Matches only packets on a given port number; see the “Usage Guidelines” section for valid values.
gtport
Matches only the packets with a greater port number; see the “Usage Guidelines” section for valid values.
ltport
Matches only the packets with a lower port number; see the “Usage Guidelines” section for valid values.
neqport
Matches only the packets that are not on a given port number; see the “Usage Guidelines” section for valid values.
portgroupsrcport-group-name
Specifies the source port object group name.
addrgroup
dest-addr-group-name
Specifies the destination address group name.
portgroupdestport-group-name
Specifies the destination port object group name.
dscptype
(Optional) Matches the packets with the given Differentiated Services Code Point (DSCP) value; see the “Usage Guidelines” section for valid values.
fragments
(Optional) Applies the access list entry to noninitial fragments of packets; the fragment is either permitted or denied accordingly. For more details about the
fragments keyword, see the “Access List Processing of Fragments” and “Fragments and Policy Routing” sections in the “Usage Guidelines” section.
optionoption
(Optional) Matches the packets with the given IP options value number; see the “Usage Guidelines” section for valid values.
precedenceprecedence
(Optional) Specifies the precedence filtering level for packets; valid values are a number from 0 to 7 or by a name. See the “Usage Guidelines” section for a list of valid names.
time-rangetime-range-name
(Optional) Specifies a time-range entry name.
tostos
(Optional) Specifies the service filtering level for packets; valid values are a number from 0 to 15 or by a name as listed in the “Usage Guidelines” section of the
access-list(IP extended) command.
optionoption
(Optional) Matches packets with the IP options value; see the “Usage Guidelines” section for the valid values.
fragments
(Optional) Applies the access list entry to noninitial fragments of packets; the fragment is either permitted or denied accordingly. For more details about the
fragments keyword, see the “Access List Processing of Fragments” and “Fragments and Policy Routing” sections in the “Usage Guidelines” section.
log
(Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the
loggingconsole command.)
The message for a standard list includes the access list number, whether the packet was permitted or denied, the source address, and the number of packets, and if appropriate, the user-defined cookie or router-generated hash value.
The message for an extended list includes the access list number; whether the packet was permitted or denied; the protocol; whether the protocol was TCP, UDP, ICMP, or a number; and, if appropriate, the source and destination addresses and source and destination port numbers, and if appropriate, the user-defined cookie or router-generated hash value.
For both standard and extended lists, the message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval.
The logging facility might drop some logging message packets if there are too many to be handled or if there is more than one logging message to be handled in 1 second. This behavior prevents the router from reloading due to too many logging packets. Therefore, the logging facility should not be used as a billing tool or an accurate source of the number of matches to an access list.
After you specify the
log keyword (and the associated
word argument), you cannot specify any other keywords or settings for this command.
word
(Optional) User-defined cookie appended to the log message. The cookie:
cannot be more than characters
cannot start with hexadecimal notation (such as 0x)
cannot be the same as, or a subset of, the following keywords:
reflect,
fragment,
time-range
must contain alphanumeric characters only
The user-defined cookie is appended to the access control entry (ACE) syslog entry and uniquely identifies the ACE, within the access control list, that generated the syslog entry.
log-input
(Optional) Matches the log against this entry, including the input interface.
After you specify the
log-input keyword (and the associated
word argument), you cannot specify any other keywords or settings for this command.
Command Default
There are no specific conditions under which a packet passes the named access list.
Command Modes
Access-list configuration (config-ext-nacl)
Command History
Release
Modification
12.2(33)SXH
This command was introduced.
12.4(22)T
The
word argument was added to the
log and
log-input keywords.
Usage Guidelines
Use this command following the
ipaccess-list command to define the conditions under which a packet passes the access list.
The
portgroup keyword appears only when you configure an extended access list.
Access List Processing of Fragments
The behavior of access-list entries regarding the use or lack of the
fragments keyword are summarized in the table below:
Table 8 Access list Processing of Fragments
If the Access-List Entry Has...
Then...
...no
fragments keyword (the default behavior), and assuming all of the access-list entry information matches,
For an access-list entry containing only Layer 3 information:
The entry is applied to nonfragmented packets, initial fragments, and noninitial fragments.
For an access list entry containing Layer 3 and Layer 4 information:
The entry is applied to nonfragmented packets and initial fragments:
If the entry is a
permitstatement, the packet or fragment is permitted.
If the entry is a
denystatement, the packet or fragment is denied.
The entry is also applied to noninitial fragments in the following manner. Because noninitial fragments contain only Layer 3 information, only the Layer 3 portion of an access-list entry can be applied. If the Layer 3 portion of the access-list entry matches, and
If the entry is a
permitstatement, the noninitial fragment is permitted.
If the entry is a
deny statement, the next access-list entry is processed.
Note
The
deny statements are handled differently for noninitial fragments versus nonfragmented or initial fragments.
...the
fragments keyword, and assuming all of the access-list entry information matches,
Note
The access-list entry is applied only to noninitial fragments.The
fragments keyword cannot be configured for an access-list entry that contains any Layer 4 information.
Be aware that you should not simply add the
fragments keyword to every access list entry because the first fragment of the IP packet is considered a nonfragment and is treated independently of the subsequent fragments. An initial fragment will not match an access list
permit or
deny entry that contains the
fragmentskeyword, the packet is compared to the next access list entry, and so on, until it is either permitted or denied by an access list entry that does not contain the
fragments keyword. Therefore, you may need two access list entries for every
deny entry. The first
deny entry of the pair will not include the
fragments keyword, and applies to the initial fragment. The second
deny entry of the pair will include the
fragments keyword and applies to the subsequent fragments. In the cases where there are multiple
deny access list entries for the same host but with different Layer 4 ports, a single
deny access-list entry with the
fragments keyword for that host is all that needs to be added. Thus all the fragments of a packet are handled in the same manner by the access list.
Packet fragments of IP datagrams are considered individual packets and each counts individually as a packet in access list accounting and access list violation counts.
Note
The
fragmentskeyword cannot solve all cases involving access lists and IP fragments.
Fragments and Policy Routing
Fragmentation and the fragment control feature affect policy routing if the policy routing is based on the
matchipaddress command and the access list had entries that match on Layer 4 through 7 information. It is possible that noninitial fragments pass the access list and are policy routed, even if the first fragment was not policy routed or the reverse.
By using the
fragments keyword in access list entries as described earlier, a better match between the action taken for initial and noninitial fragments can be made and it is more likely policy routing will occur as intended.
The
portgroupsrcport-groupnameorportgroupdestport-groupnamekeywords and arguments allow you to create an object group based on a source or destination group. The following keywords and arguments are available:
dscpvalue--(Optional) Matches the packets with the given DSCP value; the valid values are as follows:
0 to
63--Differentiated services codepoint value
af11--Matches the packets with AF11 dscp (001010)
af12--Matches the packets with AF12 dscp (001100)
af13--Matches the packets with AF13 dscp (001110)
af21--Matches the packets with AF21 dscp (010010)
af22--Matches the packets with AF22 dscp (010100)
af23--Matches the packets with AF23 dscp (010110)
af31--Matches the packets with AF31 dscp (011010)
af32--Matches the packets with AF32 dscp (011100)
af33--Matches the packets with AF33 dscp (011110)
af41--Matches the packets with AF41 dscp (100010)
af42--Matches the packets with AF42 dscp (100100)
af43--Matches the packets with AF43 dscp (100110)
cs1--Matches the packets with CS1(precedence 1) dscp (001000)
cs2--Matches the packets with CS2(precedence 2) dscp (010000)
cs3--Matches the packets with CS3(precedence 3) dscp (011000)
cs4--Matches the packets with CS4(precedence 4) dscp (100000)
cs5--Matches the packets with CS5(precedence 5) dscp (101000)
cs6--Matches the packets with CS6(precedence 6) dscp (110000)
cs7--Matches the packets with CS7(precedence 7) dscp (111000)
default--Matches the packets with default dscp (000000)
ef--Matches the packets with EF dscp (101110)
fragments--(Optional) Checks for noninitial fragments. See the table “Access List Processing of Fragments.”
log--(Optional) Logs the matches against this entry.
log-input--(Optional) Logs the matches against this entry, including the input interface; the valid values are as follows:
optionoption--(Optional) Matches the packets with given IP Options value. The valid values are as follows:
0 to 255--IP Options value.
add-ext--Matches the packets with Address Extension Option (147).
any-options--Matches the packets with ANY Option.
com-security--Matches the packets with Commercial Security Option (134).
dps--Matches the packets with Dynamic Packet State Option (151).
encode--Matches the packets with Encode Option (15).
eool--Matches the packets with End of Options (0).
ext-ip--Matches the packets with Extended IP Option (145).
ext-security--Matches the packets with Extended Security Option (133).
finn--Matches the packets with Experimental Flow Control Option (205).
imitd--Matches the packets with IMI Traffic Desriptor Option (144).
lsr--Matches the packets with Loose Source Route Option (131).
match-all--Matches the packets if all specified flags are present.
match-any--Matches the packets if any specified flag is present.
mtup--Matches the packets with MTU Probe Option (11).
mtur--Matches the packets with MTU Reply Option (12).
no-op--Matches the packets with No Operation Option (1).
psh--Match the packets on the PSH bit.
nsapa--Matches the packets with NSAP Addresses Option (150).
reflect--Creates reflexive access list entry.
record-route--Matches the packets with Record Route Option (7).
rst--Matches the packets on the RST bit.
router-alert--Matches the packets with Router Alert Option (148).
sdb--Matches the packets with Selective Directed Broadcast Option (149).
security--Matches the packets with Basic Security Option (130).
ssr--Matches the packets with Strict Source Routing Option (137).
stream-id--Matches the packets with Stream ID Option (136).
syn--Matches the packets on the SYN bit.
timestamp--Matches the packets with Time Stamp Option (68).
traceroute--Matches the packets with Trace Route Option (82).
ump--Matches the packets with Upstream Multicast Packet Option (152).
visa--Matches the packets with Experimental Access Control Option (142).
zsu--Matches the packets with Experimental Measurement Option (10).
precedencevalue--(Optional) Matches the packets with given precedence value; the valid values are as follows:
0 to 7--Precedence value.
critical--Matches the packets with critical precedence (5).
flash--Matches the packets with flash precedence (3).
flash-override--Matches the packets with flash override precedence (4).
immediate--Matches the packets with immediate precedence (2).
internet--Matches the packets with internetwork control precedence (6).
network--Matches the packets with network control precedence (7).
priority--Matches the packets with priority precedence (1).
routine--Matches the packets with routine precedence (0).
reflectacl-name [timeouttime]-- (Optional) Creates reflexive access list entry. The timeout time keyword and argument specify the maximum time for a reflexive ACL to live; the valid values are from 1 to 2147483 seconds.
time-rangename--(Optional) Specifies a time-range entry name.
tos--(Optional) Matches the packets with given ToS value; the valid values are as follows:
0 to15--Type of service value.
max-reliability--Matches the packets with the maximum reliable ToS (2).
max-throughput--Matches the packets with the maximum throughput ToS (4).
min-delay--Matches the packets with the minimum delay ToS (8).
min-monetary-cost--Matches the packets with the minimum monetary cost ToS (1).
normal--Matches the packets with the normal ToS (0).
Examples
The following example shows how to create an access list that permits packets from the users in myAG if the protocol ports match the ports specified in myPG:
The following example shows how to create an access list that permits packets from the users in myAG if the protocol ports match the ports specified in myPG. The access list is log enabled, and the cookie value is set to myCookie:
Enables hash value generation for ACE syslog entries.
showipaccess-lists
Displays the contents of all current IP access lists.
permit (IP)
To set conditions to allow a packet to pass a named IP access list, use the permit command in access list configuration mode. To remove a permit condition from an access list, use the
no form of this command.
(Optional) Sequence number assigned to the permit statement. The sequence number causes the system to insert the statement in that numbered position in the access list.
source
Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source:
Use a 32-bit quantity in four-part dotted-decimal format.
Use the
any keyword as an abbreviation for a
source and
source-wildcardof 0.0.0.0 255.255.255.255.
Use
hostsourceas an abbreviation for a
sourceand
source-wildcardof
source0.0.0.0.
source-wildcard
(Optional) Wildcard bits to be applied to the source. There are three alternative ways to specify the source wildcard:
Use a 32-bit quantity in four-part dotted-decimal format. Place 1s in the bit positions that you want to ignore.
Use the
any keyword as an abbreviation for a
source and
source-wildcard of 0.0.0.0 255.255.255.255.
Use
hostsourceas an abbreviation for a
sourceand
source-wildcardof
source0.0.0.0.
protocol
Name or number of an Internet protocol. The
protocol argument can be one of the keywords
eigrp,
gre,
icmp,
igmp,
ip,
ipinip,
nos,
ospf,
tcp, or
udp, or an integer in the range from 0 to 255 representing an Internet protocol number. To match any Internet protocol (including ICMP, TCP, and UDP), use the
ipkeyword.
Note
When the
icmp,
igmp,
tcp, and
udp keywords are entered, they must be followed with the specific command syntax that is shown for the ICMP, IGMP, TCP, and UDP forms of the
permit command.
Note
To configure a packet filter to allow BGP traffic, use protocol
tcp and specify the port number as 179 or
bgp
destination
Number of the network or host to which the packet is being sent. There are three alternative ways to specify the destination:
Use a 32-bit quantity in four-part dotted-decimal format.
Use the
anykeyword as an abbreviation for the
destinationand
destination-wildcardof 0.0.0.0 255.255.255.255.
Use
hostdestination as an abbreviation for a
destinationand
destination-wildcard of
destination 0.0.0.0.
destination-wildcard
Wildcard bits to be applied to the destination. There are three alternative ways to specify the destination wildcard:
Use a 32-bit quantity in four-part dotted-decimal format. Place 1s in the bit positions that you want to ignore.
Use the
any keyword as an abbreviation for a
destinationand
destination-wildcard of 0.0.0.0 255.255.255.255.
Use
hostdestination as an abbreviation for a
destinationand
destination-wildcard of
destination 0.0.0.0.
optionoption-name
(Optional) Packets can be filtered by IP Options, as specified by a number from 0 to 255, or by the corresponding IP Option name, as listed in the table in the “Usage Guidelines” section.
precedenceprecedence
(Optional) Packets can be filtered by precedence level, as specified by a number from 0 to 7 or by a name.
tostos
(Optional) Packets can be filtered by type of service (ToS) level, as specified by a number from 0 to 15, or by a name as listed in the “Usage Guidelines” section of the
access-list(IP extended) command.
ttloperator-value
(Optional) Compares the TTL value in the packet to the TTL value specified in this
permit statement.
The
operator can be
lt (less than),
gt (greater than),
eq (equal),
neq (not equal), or
range (inclusive range).
The
value can range from 0 to 255.
If the operator is
range, specify two values separated by a space.
For Release 12.0S, if the operator is
eq or
neq, only one TTL value can be specified.
For all other releases, if the operator is
eq or
neq, as many as 10 TTL values can be specified, separated by a space.
time-rangetime-range-name
(Optional) Name of the time range that applies to this
permit statement. The name of the time range and its restrictions are specified by the
time-range and
absolute or
periodic commands, respectively.
fragments
(Optional) The access list entry applies to noninitial fragments of packets; the fragment is either permitted or denied accordingly. For more details about the
fragments keyword, see the "Access List Processing of Fragments” and “Fragments and Policy Routing” sections in the “Usage Guidelines” section.
log
(Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the
loggingconsole command.)
After you specify the
log keyword (and the associated
word argument), you cannot specify any other keywords or settings for this command.
user-defined-cookie
(Optional) User-defined cookie appended to the log message. The cookie:
Cannot be more than 64 characters.
Cannot start with hexadecimal notation (such as 0x).
Cannot be the same as, or a subset of, the following keywords:
fragment,reflect,
time-range.
Must contain alphanumeric characters only.
The user-defined cookie is appended to the Allegro Crypto Engine (ACE) syslog entry and uniquely identifies the ACE, within the access control list, that generated the syslog entry.
icmp
Permits only ICMP packets. When you enter the
icmp keyword, you must use the specific command syntax shown for the ICMP form of the
permit command.
icmp-type
(Optional) ICMP packets can be filtered by ICMP message type. The type is a number from 0 to 255.
icmp-code
(Optional) ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. The code is a number from 0 to 255.
icmp-message
(Optional) ICMP packets can be filtered by an ICMP message type name or an ICMP message type and code name. The possible names are listed in the “Usage Guidelines” section of the
access-list(IP extended) command.
igmp
Permits only IGMP packets. When you enter the
igmp keyword, you must use the specific command syntax shown for the IGMP form of the
permit command.
igmp-type
(Optional) IGMP packets can be filtered by IGMP message type or message name. A message type is a number from 0 to 15. IGMP message names are listed in the “Usage Guidelines” section of the
access-list(IP extended) command.
tcp
Permits only TCP packets. When you enter the
tcp keyword, you must use the specific command syntax shown for the TCP form of the
permit command.
operator
(Optional) Compares source or destination ports. Operators are
eq (equal) ,
gt (greater than),lt (less than),
neq (not equal), and
range (inclusive range).
If the operator is positioned after the source and source-wildcard arguments, it must match the source port. If the operator is positioned after the destination and destination-wildcard arguments, it must match the destination port.
The range operator requires two port numbers. Up to ten port numbers can be entered for the
eq (equal) and
neq (not equal) operators. All other operators require one port number.
port
(Optional) The decimal number or name of a TCP or UDP port. A port number is a number from 0 to 65535. TCP and UDP port names are listed in the “Usage Guidelines” section of the
access-list(IPextended) command.
TCP port names can be used only when filtering TCP. UDP port names can be used only when filtering UDP.
established
(Optional) For the TCP protocol only: Indicates an established connection. A match occurs if the TCP datagram has the ACK or RST bit set. The nonmatching case is that of the initial TCP datagram to form a connection.
match-any|
match-all
(Optional) For the TCP protocol only: A match occurs if the TCP datagram has certain TCP flags set or not set. You use the
match-anykeyword to allow a match to occur if any of the specified TCP flags are present, or you can use the
match-allkeyword to allow a match to occur only if all of the specified TCP flags are present. You must follow the
match-anyand
match-allkeywords with the
+or
-keyword and the
flag-nameargument to match on one or more TCP flags.
+|
-flag-name
(Optional) For the TCP protocol only: The
+ keyword matches IP packets if their TCP headers contain the TCP flags that are specified by the
flag-name argument. The
- keyword matches IP packets that do not contain the TCP flags specified by the
flag-name argument. You must follow the
+ and
- keywords with the
flag-name argument. TCP flag names can be used only when filtering TCP. Flag names for the TCP flags are as follows:
ack,
fin,
psh,
rst,
syn, and
urg.
udp
Permits only UDP packets. When you enter the
udp keyword, you must use the specific command syntax shown for the UDP form of the
permit command.
Command Default
There are no specific conditions under which a packet passes the named access list.
Command Modes
Access list configuration (config-ext-nacl)
Command History
Release
Modification
11.2
This command was introduced.
12.0(1)T
The
time-rangetime-range-namekeyword and argument were added.
12.0(11)
The
fragmentskeyword was added.
12.2(13)T
The igrp keyword was removed because the IGRP protocol was no longer available in Cisco IOS software.
12.2(14)S
The
sequence-numberargument was added.
12.2(15)T
The
sequence-numberargument was added.
12.3(4)T
The
optionoption-name keyword and argument were added. The
match-any,
match-all,+,and-keywords and the
flag-name argument were added.
12.3(7)T
Command functionality was modified to allow up to ten port numbers to be added after the
eq and
neq operators so that an access list entry can be created with noncontiguous ports.
12.4
The
drip keyword was added to specify the TCP port number used for Optimized Edge Routing (OER) communication.
12.4(2)T
The
ttloperatorvaluekeyword and arguments were added.
12.2(27)SBC
This command was integrated into Cisco IOS Release 12.2(27)SBC.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.4(22)T
The
word argument was added to the
log keyword.
Cisco IOS XE Release 3.2
This command was implemented on Cisco ASR 1000 Series Aggregation Services Routers.
Usage Guidelines
Use the
permit command following the
ipaccess-list command to define the conditions under which a packet passes the named access list.
Note
In Cisco IOS XE, an inclusive port range for users to access a network cannot be matched in the extended ACL using the
permit command.
The
time-range keyword allows you to identify a time range by name. The
time-range,
absolute, and
periodic commands specify when this
permit statement is in effect.
log Keyword
A log message includes the access list number or access list name, and whether the packet was permitted or denied; the protocol, whether it was TCP, UDP, ICMP, or a number; and, if appropriate, the source and destination addresses and port numbers, and the user-defined cookie or router-generated hash value. The message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval.
Use the
ipaccess-listlog-update command to generate logging messages when the number of matches reaches a configurable threshold (rather than waiting for a 5-minute-interval). See the
ipaccess-listlog-update command for more information.
The logging facility might drop some logging message packets if there are too many to be handled or if there is more than one logging message to be handled in 1 second. This behavior prevents the router from reloading because of too many logging packets. Therefore, the logging facility should not be used as a billing tool or an accurate source of the number of matches to an access list.
If you enable Cisco Express Forwarding and then create an access list that uses the
log keyword, the packets that match the access list are not Cisco Express Forwarding switched. They are fast-switched. Logging disables Cisco Express Forwarding .
Access List Filtering of IP Options
Access control lists can be used to filter packets with IP Options to prevent routers from being saturated with spurious packets containing IP Options. To see a complete table of all IP Options, including ones currently not in use, refer to the latest Internet Assigned Numbers Authority (IANA) information that is available from its URL: www.iana.org.
Cisco IOS software allows you to filter packets according to whether they contain one or more of the legitimate IP Options by entering either the IP Option value or the corresponding name for the
option-name argument as shown in the table below.
Table 9 IP Option Values and Names
IP Option Value or Name
Description
0 to 255
IP Options values.
add-ext
Match packets with Address Extension Option (147).
any-options
Match packets with any IP Option.
com-security
Match packets with Commercial Security Option (134).
dps
Match packets with Dynamic Packet State Option (151).
encode
Match packets with Encode Option (15).
eool
Match packets with End of Options (0).
ext-ip
Match packets with Extended IP Options (145).
ext-security
Match packets with Extended Security Option (133).
finn
Match packets with Experimental Flow Control Option (205).
imitd
Match packets with IMI Traffic Descriptor Option (144).
lsr
Match packets with Loose Source Route Option (131).
mtup
Match packets with MTU Probe Option (11).
mtur
Match packets with MTU Reply Option (12).
no-op
Match packets with No Operation Option (1).
nsapa
Match packets with NSAP Addresses Option (150).
psh
Match the packets on the PSH bit.
record-route
Match packets with Router Record Route Option (7).
reflect
Create reflexive access list entry.
router-alert
Match packets with Router Alert Option (148).
rst
Matche the packets on the RST bit.
sdb
Match packets with Selective Directed Broadcast Option (149).
security
Match packets with Base Security Option (130).
ssr
Match packets with Strict Source Routing Option (137).
stream-id
Match packets with Stream ID Option (136).
syn
Matches the packets on the SYN bit.
timestamp
Match packets with Time Stamp Option (68).
traceroute
Match packets with Trace Route Option (82).
ump
Match packets with Upstream Multicast Packet Option (152).
visa
Match packets with Experimental Access Control Option (142).
zsu
Match packets with Experimental Measurement Option (10).
Filtering IP Packets Based on TCP Flags
The access list entries that make up an access list can be configured to detect and drop unauthorized TCP packets by allowing only the packets that have very specific groups of TCP flags set or not set. Users can select any desired combination of TCP flags with which to filter TCP packets. Users can configure access list entries in order to allow matching on a flag that is set and on a flag that is not set. Use the
+ and
- keywords with a flag name to specify that a match is made based on whether a TCP header flag has been set. Use the
match-any and
match-all keywords to allow the packet if any or all, respectively, of the flags specified by the
+ or
- keyword and
flag-name argument have been set or not set.
Permitting Optimized Edge Routing (OER) Communication
The
drip keyword was introduced under the
tcp keyword to support packet filtering in a network where OER is configured. The
drip keyword specifies port 3949 that OER uses for internal communication. This option allows you to build a packet filter that permits communication between an OER master controller and border routers. The
drip keyword is entered following the TCP source, destination addresses, and the
eq operator. See the example in the “Examples” section.
Access List Processing of Fragments
The behavior of access list entries regarding the use or lack of use of the
fragments keyword can be summarized as follows:
If the Access-List Entry Has ...
Then ...
... no
fragments keyword (the default behavior), and assuming all of the access list entry information matches,
For an access list entry that contains only Layer 3 information, the entry is applied to nonfragmented packets, initial fragments, and noninitial fragments.
For an access list entry that contains Layer 3 and Layer 4 information:
The entry is applied to nonfragmented packets and initial fragments.
If the entry is a
permitstatement, then the packet or fragment is permitted.
If the entry is a
denystatement, then the packet or fragment is denied.
The entry is also applied to noninitial fragments in the following manner. Because noninitial fragments contain only Layer 3 information, only the Layer 3 portion of an access list entry can be applied. If the Layer 3 portion of the access list entry matches, and
If the entry is a
permitstatement, then the noninitial fragment is permitted.
If the entry is a
deny statement, then the next access list entry is processed.
Note
The
deny statements are handled differently for noninitial fragments versus nonfragmented or initial fragments.
... the
fragments keyword, and assuming all of the access list entry information matches,
The access list entry is applied only to noninitial fragments. The
fragments keyword cannot be configured for an access list entry that contains any Layer 4 information.
Be aware that you should not add the
fragments keyword to every access list entry because the first fragment of the IP packet is considered a nonfragment and is treated independently of the subsequent fragments. An initial fragment will not match an access list
permit or
deny entry that contains the
fragmentskeyword. The packet is compared to the next access list entry, and so on, until it is either permitted or denied by an access list entry that does not contain the
fragments keyword. Therefore, you may need two access list entries for every
deny entry. The first
deny entry of the pair will not include the
fragments keyword and applies to the initial fragment. The second
deny entry of the pair will include the
fragments keyword and applies to the subsequent fragments. In the cases in which there are multiple
deny access list entries for the same host but with different Layer 4 ports, a single
deny access list entry with the
fragments keyword for that host is all that needs to be added. Thus all the fragments of a packet are handled in the same manner by the access list.
Packet fragments of IP datagrams are considered individual packets, and each counts individually as a packet in access list accounting and access list violation counts.
Note
The
fragmentskeyword cannot solve all cases that involve access lists and IP fragments.
Fragments and Policy Routing
Fragmentation and the fragment control feature affect policy routing if the policy routing is based on the
matchipaddress command and the access list has entries that match on Layer 4 through 7 information. It is possible that noninitial fragments pass the access list and are policy-routed, even if the first fragment is not policy-routed.
If you specify the
fragments keyword in access list entries, a better match between the action taken for initial and noninitial fragments can be made, and it is more likely that policy routing will occur as intended.
Creating an Access List Entry with Noncontiguous Ports
For Cisco IOS Release 12.3(7)T and later releases, you can specify noncontiguous ports on the same access control entry, which greatly reduces the number of access list entries required for the same source address, destination address, and protocol. If you maintain large numbers of access list entries, we recommend that you consolidate them when possible by using noncontiguous ports. You can specify up to ten port numbers following the
eq and
neq operators.
Examples
The following example shows how to set conditions for a standard access list named Internetfilter:
ip access-list standard Internetfilter
deny 192.168.34.0 0.0.0.255
permit 172.16.0.0 0.0.255.255
permit 10.0.0.0 0.255.255.255
! (Note: all other access implicitly denied).
The following example shows how to permit Telnet traffic on Mondays, Tuesdays, and Fridays from 9:00 a.m. to 5:00 p.m.:
time-range testing
periodic Monday Tuesday Friday 9:00 to 17:00
!
ip access-list extended legal
permit tcp any any eq telnet time-range testing
!
interface ethernet0
ip access-group legal in
The following example shows how to set a permit condition for an extended access list named filter2. The access list entry specifies that a packet may pass the named access list only if it contains the NSAP Addresses IP Option, which is represented by the IP Option value nsapa.
ip access-list extended filter2
permit ip any any option nsapa
The following example shows how to set a permit condition for an extended access list named kmdfilter1. The access list entry specifies that a packet can pass the named access list only if the RST IP flag has been set for that packet:
ip access-list extended kmdfilter1
permit tcp any any match-any +rst
The following example shows how to set a permit condition for an extended access list named kmdfilter1. The access list entry specifies that a packet can pass the named access list if the RST TCP flag or the FIN TCP flag has been set for that packet:
ip access-list extended kmdfilter1
permit tcp any any match-any +rst +fin
The following example shows how to verify the access list by using the
showaccess-lists command and then to add an entry to an existing access list:
Router# show access-lists
Standard IP access list 1
2 permit 10.0.0.0, wildcard bits 0.0.255.255
5 permit 10.0.0.0, wildcard bits 0.0.255.255
10 permit 10.0.0.0, wildcard bits 0.0.255.255
20 permit 10.0.0.0, wildcard bits 0.0.255.255
ip access-list standard 1
15 permit 10.0.0.0 0.0.255.255
The following examples shows how to remove the entry with the sequence number of 20 from the access list:
ip access-list standard 1no 20
!Verify that the list has been removed.
Router# show access-lists
Standard IP access list 1
10 permit 0.0.0.0, wildcard bits 0.0.0.255
30 permit 0.0.0.0, wildcard bits 0.0.0.255
40 permit 0.4.0.0, wildcard bits 0.0.0.255
The following example shows how, if a user tries to enter an entry that is a duplicate of an entry already on the list, no changes occur. The entry that the user is trying to add is a duplicate of the entry already in the access list with a sequence number of 20.
Router# show access-lists 101
Extended IP access list 101
10 permit ip host 10.0.0.0 host 10.5.5.34
20 permit icmp any any
30 permit ip host 10.0.0.0 host 10.2.54.2
40 permit ip host 10.0.0.0 host 10.3.32.3 log
ip access-list extended 101
100 permit icmp any any
Router# show access-lists 101
Extended IP access list 101
10 permit ip host 10.3.3.3 host 10.5.5.34
20 permit icmp any any
30 permit ip host 10.34.2.2 host 10.2.54.2
40 permit ip host 10.3.4.31 host 10.3.32.3 log
The following example shows what occurs if a user tries to enter a new entry with a sequence number of 20 when an entry with a sequence number of 20 is already in the list. An error message appears, and no change is made to the access list.
Router# show access-lists 101
Extended IP access lists 101
10 permit ip host 10.3.3.3 host 10.5.5.34
20 permit icmp any any
30 permit ip host 10.34.2.2 host 10.2.54.2
40 permit ip host 10.3.4.31 host 10.3.32.3 log
ip access-lists extended 101
20 permit udp host 10.1.1.1 host 10.2.2.2
%Duplicate sequence number.
Router# show access-lists 101
Extended IP access lists 101
10 permit ip host 10.3.3.3 host 10.5.5.34
20 permit icmp any any
30 permit ip host 10.34.2.2 host 10.2.54.2
40 permit ip host 10.3.4.31 host 10.3.32.3 log
The following example shows several
permit statements that can be consolidated into one access list entry with noncontiguous ports. The
showaccess-lists command is entered to display a group of access list entries for the access list named aaa.
Router# show access-lists aaa
Extended IP access lists aaa
10 permit tcp any eq telnet any eq 450
20 permit tcp any eq telnet any eq 679
30 permit tcp any eq ftp any eq 450
40 permit tcp any eq ftp any eq 679
Because the entries are all for the same
permit statement and simply show different ports, they can be consolidated into one new access list entry. The following example shows the removal of the redundant access list entries and the creation of a new access list entry that consolidates the previously displayed group of access list entries:
ip access-list extended aaa
no 10
no 20
no 30
no 40
permit tcp any eq telnet ftp any eq 450 679
The following example shows the creation of the consolidated access list entry:
Router# show access-lists aaa
Extended IP access list aaa
10 permit tcp any eq telnet ftp any eq 450 679
The following access list filters IP packets containing Type of Service (ToS) level 3 with TTL values 10 and 20. It also filters IP packets with a TTL greater than 154 and applies that rule to noninitial fragments. It permits IP packets with a precedence level of flash and a TTL not equal to 1, and sends log messages about such packets to the console. All other packets are denied.
ip access-list extended canton
deny ip any any tos 3 ttl eq 10 20
deny ip any any ttl gt 154 fragments
permit ip any any precedence flash ttl neq 1 log
The following example shows how to configure a packet filter, for any TCP source and destination, that permits communication between an OER master controller and border router:
ip access-list extended 100
permit any any tcp eq drip
exit
The following example shows how to set a permit condition for an extended access list named filter_logging. The access list entry specifies that a packet may pass the named access list only if it is of TCP protocol type and destined to host 10.5.5.5, all other packets are denied. In addition, the logging mechanism is enabled and one of the user defined cookies (Permit_tcp_to_10.5.5.5 or Deny_all) is appended to the appropriate syslog entry.
ip access-list extended filter_logging
permit tcp any host 10.5.5.5 log Permit_tcp_to_10.5.5.5
deny ip any any log Deny_all
The following example shows how to configure a packet filter for any TCP source and destination that permits inbound and outbound BGP traffic:
ip access-list extended 100
permit tcp any eq bgp any eq bgp
Related Commands
Command
Description
absolute
Specifies an absolute time when a time range is in effect.
access-list(IPextended)
Defines an extended IP access list.
access-list(IPstandard)
Defines a standard IP access list.
deny(IP)
Sets conditions under which a packet does not pass a named IP access list.
ipaccess-group
Controls access to an interface.
ipaccess-listlog-update
Sets the threshold number of packets that cause a logging message.
ipaccess-listlogginghash-generation
Enables hash value generation for ACE syslog entries.
ipaccess-listresequence
Applies sequence numbers to the access list entries in an access list.
ipoptions
Drops or ignores IP Options packets that are sent to the router.
loggingconsole
Sends system logging (syslog) messages to all available TTY lines and limits messages based on severity.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, or performs policy routing on packets.
periodic
Specifies a recurring (weekly) time range for functions that support the time-range feature.
showaccess-lists
Displays a group of access-list entries.
showipaccess-list
Displays the contents of all current IP access lists.
time-range
Specifies when an access list or other feature is in effect.
permit (IPv6)
To set permit conditions for an IPv6 access list, use the
permit command in IPv6 access list configuration mode. To remove the permit conditions, use the
no form of this command.
Name or number of an Internet protocol. It can be one of the keywords
ahp,
esp,
icmp,
ipv6,
pcp,
sctp,
tcp,
udp, or
hbh, or an integer in the range from 0 to 255 representing an IPv6 protocol number.
source-ipv6-prefix/prefix-length
The source IPv6 network or class of networks about which to set permit conditions.
This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
any
An abbreviation for the IPv6 prefix ::/0.
hostsource-ipv6-address
The source IPv6 host address about which to set permit conditions.
This
source-ipv6-address argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
auth
Allows matching traffic against the presence of the authentication header in combination with any protocol.
operator [port-number]
(Optional) Specifies an operand that compares the source or destination ports of the specified protocol. Operands are
lt (less than),
gt (greater than),
eq (equal),
neq (not equal), and
range (inclusive range).
If the operator is positioned after the
source-ipv6-prefix/prefix-length argument, it must match the source port.
If the operator is positioned after the
destination-ipv6-prefix/prefix-length argument, it must match the destination port.
The
range operator requires two port numbers. All other operators require one port number.
The optional
port-number argument is a decimal number or the name of a TCP or UDP port. A port number is a number from 0 to 65535. TCP port names can be used only when filtering TCP. UDP port names can be used only when filtering UDP.
destination-ipv6-prefix/prefix-length
The destination IPv6 network or class of networks about which to set permit conditions.
This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
hostdestination-ipv6-address
The destination IPv6 host address about which to set permit conditions.
This
destination-ipv6-address argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons.
dest-option-type
(Optional) Matches IPv6 packets against the destination extension header within each IPv6 packet header.
doh-number
(Optional) Integer in the range from 0 to 255 representing an IPv6 destination option extension header.
doh-type
(Optional) Destination option header types. The possible destination option header type and its corresponding
doh-number value are home-address—201.
dscpvalue
(Optional) Matches a differentiated services codepoint value against the traffic class value in the Traffic Class field of each IPv6 packet header. The acceptable range is from 0 to 63.
flow-labelvalue
(Optional) Matches a flow label value against the flow label value in the Flow Label field of each IPv6 packet header. The acceptable range is from 0 to 1048575.
fragments
(Optional) Matches non-initial fragmented packets where the fragment extension header contains a non-zero fragment offset. The
fragments keyword is an option only if the
operator [port-number] arguments are not specified. When this keyword is used, it also matches when the first fragment does not have Layer 4 information.
hbh
(Optional) Matches IPv6 packets against the hop-by-hop extension header within each IPv6 packet header.
log
(Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the
loggingconsole command.)
The message includes the access list name and sequence number, whether the packet was permitted; the protocol, whether it was TCP, UDP, ICMP, or a number; and, if appropriate, the source and destination addresses and source and destination port numbers. The message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted in the prior 5-minute interval.
log-input
(Optional) Provides the same function as the
log keyword, except that the logging message also includes the input interface.
mobility
(mobility) Matches IPv6 packets against the mobility extension header within each IPv6 packet header.
mobility-type
(Optional) Matches IPv6 packets against the mobility-type extension header within each IPv6 packet header. Either the
mh-number or
mh-type argument must be used with this keyword.
mh-number
(Optional) Integer in the range from 0 to 255 representing an IPv6 mobility header type.
mh-type
(Optional) Mobility header types. Possible mobility header types and their corresponding
mh-number value are as follows:
0—bind-refresh
1—hoti
2—coti
3—hot
4—cot
5—bind-update
6—bind-acknowledgment
7—bind-error
reflectname
(Optional) Specifies a reflexive IPvì6 access list. Reflexive IPv6 access lists are created dynamically when an IPv6 packets matches a permit statement that contains the
reflect keyword. The reflexive IPv6 access list mirrors the permit statement and times out automatically when no IPv6 packets match the permit statement. Reflexive IPv6 access lists can be applied to the TCP, UDP, SCTP, and ICMP for IPv6 packets.
timeoutvalue
(Optional) Interval of idle time (in seconds) after which a reflexive IPv6 access list times out. The acceptable range is from 1 to 4294967295. The default is 180 seconds.
routing
(Optional) Matches source-routed packets against the routing extension header within each IPv6 packet header.
routing-type
(Optional) Matches IPv6 packets against the routing-type extension header within each IPv6 packet header. The
routing-number argument must be used with this keyword.
routing-number
Integer in the range from 0 to 255 representing an IPv6 routing header type. Possible routing header types and their corresponding
routing-number value are as follows:
0—Standard IPv6 routing header
2—Mobile IPv6 routing header
sequencevalue
(Optional) Specifies the sequence number for the access list statement. The acceptable range is from 1 to 4294967295.
time-rangename
(Optional) Specifies the time range that applies to the permit statement. The name of the time range and its restrictions are specified by the
time-range and
absolute or
periodic commands, respectively.
icmp-type
(Optional) Specifies an ICMP message type for filtering ICMP packets. ICMP packets can be filtered by ICMP message type. The ICMP message type can be a number from 0 to 255, some of which include the following predefined strings and their corresponding numeric values:
144—dhaad-request
145—dhaad-reply
146—mpd-solicitation
147—mpd-advertisement
icmp-code
(Optional) Specifies an ICMP message code for filtering ICMP packets. ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. The code is a number from 0 to 255.
icmp-message
(Optional) Specifies an ICMP message name for filtering ICMP packets. ICMP packets can be filtered by an ICMP message name or ICMP message type and code. The possible names are listed in the “Usage Guidelines” section.
ack
(Optional) For the TCP protocol only: acknowledgment (ACK) bit set.
established
(Optional) For the TCP protocol only: Indicates an established connection. A match occurs if the TCP datagram has the ACK or RST bits set. The nonmatching case is that of the initial TCP datagram to form a connection.
fin
(Optional) For the TCP protocol only: Fin bit set; no more data from sender.
neq {port |
protocol}
(Optional) Matches only packets that are not on a given port number.
psh
(Optional) For the TCP protocol only: Push function bit set.
{rangeport |
protocol}
(Optional) Matches only packets in the range of port numbers.
rst
(Optional) For the TCP protocol only: Reset bit set.
syn
(Optional) For the TCP protocol only: Synchronize bit set.
urg
(Optional) For the TCP protocol only: Urgent pointer bit set.
Command Default
No IPv6 access list is defined.
Command Modes
IPv6 access list configuration (config-ipv6-acl)#
Command History
Release
Modification
12.0(23)S
This command was introduced.
12.2(13)T
This command was integrated into Cisco IOS Release 12.2(13)T.
12.2(14)S
This command was integrated into Cisco IOS Release 12.2(14)S.
12.4(2)T
The
icmp-type argument was enhanced. The
dest-option-type,
mobility,
mobility-type, and
routing-type keywords were added. The
doh-number,
doh-type,
mh-number,
mh-type, and
routing-number arguments were added.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(25)SG
This command was integrated into Cisco IOS Release 12.2(25)SG.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH
This command was integrated into Cisco IOS Release 12.2(33)SXH.
Cisco IOS XE Release 2.1
This command was introduced on Cisco ASR 1000 series routers.
12.4(20)T
The
auth keyword was added.
12.2(33)SRE
This command was integrated into Cisco IOS Release 12.2(33)SRE.
15.2(3)T
This command was modified. Support was added for the
hbh keyword.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Cisco IOS XE Release 3.2SE
This command was integrated into Cisco IOS XE Release 3.2SE.
Usage Guidelines
The
permit (IPv6) command is similar to the
permit (IP) command, except that it is IPv6-specific.
Use the
permit (IPv6) command following the
ipv6access-list command to define the conditions under which a packet passes the access list or to define the access list as a reflexive access list.
Specifying IPv6 for the
protocol argument matches against the IPv6 header of the packet.
By default, the first statement in an access list is number 10, and the subsequent statements are incremented by 10.
You can add
permit,
deny,
remark, or
evaluate statements to an existing access list without retyping the entire list. To add a new statement anywhere other than at the end of the list, create a new statement with an appropriate entry number that falls between two existing entry numbers to indicate where it belongs.
In Cisco IOS Release 12.2(2)T or later releases, 12.0(21)ST, and 12.0(22)S, IPv6 access control lists (ACLs) are defined and their deny and permit conditions are set by using the
ipv6access-list command with the
deny and
permit keywords in global configuration mode. In Cisco IOS Release 12.0(23)S or later releases, IPv6 ACLs are defined by using the
ipv6access-list command in global configuration mode and their permit and deny conditions are set by using the
deny and
permit commands in IPv6 access list configuration mode. Refer to the
ipv6access-list command for more information on defining IPv6 ACLs.
Note
In Cisco IOS Release 12.0(23)S or later releases, every IPv6 ACL has implicit
permiticmpanyanynd-na,
permiticmpanyanynd-ns, and
denyipv6anyany statements as its last match conditions. (The former two match conditions allow for ICMPv6 neighbor discovery.) An IPv6 ACL must contain at least one entry for the implicit
denyipv6anyany statement to take effect. The IPv6 neighbor discovery process makes use of the IPv6 network layer service; therefore, by default, IPv6 ACLs implicitly allow IPv6 neighbor discovery packets to be sent and received on an interface. In IPv4, the Address Resolution Protocol (ARP), which is equivalent to the IPv6 neighbor discovery process, makes use of a separate data link layer protocol; therefore, by default, IPv4 ACLs implicitly allow ARP packets to be sent and received on an interface.
Both the
source-ipv6-prefix/prefix-length and
destination-ipv6-prefix/prefix-length arguments are used for traffic filtering (the source prefix filters traffic based upon the traffic source; the destination prefix filters traffic based upon the traffic destination).
Note
IPv6 prefix lists, not access lists, should be used for filtering routing protocol prefixes.
The
fragments keyword is an option only if the
operator [port-number] arguments are not specified.
The following is a list of ICMP message names:
beyond-scope
destination-unreachable
echo-reply
echo-request
header
hop-limit
mld-query
mld-reduction
mld-report
nd-na
nd-ns
next-header
no-admin
no-route
packet-too-big
parameter-option
parameter-problem
port-unreachable
reassembly-timeout
renum-command
renum-result
renum-seq-number
router-advertisement
router-renumbering
router-solicitation
time-exceeded
unreachable
Defining Reflexive Access Lists
To define an IPv6 reflexive list, a form of session filtering, use the
reflect keyword in the
permit (IPv6) command. The
reflect keyword creates an IPv6 reflexive access list and triggers the creation of entries in the reflexive access list. The
reflect keyword must be an entry (condition statement) in an IPv6 access list.
Note
For IPv6 reflexive access lists to work, you must nest the reflexive access list using the
evaluate command.
If you are configuring IPv6 reflexive access lists for an external interface, the IPv6 access list should be one that is applied to outbound traffic.
If you are configuring an IPv6 reflexive access list for an internal interface, the IPv6 access list should be one that is applied to inbound traffic.
IPv6 sessions that originate from within your network are initiated with a packet exiting your network. When such a packet is evaluated against the statements in the IPv6 access list, the packet is also evaluated against the IPv6 reflexive permit entry.
As with all IPv6 access list entries, the order of entries is important, because they are evaluated in sequential order. When an IPv6 packet reaches the interface, it will be evaluated sequentially by each entry in the access list until a match occurs.
If the packet matches an entry prior to the reflexive permit entry, the packet will not be evaluated by the reflexive permit entry, and no temporary entry will be created for the reflexive access list (session filtering will not be triggered).
The packet will be evaluated by the reflexive permit entry if no other match occurs first. Then, if the packet matches the protocol specified in the reflexive permit entry, the packet is forwarded and a corresponding temporary entry is created in the reflexive access list (unless the corresponding entry already exists, indicating that the packet belongs to a session in progress). The temporary entry specifies criteria that permit traffic into your network only for the same session.
Characteristics of Reflexive Access List Entries
The
permit (IPv6) command with the
reflect keyword enables the creation of temporary entries in the same IPv6 reflexive access list that was defined by the
permit (IPv6) command. The temporary entries are created when an IPv6 packet exiting your network matches the protocol specified in the
permit (IPv6) command. (The packet “triggers” the creation of a temporary entry.) These entries have the following characteristics:
The entry is a permit entry.
The entry specifies the same IP upper-layer protocol as the original triggering packet.
The entry specifies the same source and destination addresses as the original triggering packet, except that the addresses are swapped.
If the original triggering packet is TCP or UDP, the entry specifies the same source and destination port numbers as the original packet, except that the port numbers are swapped.
If the original triggering packet is a protocol other than TCP or UDP, port numbers do not apply, and other criteria are specified. For example, for ICMP, type numbers are used: The temporary entry specifies the same type number as the original packet (with only one exception: if the original ICMP packet is type 8, the returning ICMP packet must be type 0 to be matched).
The entry inherits all the values of the original triggering packet, with exceptions only as noted in the previous four bullets.
IPv6 traffic entering your internal network will be evaluated against the entry, until the entry expires. If an IPv6 packet matches the entry, the packet will be forwarded into your network.
The entry will expire (be removed) after the last packet of the session is matched.
If no packets belonging to the session are detected for a configured length of time (the timeout period), the entry will expire.
Examples
The following example configures two IPv6 access lists named OUTBOUND and INBOUND and applies both access lists to outbound and inbound traffic on Ethernet interface 0. The first and second permit entries in the OUTBOUND list permit all TCP and UDP packets from network 2001:ODB8:0300:0201::/64 to exit out of Ethernet interface 0. The entries also configure the temporary IPv6 reflexive access list named REFLECTOUT to filter returning (incoming) TCP and UDP packets on Ethernet interface 0. The first deny entry in the OUTBOUND list keeps all packets from the network FEC0:0:0:0201::/64 (packets that have the site-local prefix FEC0:0:0:0201 as the first 64 bits of their source IPv6 address) from exiting out of Ethernet interface 0. The third permit entry in the OUTBOUND list permits all ICMP packets to exit out of Ethernet interface 0.
The permit entry in the INBOUND list permits all ICMP packets to enter Ethernet interface 0. The
evaluate command in the list applies the temporary IPv6 reflexive access list named REFLECTOUT to inbound TCP and UDP packets on Ethernet interface 0. When outgoing TCP or UDP packets are permitted on Ethernet interface 0 by the OUTBOUND list, the INBOUND list uses the REFLECTOUT list to match (evaluate) the returning (incoming) TCP and UDP packets. Refer to theevaluate command for more information on nesting IPv6 reflexive access lists within IPv6 ACLs.
ipv6 access-list OUTBOUND
permit tcp 2001:0DB8:0300:0201::/64 any reflect REFLECTOUT
permit udp 2001:0DB8:0300:0201::/64 any reflect REFLECTOUT
deny FEC0:0:0:0201::/64 any
permit icmp any any
ipv6 access-list INBOUND
permit icmp any any
evaluate REFLECTOUT
interface ethernet 0
ipv6 traffic-filter OUTBOUND out
ipv6 traffic-filter INBOUND in
Note
Given that a
permitanyany statement is not included as the last entry in the OUTBOUND or INBOUND access list, only TCP, UDP, and ICMP packets will be permitted out of and in to Ethernet interface 0 (the implicit deny all condition at the end of the access list denies all other packet types on the interface).
The following example shows how to allow the matching of any UDP traffic. The authentication header may be present.
permit udp any any sequence 10
The following example shows how to allow the matching of only TCP traffic if the authentication header is also present.
permit tcp any any auth sequence 20
The following example shows how to allow the matching of any IPv6 traffic where the authentication header is present.
permit ahp any any sequence 30
Related Commands
Command
Description
deny(IPv6)
Sets deny conditions for an IPv6 access list.
evaluate(IPv6)
Nests an IPv6 reflexive access list within an IPv6 access list.
ipv6access-list
Defines an IPv6 access list and enters IPv6 access list configuration mode.
ipv6traffic-filter
Filters incoming or outgoing IPv6 traffic on an interface.
showipv6access-list
Displays the contents of all current IPv6 access lists.
permit (MAC ACL)
To set conditions for a MAC access list, use the
permit command in MAC access-list extended configuration mode. To remove a condition from an access list, use the
no form of this command.
Specifies the MAC address mask that identifies a selected block of source MAC addresses. A value of 1 represents a wildcard in that position.
hostnamesrc_mac_name
Specifies a source host that has been named using the
machostname command.
any
Specifies any source or any destination host as an abbreviation for the
src_mac_maskor
dest_mac_maskvalue of 1111.1111.1111, which declares all digits to be wildcards .
dest_mac_mask
Specifies the MAC address mask that identifies a selected block of destination MAC addresses.
hostnamedst_mac_name
Specifies a destination host that has been named using the
machostname command.
protocol_keyword
(Optional) Specifies a named protocol (for example, ARP).
ethertype_number
(Optional) The EtherType number specifies the protocol within the Ethernet packet.
ethertype_mask
(Optional) The EtherType mask allows a range of EtherTypes to be specified together. This is a hexadecimal number from 0 to FFFF. An EtherType mask of 0 requires an exact match of the EtherType.
vlanvlan_ID
(Optional) Specifies a VLAN.
coscos_value
(Optional) Specifies the Layer 2 priority level for packets. The range is from 0 to 7.
Command Default
This command has no defaults.
Command Modes
MAC access-list extended configuration (config-ext-macl)
Command History
Release
Modification
12.2(33)SXI
This command was introduced.
15.1(2)SNG
This command was implemented on the Cisco ASR 901 Series Aggregation Services Routers.
Usage Guidelines
Use this command following the
ipaccess-list command to define the conditions under which a packet passes the access list.
The
vlan and
cos keywords are not supported in MAC ACLs used for VACL filtering.
The
vlan keyword for VLAN-based QoS filtering in MAC ACLs can be globally enabled or disabled and is disabled by default.
Enter MAC addresses as three 2-byte values in dotted hexadecimal format. For example, 0123.4567.89ab.
Enter MAC address masks as three 2-byte values in dotted hexadecimal format. Use 1 bits as wildcards. For example, to match an address exactly, use 0000.0000.0000 (can be entered as 0.0.0).
An entry without a protocol parameter matches any protocol.
Enter an EtherType and an EtherType mask as hexadecimal values from 0 to FFFF.
This list shows the EtherType values and their corresponding protocol keywords:
This example shows how to create a MAC-Layer ACL named mac_layer that permits dec-phase-iv traffic with source address 0000.4700.0001 and destination address 0000.4700.0009, but denies all other traffic:
Router(config)# mac access-list extended mac_layer
Router(config-ext-macl)# permit 0000.4700.0001 0.0.0 0000.4700.0009 0.0.0 dec-phase-iv
Router(config-ext-macl)# deny any any
Related Commands
Command
Description
deny(MACACL)
Sets deny conditions for a named MAC access list.
macaccess-listextended
Defines a MAC access list by name.
machost
Assigns a name to a MAC address.
showmacaccess-group
Displays the contents of all current MAC access groups.
permit (reflexive)
To create a reflexive access list and to enable its temporary entries to be automatically generated, use the permitcommand in access-list configuration mode. To delete the reflexive access list (if only one protocol was defined) or to delete protocol entries from the reflexive access list (if multiple protocols are defined), use the no form of this command.
Name or number of an IP protocol. It can be one of the keywords gre, icmp, ip, ipinip, nos, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including Internet Control Message Protocol, Transmission Control Protocol, and User Datagram Protocol), use the keyword ip.
source
Number of the network or host from which the packet is being sent. There are three other ways to specify the source:
Use a 32-bit quantity in four-part, dotted-decimal format.
Use the keyword any as an abbreviation for a source and source-wildcard of 0.0.0.0 255.255.255.255. This keyword is normally not recommended (see the section “Usage Guidelines”).
Use hostsource as an abbreviation for a source and source-wildcard of source 0.0.0.0.
source-wildcard
Wildcard bits (mask) to be applied to source. There are three other ways to specify the source wildcard:
Use a 32-bit quantity in four-part, dotted-decimal format. Place ones in the bit positions you want to ignore.
Use the keyword any as an abbreviation for a source and source-wildcard of 0.0.0.0 255.255.255.255. This keyword is normally not recommended (see the section “Usage Guidelines”).
Use hostsource as an abbreviation for a source and source-wildcard of source 0.0.0.0.
destination
Number of the network or host to which the packet is being sent. There are three other ways to specify the destination:
Use a 32-bit quantity in four-part, dotted-decimal format.
Use the keyword any as an abbreviation for the destination and destination-wildcard of 0.0.0.0 255.255.255.255. This keyword is normally not
recommended (see the section “Usage Guidelines”).
Use hostdestinationas an abbreviation for a destination and destination-wildcard of destination 0.0.0.0.
destination-wildcard
Wildcard bits to be applied to the destination. There are three other ways to specify the destination wildcard:
Use a 32-bit quantity in four-part, dotted-decimal format. Place ones in the bit positions you want to ignore.
Use the keyword any as an abbreviation for a destination and destination-wildcard of 0.0.0.0 255.255.255.255. This keyword is normally not
recommended (see the section “Usage Guidelines”).
Use hostdestination as an abbreviation for a destination and destination-wildcard of destination 0.0.0.0.
reflect
Identifies this access list as a reflexive access list.
name
Specifies the name of the reflexive access list. Names cannot contain a space or quotation mark, and must begin with an alphabetic character to prevent ambiguity with numbered access lists. The name can be up to 64 characters long.
timeoutseconds
(Optional) Specifies the number of seconds to wait (when no session traffic is being detected) before entries expire in this reflexive access list. Use a positive integer from 0 to 232-1. If not specified, the number of seconds defaults to the global timeout value.
Command Default
If this command is not configured, no reflexive access lists will exist, and no session filtering will occur.
If this command is configured without specifying a timeout value, entries in this reflexive access list will expire after the global timeout period.
Command Modes
Access-list configuration
Command History
Release
Modification
11.3
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS release 12.(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is used to achieve reflexive filtering, a form of session filtering.
For this command to work, you must also nest the reflexive access list using the evaluate command.
This command creates a reflexive access list and triggers the creation of entries in the same reflexive access list. This command must be an entry (condition statement) in an extended named IP access list.
If you are configuring reflexive access lists for an external interface, the extended named IP access list should be one which is applied to outbound traffic.
If you are configuring reflexive access lists for an internal interface, the extended named IP access list should be one which is applied to inbound traffic.
IP sessions that originate from within your network are initiated with a packet exiting your network. When such a packet is evaluated against the statements in the extended named IP access list, the packet is also evaluated against this reflexive permit entry.
As with all access list entries, the order of entries is important, because they are evaluated in sequential order. When an IP packet reaches the interface, it will be evaluated sequentially by each entry in the access list until a match occurs.
If the packet matches an entry prior to the reflexive permit entry, the packet will not be evaluated by the reflexive permit entry, and no temporary entry will be created for the reflexive access list (session filtering will not be triggered).
The packet will be evaluated by the reflexive permit entry if no other match occurs first. Then, if the packet matches the protocol specified in the reflexive permit entry, the packet is forwarded and a corresponding temporary entry is created in the reflexive access list (unless the corresponding entry already exists, indicating the packet belongs to a session in progress). The temporary entry specifies criteria that permits traffic into your network only for the same session.
Characteristics of Reflexive Access List Entries
This command enables the creation of temporary entries in the same reflexive access list that was defined by this command. The temporary entries are created when a packet exiting your network matches the protocol specified in this command. (The packet “triggers” the creation of a temporary entry.) These entries have the following characteristics:
The entry is a permit entry.
The entry specifies the same IP upper-layer protocol as the original triggering packet.
The entry specifies the same source and destination addresses as the original triggering packet, except the addresses are swapped.
If the original triggering packet is TCP or UDP, the entry specifies the same source and destination port numbers as the original packet, except the port numbers are swapped.
If the original triggering packet is a protocol other than TCP or UDP, port numbers do not apply, and other criteria are specified. For example, for ICMP, type numbers are used: the temporary entry specifies the same type number as the original packet (with only one exception: if the original ICMP packet is type 8, the returning ICMP packet must be type 0 to be matched).
The entry inherits all the values of the original triggering packet, with exceptions only as noted in the previous four bullets.
IP traffic entering your internal network will be evaluated against the entry, until the entry expires. If an IP packet matches the entry, the packet will be forwarded into your network.
The entry will expire (be removed) after the last packet of the session is matched.
If no packets belonging to the session are detected for a configurable length of time (the timeout period), the entry will expire.
Examples
The following example defines a reflexive access list tcptraffic, in an outbound access list that permits all Border Gateway Protocol and Enhanced Interior Gateway Routing Protocol traffic and denies all ICMP traffic. This example is for an external interface (an interface connecting to an external network).
First, the interface is defined and the access list is applied to the interface for outbound traffic.
interface Serial 1
description Access to the Internet via this interface
ip access-group outboundfilters out
Next, the outbound access list is defined and the reflexive access list tcptraffic is created with a reflexive permit entry.
ip access-list extended outboundfilters
permit tcp any any reflect tcptraffic
Related Commands
Command
Description
evaluate
Nests a reflexive access list within an access list.
ipaccess-list
Defines an IP access list by name.
ipreflexive-listtimeout
Specifies the length of time that reflexive access list entries will continue to exist when no packets in the session are detected.
permit (webvpn acl)
To set conditions to allow packets to pass a named Secure Sockets Layer Virtual Private Network (SSL VPN) access list, use thepermit command in webvpn acl configuration mode. To remove a permit condition from an access list, use the no form of this command.
permit
[ url
[ any | url-string ] ]
[ ip | tcp | udp | http | https | cifs ]
[ any | source-ipsource-mask ]
[ any | destination-ipdestination-mask ]
time-rangetime-range-name [syslog]
nopermiturl
[ any | url-string ]
[ ip | tcp | udp | http | https | cifs ]
[ any | source-ipsource-mask ]
[ any | destination-ipdestination-mask ]
time-rangetime-range-name [syslog]
Syntax Description
url
(Optional) Filtering rules are applied to a URL.
Use the any keyword as an abbreviation for any URL.
url-string
(Optional) URL string defined as follows: scheme://host[:port][/path]
scheme--Can be HTTP, Secure HTTPS (HTTPS), or Common Internet File System (CIFS). This field is required in the URL string.
host--Can be a hostname or a host IP (host mask). The host can have one wildcard (*).
port--Can be any valid port number (1-65535). It is possible to have multiple port numbers separated by a comma (,). The port range is expressed using a dash (-).
path--Can be any valid path string. In the path string, the $user is translated to the current user name.
ip
(Optional) Permits only IP packets. When you enter the ip keyword, you must use the specific command syntax shown for the IP form of the permit command.
tcp
(Optional) Permits only TCP packets. When you enter the tcp keyword, you must use the specific command syntax shown for the TCP form of the permit command.
udp
(Optional) Permitss only UDP packets. When you enter the udp keyword, you must use the specific command syntax shown for the UDP form of the permit command.
http
(Optional) Permits only HTTP packets. When you enter the http keyword, you must use the specific command syntax shown for the HTTP form of the permit command.
https
(Optional) Permits only HTTPS packets. When you enter the https keyword, you must use the specific command syntax shown for the HTTPS form of the permit command.
cifs
(Optional) Permits only CIFS packets. When you enter the cifskeyword, you must use the specific command syntax shown for the CIFS form of the permit command.
source-ipsource-mask
(Optional) Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source:
Use a 32-bit quantity in four-part dotted-decimal format.
Use the any keyword as an abbreviation for a source and source mask of 0.0.0.0 255.255.255.255.
Use host source as an abbreviation for a source and source-wildcard of source 0.0.0.0.
destination-ipdestination-mask
(Optional) Number of the network or host to which the packet is being sent. There are three alternative ways to specify the destination:
Use a 32-bit quantity in four-part dotted-decimal format.
Use the any keyword as an abbreviation for a source and source mask of 0.0.0.0 255.255.255.255.
Use host source as an abbreviation for a source and source-wildcard of source 0.0.0.0.
time-rangetime-range-name
Name of the time range that applies to this permit statement. The name of the time range and its restrictions are specified by the time-range and absolute or periodic commands, respectively.
syslog
(Optional) System logging messages are generated.
Command Default
All packets are permitted.
Command Modes
Webvpn acl configuration
Command History
Release
Modification
12.4(11)T
This command was introduced.
Usage Guidelines
Use this command following the acl command (in webvpn context configuration mode) to specify conditions under which a packet can pass the named access list.
The time-range keyword allows you to identify a time range by name. The time-range, absolute, and periodic commands specify when this permit statement is in effect.
Examples
The following example shows that all packets from the URL “https://10.168.2.228:34,80-90,100-/public” are permitted to pass ACL “acl1”:
Sets conditions in a named SSL VPN access list that will deny packets.
periodic
Specifies a recurring (weekly) time range for functions that support the time-range feature.
time-range
Enables time-range configuration mode and defines time ranges for extended access lists.
pfs
To configure a server to notify the client of the central-site policy regarding whether PFS is required for any IP Security (IPsec) Security Association (SA), use thepfs command in global configuration mode or IKEv2 authorization policy configuration mode. To restore the default behavior, use the
no form of this command.
pfs
nopfs
Syntax Description
This command has no arguments or keywords.
Command Default
The server will not notify the client of the central-site policy regarding whether PFS is required for any IPsec SA.
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS 12.2SX family of releases. Support in a specific 12.2SX release is dependent on your feature set, platform, and platform hardware.
Usage Guidelines
Before you use the
pfs command, you must first configure the
cryptoisakmpclientconfigurationgroup or
crypto ikev2 authorization policy command.
An example of an attribute-value (AV) pair for the PFS attribute is as follows:
ipsec:pfs=1
Examples
The following example shows that the server has been configured to notify the client of the central-site policy regarding whether PFS is required for any IPsec SA:
crypto ikev2 authorization policy
pfs
Related Commands
Command
Description
crypto ikev2 authorization policy
Specifies an IKEv2 authorization policy.
crypto isakmp client configuration group
Specifies to which group a policy profile will be defined.
pki-server
To specify the certificate server that is to be associated with the Trusted Transitive Introduction (TTI) exchange between the Secure Device Provisioning (SDP) petitioner and the SDP registrar, use the pki-servercommand in tti-registrar configuration mode. To change the specified certificate server, use the no form of this command.
pki-serverlabel
nopki-serverlabel
Syntax Description
label
Name of certificate server.
Command Default
A certificate server is not associated with the TTI exchange; thus, the petitioner and registrar will not be able to communicate.
Command Modes
tti-registrar configuration
Command History
Release
Modification
12.3(8)T
This command was introduced.
Usage Guidelines
Although any device that contains a crypto image can be the registrar, it is recommended that the registrar be either a Cisco IOS certificate server registration authority (RA) or a Cisco IOS certificate server root.
Examples
The following example shows how to associate the certificate server “cs1” with the TTI exchange:
crypto wui tti registrar
pki-server cs1
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
cryptowuittiregistrar
Configures a device to become an SDP registrar and enters tti-registrar configuration mode.
pki trustpoint
To use the PKI trustpoints in the Rivest, Shamir and Adleman (RSA) signature authentication method, use the
pkitrustpointcommand in IKEv2 profile configuration mode. To remove the trustpoint, use the
no form of this command.
pkitrust-pointtrustpoint-name
[ sign | verify ]
nopkitrust-pointtrustpoint-name
[ sign | verify ]
Syntax Description
trustpoint-name
The trustpoint name as defined in the global configuration.
sign
(Optional) Uses certificates from the trustpoint to create a digital signature that is sent to the peer.
verify
(Optional) Uses certificates from the trustpoint to validate digital signatures received from thepeer.
Command Default
If there is no trustpoint defined in the IKEv2 profile configuration, the default is to validate the certificate using all the trustpoints that are defined in the global configuration.
This command was integrated into Cisco IOS XE Release 3.3S.
15.2(4)S
This command was integrated into Cisco IOS Release 15.2(4)S.
Usage Guidelines
The
pkitrustpoint command specifies the trustpoints that are used with the RSA-signature authentication method. You can configure upto six truspoints.
Note
If the
sign or
verify keyword is not specified, the trustpoint is used for signing and verification.
Examples
The following example specifies two trustpoints, trustpoint-local for local authentication using sign and trustpoint-remote for remote verification using verify:
To limit traffic matching within a firewall (inspect) policy, use the
police command in policy-map class configuration mode. To remove traffic limiting from the firewall policy configuration , use the
no form of this command.
policeratebps
[ burstsize ]
nopoliceratebps
[ burstsize ]
Syntax Description
ratebps
Specifies the average rate in bits per second (bps). Valid values are 8000 to 128000000000 (or 128 Gbps).
Note
Traffic limiting is in bps only; that is, packets per seconds (pps) and percent rates are not supported.
burst size
(Optional) Specifies the burst size in bytes. Valid values are 1000 to 2000000000 (2 Gb). The default normal burst size is 1500 bytes.
Command Default
Traffic limiting is disabled.
Command Modes
Policy-map class configuration (config-pmap-c)
Command History
Release
Modification
12.4(9)T
This command was introduced.
15.0(1)SY
This command was modified. The maximum value for the
bps and
size arguments was increased.
Usage Guidelines
Issue the
police command within an inspect policy to limit the number of concurrent connections allowed for applications such as Instant Messenger (IM) and peer-to-peer (P2P).
To effectively use the
police command, you must also enable Cisco IOS stateful packet inspection within the inspect policy map. If you configure the
police command without configuring the inspect action (via the
inspect command), you will receive an error message and the
police command will be rejected.
Because an inspect policy map can be applied only to a zone pair, and not an interface, the police action will be enforced on traffic that traverses the zone pair. (The direction is inherent to the specification of the zone pair.)
The police action is not allowed in policies that are attached to zone pairs involving a “self” zone. If you want to perform this task, you should use control plane policing.
Examples
The following example shows how to limit traffic matching with the inspect policy “p1”:
policy-map type inspect p1
class type inspect c1
inspect
police rate 1000 burst 6100
The following example is sample output from the showpolicy-maptypeinspectzone-pair command, which can now be used to verify the police action configuration:
Router# show policy-map type inspect zone-pair
Zone-pair: zp
Service-policy inspect : test-udp
Class-map: check-udp (match-all)
Match: protocol udp
Inspect
Packet inspection statistics [process switch:fast switch]
udp packets: [3:4454]
Session creations since subsystem startup or last reset 92
Current session counts (estab/half-open/terminating) [5:33:0]
Maxever session counts (estab/half-open/terminating) [5:59:0]
Last session created 00:00:06
Last statistic reset never
Last session creation rate 61
Last half-open session total 33
Police
rate 8000 bps,1000 limit
conformed 2327 packets, 139620 bytes; actions: transmit
exceeded 36601 packets, 2196060 bytes; actions: drop
conformed 6000 bps, exceed 61000 bps
Class-map: class-default (match-any)
Match: any
Drop (default action)
0 packets, 0 bytes
Related Commands
Command
Description
showpolicy-maptypeinspectzone-pair
Displays the runtime inspect type policy map statistics and other information such as sessions existing on a specified zone pair.
policy
To define the Central Policy Push (CPP) firewall policy push, use the
policy command in global configuration mode. To remove the CPP policy that was configured, use the
no form of this command.
policy
{ check-presence | central-policy-pushaccess-list
{ in | out }
{ access-list-name | access-list-number } }
nopolicy
{ check-presence | central-policy-pushaccess-list
{ in | out }
{ access-list-name | access-list-number } }
Syntax Description
check-presence
Instructs the server to check for the presence of the specified firewall as shown as
firewall-type on the client.
central-policy-push
Pushes the CPP firewall policy push. The configuration following this keyword specifies the actual policy, such as the input and output access lists that have to be applied by the client firewall of the type
firewall-type .
access-listin
Defines the inbound access list on the virtual private network (VPN) remote client.
access-listout
Defines the outbound access list on the VPN remote client.
access-list-name|access-list-number
Access list name or number.
Command Default
The CPP policy is not defined.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS release 12.(33)SRA.
Examples
The following example defines the CPP policy name as “hw-client-g-cpp.” The “Cisco-Security-Agent” policy type is mandatory. The CPP inbound list is “192” and the outbound list is “sample”:
crypto isakmp client firewall hw-client-g-cpp required Cisco-Security-Agent
policy central-policy-push access-list in 192
policy central-policy-push access-list out sample
policy check-presence:
The following example shows access lists that have been applied on a VPN remote client and later applied by the client firewall :
Examples
.
.
.
access-list 170 permit ip 172.18.124.0 0.0.0.255 any
access-list 170 permit ip 172.21.1.0 0.0.0.255 any
.
.
.
Examples
.
.
.
access-list 180 permit ip any 172.18.124.0 0.0.0.255
.
.
.
Inbound and outbound policies to be applied by the client firewall
.
.
.
crypto isakmp client firewall test required cisco-integrated-client-firewall
policy central-policy-push access-list in 170
policy central-policy-push access-list out 180
.
.
.
crypto isakmp client configuration group vpngroup1
firewall policy test
.
.
.
Related Commands
Command
Description
cryptoisakmpclientfirewall
Defines the CPP) firewall push policy on a server.
policy dynamic identity
To configure identity port mapping (IPM) to allow dynamic authorization policy download from an authorization server based on the identity of the peer, use the
policy dynamic identity command in Cisco TrustSec manual configuration mode. Use the
no form of the command to remove a policy.
policy dynamic identitypeer
no policy dynamic identitypeer
Syntax Description
peer
The peer device name or symbolic name in the authentication server's policy database associated with the policy to be applied to the peer.
Command Default
No policy is defined and traffic passes through without applying an SGT.
This command was introduced on the Catalyst 6500 Series Switches.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
When manually configuring Cisco TrustSec on an interface, consider these usage guidelines and restrictions:
If no SAP parameters are defined, no Cisco TrustSec encapsulation or encryption is performed.
If the selected SAP mode allows SGT insertion and an incoming packet carries an SGT, the tagging policy is as follows:
If the
policy static sgt command is configured, the packet is tagged with the SGT configured in the policy static command.
If the
policy dynamic identity command is configured, the packet is not tagged.
If the selected SAP mode allows SGT insertion and an incoming packet carries an SGT, the tagging policy is as follows:
If the
policy static sgt command is configured without the trusted keyword, the SGT is replaced with the SGT configured in the policy static command.
If the
policy static sgt command is configured with the trusted keyword, no change is made to the SGT.
If the
policy dynamic identity command is configured and the authorization policy downloaded from the authentication server indicates that the packet source is untrusted, the SGT is replaced with the SGT specified by the downloaded policy.
If thepolicy dynamic identity command is configured and the downloaded policy indicates that the packet source is trusted, no change is made to the SGT.
Configures a static authorization policy for a Cisco TrustSec security group.
policy group
To enter webvpn group policy configuration mode to configure a group policy, use the policygroup command in webvpn context configuration mode. To remove the policy group from the router configuration file, use the no form of this command.
policygroupname
nopolicygroupname
Syntax Description
name
Name of the policy group.
Command Default
Webvpn group policy configuration mode is not entered, and a policy group is not configured.
Command Modes
Webvpn context configuration
Command History
Release
Modification
12.4(6)T
This command was introduced.
Usage Guidelines
The policy group is a container that defines the presentation of the portal and the permissions for resources that are configured for a group of end users. Entering the policygroup command places the router in webvpn group policy configuration mode. After the group policy is configured, the policy group is attached to the SSL VPN context configuration by configuring the default-group-policy command.
Examples
The following example configures a policy group named ONE:
Router(config)# webvpn context context1
Router(config-webvpn-context)# policy group ONE
Router(config-webvpn-group)# exit
Router(config-webvpn-context)# default-group-policy ONE
Related Commands
Command
Description
banner
Configures a banner to be displayed after a successful login.
citrixenabled
Enables Citrix application support for end users in a policy group.
default-group-policy
Configures a default group policy for SSL VPN sessions.
filtercitrix
Configures a Citrix application access filter.
filtertunnel
Configures a SSL VPN tunnel access filter.
functions
Enables a file access function or tunnel mode support in a group policy configuration.
hide-url-bar
Prevents the URL bar from being displayed on the SSL VPN portal page.
nbns-list(policygroup)
Attaches a NBNS server list to a policy group configuration.
port-forward(policygroup)
Attaches a port-forwarding list to a policy group configuration.
svcaddress-pool
Configures a pool of IP addresses to assign to end users in a policy group.
svcdefault-domain
Configures the domain for a policy group.
svcdns-server
Configures DNS servers for policy group end users.
svcdpd-interval
Configures the DPD timer value for the gateway or client.
svchomepage
Configures the URL of the web page that is displayed upon successful user login.
svckeep-client-installed
Configures the end user to keep Cisco AnyConnect VPN Client software installed when the SSL VPN connection is not enabled.
svcmsie-proxy
Configures MSIE browser proxy settings for policy group end users.
svcmsie-proxyserver
Specifies a Microsoft Internet Explorer proxy server for policy group end users.
svcrekey
Configures the time and method that a tunnel key is refreshed for policy group end users.
svcsplit
Configures split tunneling for policy group end users.
svcwins-server
Configures configure WINS servers for policy group end users.
timeout
Configures the length of time that an end user session can remain idle or the total length of time that the session can remain connected.
url-list(policygroup)
Attaches a URL list to policy group configuration.
webvpncontext
Enters webvpn context configuration mode to configure the SSL VPN context.
policy static sgt
To configure a static authorization policy for a Cisco TrustSec security group, use the
policy static sgt command in Cisco TrustSec manual configuration mode. Use the
no form of the command to remove a policy.
policy static sgttag
[ trusted ]
no policy static sgttag
[ trusted ]
Syntax Description
tag
Specifies the SGT in decimal format. The range is 1 to 65533.
trusted
Optional. Indicates that ingress traffic on the interface with this SGT should not have its tag overwritten.
This command was introduced on the Catalyst 6500 Series Switches.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
15.3(2)T
This command was integrated into Cisco IOS Release 15.3(2)T.
Usage Guidelines
When manually configuring Cisco TrustSec on an interface, consider these usage guidelines and restrictions:
If no SAP parameters are defined, no Cisco TrustSec encapsulation or encryption is performed.
If the selected SAP mode allows SGT insertion and an incoming packet carries an SGT, the tagging policy is as follows:
If the
policy static sgt command is configured, the packet is tagged with the SGT configured in the policy static command.
If the
policy dynamic identity command is configured, the packet is not tagged.
If the selected SAP mode allows SGT insertion and an incoming packet carries an SGT, the tagging policy is as follows:
If the
policy static sgt command is configured without the trusted keyword, the SGT is replaced with the SGT configured in the policy static command.
If the
policy static sgt command is configured with the trusted keyword, no change is made to the SGT.
If the
policy dynamic identity command is configured and the authorization policy downloaded from the authentication server indicates that the packet source is untrusted, the SGT is replaced with the SGT specified by the downloaded policy.
If the policy dynamic identity command is configured and the downloaded policy indicates that the packet source is trusted, no change is made to the SGT.
If the policy static sgt command is not configured, traffic may be tagged according to IP-SGT bindings specified by the cts role-based sgt-map interface command or learned from SXP. Traffic may also pass through without applying an SGT if no IP-SGT binding is found.
Note
SAP is not supported on Cisco ASR 1000 Series Routers.
Configures identity port mapping (IPM) to allow dynamic authorization policy download from an authorization server based on the identity of the peer.
cts role-based sgt-map interface
Manually maps a source IP address to an SGT on either a host or a VRF.
policy-map type control mitigation
To configure a mitigation type policy map for Transitory Messaging Services (TMS), use the
policy-maptypecontrolmitigationcommand in global configuration mode. To remove the policy map from the router configuration file, use the
no form of this command.
Note
Effective with Cisco IOS Release 12.4(20)T, the
policy-maptypecontrolmitigation command is not available in Cisco IOS software.
policy-maptypecontrolmitigationname
nopolicy-maptypecontrolmitigationname
Syntax Description
name
Name of the mitigation type policy map.
Command Default
A mitigation type policy map is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.4(15)XZ
This command was integrated into Cisco IOS Release 12.4(15)XZ.
Usage Guidelines
The mitigation type policy map is used to configure a mitigation type service policy (TMS Rules Engine configuration). The mitigation type policy map is configured on only the consumer. Entering the
policy-maptypecontrolmitigationcommand places the router in policy-map configuration mode.
The mitigation type policy map is configured to bind mitigation type class and parameter maps together, creating a mitigation type service policy. The mitigation type class map is configured to match a class of traffic to a primitive and priority level. The mitigation type parameter map is configured to set the next-hop variable for a redirect mitigation enforcement action.
Attaching the Policy Map to the Global TMS process
The mitigation type service policy is activated by attaching the mitigation type policy map to the TMS type policy map in policy-map class configuration mode. The TMS type policy map is then attached to the global consumer configuration by configuring the
service-policy command in consumer configuration mode.
Examples
Examples
The following example configures the Rules Engine to send priority 5 redirect threat mitigation traffic to a null interface (black hole):
Router(config)# parameter-map type mitigation MIT_PAR_1
Router(config-profile)# variable RTBH NULL0
Router(config-profile)# exit
Router(config)# class-map type control mitigation match-all MIT_CLASS_1
Router(config-cmap)# match priority 5
Router(config-cmap)# match primitive redirect
Router(config-cmap)# exit
Router(config)# policy-map type control mitigation MIT_POL_1
Router(config-pmap)# class MIT_CLASS_1
Router(config-pmap-c)# redirect route $RTBH
Router(config-pmap-c)# end
Examples
The following example creates a Rules Engine configuration and activates it under the global consumer process:
Router(config)# class-map type control mitigation match-all MIT_CLASS_2
Router(config-cmap)# match primitive block
Router(config-cmap)# match priority 1
Router(config-cmap)# exit
Router(config)# parameter-map type mitigation MIT_PAR_2
Router(config-profile)# variable COLLECTION ipv4 192.168.1.1
Router(config-profile)# exit
Router(config)# policy-map type control mitigation MIT_POL_2
Router(config-pmap)# class MIT_CLASS_2
Router(config-pmap-c)# redirect route
Router(config-pmap-c)# source parameter MIT_PAR_2
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# policy-map type control tms TMS_POL_1
Router(config-pmap)# class TMS_CLASS_1
Router(config-pmap-c)# mitigation TMS_PAR_1
Router(config-pmap-c)# service-policy MIT_POL_2
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# tms consumer
Router(config-cons)# service-policy type tms TMS_POL_1
Router(config-cons)# end
Related Commands
Command
Description
acldrop
Configures an ACL drop enforcement action in a TMS Rules Engine configuration.
class-maptypecontrolmitigation
Configures a mitigation type class map.
ignore(TMS)
Configures the TMS Rules Engine to ignore a mitigation enforcement action.
matchprimitive
Configures a primitive match in a mitigation type class map.
matchpriority
Configures the match priority level for a mitigation enforcement action.
parameter-maptypemitigation
Configures a mitigation type parameter map.
redirectroute
Configures a redirect enforcement action in a mitigation type policy map.
service-policy(class-map)
Attaches a policy map to a class.
service-policytypetms
Binds a TMS type service policy to a global consumer process.
sourceparameter
Attaches a mitigation type parameter map to a policy-map class configuration.
tms-class
Associates an interface with an ACL drop enforcement action.
variable
Defines the next-hop variable in a mitigation type parameter map.
policy-map type control tms
To configure a Transitory Messaging Services (TMS) type policy map, use the
policy-maptypecontroltmscommand in global configuration mode. To remove the policy map from the router configuration file, use the
no form of this command.
Note
Effective with Cisco IOS Release 12.4(20)T, the
policy-maptypecontroltms command is not available in Cisco IOS software.
policy-maptypecontroltmsname
nopolicy-maptypecontroltmsname
Syntax Description
name
The name of the TMS type policy map.
Command Default
A TMS type policy map is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.4(15)XZ
This command was integrated into Cisco IOS Release 12.4(15)XZ.
Usage Guidelines
The TMS type policy map is configured on the consumer. Entering the
policy-maptypecontroltmscommand places the router in policy-map configuration mode.
The TMS type policy map is configured to bind (or attach) TMS protocol configuration and TMS group members (routers and networking devices) to the global consumer process. The TMS type class map defines the TMS group or groups over which TMS is deployed. The TMS type parameter map defines TMS protocol specific parameters, such as operational timers and event logging.
Attaching the Policy Map to the Global TMS process
TMS type class and parameter maps are attached to the policy map to create a TMS type service policy. It is activated by configuring the
service-policytypetmscommand under the global consumer process.
Note
The mitigation type service policy (TMS Rules Engine configuration) is activated by attaching the mitigation type policy map to the TMS type policy map in policy-map class configuration mode. The TMS type policy map is then attached to the global consumer configuration.
Examples
Examples
The following example configures a TMS type service policy and a mitigation type service policy (TMS Rules configuration) on a consumer:
Router(config)# class-map type control tms TMS_CLASS_1
Router(config-cmap)# match tidp-group 10
Router(config-cmap)# exit
Router(config)# class-map type control mitigation match-all MIT_CLASS_2
Router(config-cmap)# match primitive block
Router(config-cmap)# match priority 1
Router(config-cmap)# exit
Router(config)# parameter-map type tms TMS_PAR_1
Router(config-profile)# controller ipv4 10.1.1.1
Router(config-profile)# logging tms events
Router(config-profile)# registration retry interval 60
Router(config-profile)# registration retry count 5
Router(config-profile)# exit
Router(config)# parameter-map type mitigation MIT_PAR_2
Router(config-profile)# variable COLLECTION ipv4 192.168.1.1
Router(config-profile)# exit
Router(config)# policy-map type control mitigation MIT_POL_2
Router(config-pmap)# class MIT_CLASS_2
Router(config-pmap-c)# redirect route
Router(config-pmap-c)# source parameter MIT_PAR_2
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# policy-map type control tms TMS_POL_1
Router(config-pmap)# class TMS_CLASS_1
Router(config-pmap-c)# mitigation TMS_PAR_1
Router(config-pmap-c)# service-policy MIT_POL_2
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# tms consumer
Router(config-cons)# service-policy type tms TMS_POL_1
Router(config-cons)# end
Related Commands
Command
Description
class-maptypecontrolmitigation
Configures a mitigation type class map.
class-maptypecontroltms
Configures a TMS type class map.
parameter-maptypemitigation
Configures a mitigation type parameter map.
parameter-maptypetms
Configures a TMS type parameter map.
policy-maptypecontrolmitigation
Configures a mitigation type policy map.
service-policy(class-map)
Attaches a policy map to a class.
service-policytypetms
Binds a TMS type service policy to a global consumer process.
tmsconsumer
Configures a consumer process on a router or networking device.
tmscontroller
Configures a controller process on a router or networking device.
policy-map type inspect
To create a Layer 3 and Layer 4 or a Layer 7 (protocol-specific) inspect-type policy map, use the
policy-maptypeinspectcommand in global configuration mode. To delete an inspect-type policy map, use the
no form of this command.
Name of the policy map. The name can be a maximum of 40 alphanumeric characters.
protocol-name
Layer 7 application-specific policy map. The supported protocols are as follows:
gtpv0—General Packet Radio Service (GPRS) Tunnel Protocol Version 0 (GTPv0).
gtpv1—GTP Version 1 (GTPv1)
h323—H.323 protocol, Version 4
http—HTTP
im—Instant Messenger (IM) protocol. For IM, the supported IM protocols include:
AOL Version 5 and later versions
I Seek You (ICQ) Version 2003b.5.56.1.3916.85
MSN Messenger Version 6.x and 7.x
Windows Messenger Version 5.1.0701
Yahoo Messenger Version 9.0 and later versions
imap—Internet Message Access Protocol (IMAP)
p2p—Peer-to-peer (P2P) protocol
pop3—Post Office Protocol, Version 3 (POP3)
sip—Session Initiation Protocol (SIP)
smtp—Simple Mail Transfer Protocol (SMTP)
sunrpc—Sun Remote Procedure Call (SUNRPC)
Command Default
No policy map is configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.4(9)T
This command was modified. Support for the following protocols and keywords was added:
P2P protocol and the
p2p keyword
IM protocol and the
im keyword
12.4(15)XZ
This command was modified. Support for SIP was added.
12.4(20)T
This command was modified. Support was added for the ICQ and Windows Messenger IM protocols, and following keywords were added:
icq,
winmsgr.
Support was added for the H.323 VoIP protocol and the following keyword was added:
h323.
15.1(2)T
This command was modified. Support for IPv6 was added.
Cisco IOS XE Release 3.4S
This command was modified. The following GTP keywords were added:
gtpv0,gtpv1.
Usage Guidelines
Use the
policy-maptypeinspect command to create a Layer 3 and Layer 4 inspect-type policy map or a Layer 7 application-specific inspect-type policy map. After you create a policy map, you should enter the
classtypeinspect command (as appropriate for your configuration) to specify the traffic (class) on which an action is to be performed. The class was previously defined in a class map. Thereafter, you should enter the
inspect command to enable Cisco IOS stateful packet inspection and to specify inspect-specific parameters in a parameter map.
Layer 3, Layer 4 (Top Level) Policy Maps
Top-level policy maps allow you to define high-level actions such as
inspect,
drop,
pass, and
urlfilter. You can attach the maps to a target (zone pair). The maps can contain “child” policies that are also known as application-specific Layer 7 policies.
Layer 7 (Application-Specific) Policy Maps
Application-specific policy maps are used to specify a policy for an application protocol. For example, if you want to drop HTTP traffic with Uniform Resource Identifier (URI) lengths exceeding 256 bytes, you must configure an HTTP policy map to do that. Application-specific policy maps cannot be attached directly to a target (zone pair). They must be configured as “child” policies in a top-level Layer 3 or Layer 4 policy map.
The following protocols are supported for Cisco IOS XE Release 3.4S.
GTPv0
GTPv1
HTTP
IMAP
Match-all Logical-AND all matching statements under this classmap
Match-any Logical-OR all matching statements under this classmap
POP3
SMTP
Sun RPC
Examples
The following example shows how to specify the traffic class (host) on which the drop action is to be performed:
policy-map type inspect mypolicy
class type inspect host
drop
The following example shows how to configure a policy map named my-im-pmap policy map with two IM classes, AOL and Yahoo Messenger, and allow only text-chat messages to pass through. When any packet with a service other than text-chat is seen, the connection will be reset.
class-map type inspect aol match-any my-aol-cmap
match service text-chat
!
class-map type inspect ymsgr match-any my-ysmgr-cmap
match service any
!
policy-map type inspect im my-im-pmap
class type inspect aol my-aol-cmap
allow
log
!
class type inspect ymsgr my-ysmgr-cmap
reset
log
Related Commands
Command
Description
classtypeinspect
Specifies the traffic (class) on which an action is to be performed.
policy-map type inspect urlfilter
To create or modify a URL filter type inspect policy map, use the
policy-maptypeinspecturlfilter command in global configuration mode. To delete a URL filter type inspect policy map, use the
no form of this command.
policy-maptypeinspecturlfilterpolicy-map-name
nopolicy-maptypeinspecturlfilterpolicy-map-name
Syntax Description
policy-map-name
Name of the policy map.
Command Default
No policy map is created.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(15)XZ
This command was introduced.
12.4(20)T
This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines
Use the
policy-maptypeinspecturlfiltercommand to create a URL filter type inspect policy map. The policy map specifies the traffic (classtypeurlfilter) and the actions to be performed on that traffic for the specified URL filtering policy.
Before you create a URL filter type inspect policy map, use the following commands:
class-maptypeurlfilter command to configure the match criteria for the traffic.
parameter-maptypeurlfpolicy command to specify the parameters for the URL filtering server. If you are configuring a policy for a Trend Router Provisioning Server (TRPS), you must also specify the global filtering parameters with the
parameter-maptypetrend-global command.
After you create a policy map, use the following commands to configure the URL filtering policy:
classtypeurlfilter[trend|n2h2|websense]
class-name-- Specifies the class of traffic to which the policy applies. If you specify an optional URL filtering server, you must also use the
parametertypeurlfpolicy command to specify the appropriate per-policy parameters for that URL filtering server.
For each class, use one of the URL filtering action commands to specify how to handle a URL that matches the class map. The table below lists the URL filtering action commands.
Table 10 URL Filtering Action Commands
Command
Description
allow
Permits access to the requested URL.
log
Logs the URL request.
reset
Resets the HTTP connection at both ends.
server-specifiedaction
Specifies that the traffic is handled by the URL filtering server. This action is valid only for Websense and N2H2 classes.
descriptionstring --Describes the policy.
exit--Exits the policy map.
no--Negates or sets the default value for a command.
parametertypeurlfpolicy[trend|n2h2|websense]--Specifies what type of URL filtering this policy applies to: local (default), Trend Micro, SmartFilter, or Websense.
renamepolicy-map-name--Specifies a new name for the policy map.
Examples
The following example shows a how to create a URL filter type inspect policy for a Trend Micro URL filtering server. The policy logs URL requests that match the URL categories specified in the class drop-category, and then resets the connection, thus denying the request.
class-map type urlfilter trend match-any drop-category
match url category Gambling
match url category Personals-Dating
parameter-map type trend-global global-parameter-map
server trend.example.com
parameter-map type urlfpolicy trend g1-trend-pm
max-request 2147483647
max-resp-pak 20000
allow-mode on
truncate hostname
block-page message "group1: 10.10.10.0 is blocked by Trend."
policy-map type inspect urlfilter g1-trend-policy
parameter type urlfpolicy trend g1-trend-parameter-map
class type urlfilter trend drop-category
log
reset
The following example shows a filtering policy for a Websense URL filtering server. The policy logs and allows URL requests that are in the trusted domain class, logs and denies URL requests that are in the untrusted domain class, and logs and denies URL requests that are in the keyword class.
policy-map type inspect urlfilter websense-policy
parameter type urlfpolicy websense websense-parameter-map
class type urlfilter trusted-domain-class
log
allow
class type urlfilter untrusted-domain-class
log
reset
class type urlfilter keyword-class
log
reset
Related Commands
Command
Description
class-maptypeurlfilter
Specifies the class on which a policy action is to be performed.
classtypeurlfilter
Associates a URL filter class map with a URL filtering policy maps.
parameter-maptypetrend-global
Creates or modifies the parameter map for global TRPS parameters.
parameter-maptypeurlfpolicy
Creates or modifies a parameter map for a URL filtering policy.
pool (isakmp-group)
To define a local pool address, use the
pool command in ISAKMP group configuration mode or IKEv2 authorization policy configuration mode. To remove a local pool from your configuration, use the
no form of this command.
[ ipv6 ]
poolname
no
[ ipv6 ]
poolname
Syntax Description
ipv6
(Optional) Specifies an IPv6 address pool. To specify an IPv4 address, execute the command without this keyword.
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS 12.2SX family of releases. Support in a specific 12.2SX release is dependent on your feature set, platform, and platform hardware.
Cisco IOS XE Release 3.3S
This command was integrated into Cisco IOS XE Release 3.3S.
15.2(1)T
This command was modified. The
ipv6 keyword was added.
Usage Guidelines
Use the pool command to refer to an IP local pool address, which defines a range of addresses that will be used to allocate an internal IP address to a client. Although a user must define at least one pool name, a separate pool may be defined for each group policy.
Note
This command must be defined and refer to a valid IP local pool address, or the client connection will fail.
You must enable the following commands before enabling the
dns command:
cryptoisakmpclientconfigurationgroup--Specifies the group policy information that has to be defined or changed.
cryptoikev2authorizationpolicy--Specifies the local group policy authorization parameters.
Examples
The following example shows how to refer to the local pool address named dog:
crypto isakmp client configuration group cisco
key cisco
dns 10.2.2.2 10.3.2.3
pool dog
acl 199
!
ip local pool dog 10.1.1.1 10.1.1.254
Related Commands
Command
Description
acl
Configures split tunneling.
cryptoikev2authorizationpolicy
Specifies an IKEv2 authorization policy group.
cryptoisakmpclientconfigurationgroup
Specifies the DNS domain to which a group belongs.
iplocalpool
Configures a local pool of IP addresses to be used when a remote peer connects to a point-to-point interface.
port
To specify the port on which a device listens for RADIUS requests from configured RADIUS clients, use the port command in dynamic authorization local server configuration mode. To restore the default, use the no form of this command.
portport-number
noportport-number
Syntax Description
port-number
Port number. The default value is port 1700.
Command Default
The device listens for RADIUS requests on the default port (port 1700).
Command Modes
Dynamic authorization local server configuration (config-locsvr-da-radius)
Command History
Release
Modification
12.2(28)SB
This command was introduced.
Cisco IOS XE Release 2.6
This command was integrated into Cisco IOS XE Release 2.6.
Usage Guidelines
A device (such as a router) can be configured to allow an external policy server to dynamically send updates to the router. This functionality is facilitated by the CoA RADIUS extension. CoA introduced peer-to-peer capability to RADIUS, enabling a router and external policy server each to act as a RADIUS client and server. Use the portcommand to specify the ports on which the router will listen for requests from RADIUS clients.
Examples
The following example specifies port 1650 as the port on which the device listens for RADIUS requests:
aaa server radius dynamic-author
client 10.0.0.1
port 1650
Related Commands
Command
Description
aaaserverradiusdynamic-author
Configures a device as a AAA server to facilitate interaction with an external policy server.
port (IKEv2 cluster)
To define the port number to be used by a Internet Key Exchange Version 2 (IKEv2) cluster to connect to the master gateway in a Hot Standby Router Protocol (HSRP) group, use the
port command in IKEv2 cluster configuration mode. To revert to the default port, use the
no form of this command.
portport-number
noport
Syntax Description
port-number
Port number used by an IKEv2 cluster. The range is from 1 to 65535. The default is 2012.
You must enable the
crypto ikev2 cluster command before enabling the
port command.
Examples
In the following example, the IKEv2 CLB slaves connect to the CLB Master using the port number 2221:
Router(config)# crypto ikev2 cluster
Router(config-ikev2-cluster)# port 2221
Related Commands
Command
Description
crypto ikev2 cluster
Defines an IKEv2 cluster policy in an HSRP cluster.
port (TACACS+)
To specify the TCP port to be used for TACACS+ connections, use the portcommand
in TACACS+ server configuration mode. To remove the TCP port, use the no form of this command.
port [number]
noport [number]
Syntax Description
number
(Optional) Specifies the port where the TACACS+ server receives access-request packets. The range is from 1 to 65535.
Command Default
If no port is configured, port 49 is used.
Command Modes
TACACS+ server configuration (config-server-tacacs)
Command History
Release
Modification
Cisco IOS XE Release 3.2S
This command was introduced.
Usage Guidelines
TCP port 49 is used if the number argument is not used when using the port command.
Examples
The following example shows how to specify TCP port 12:
Router (config)# tacacs server server1
Router(config-server-tacacs)# port 12
Related Commands
Command
Description
tacacsserver
Configures the TACACS+ server for IPv6 or IPv4 and enters TACACS+ server configuration mode.
port-forward
To enter webvpn port-forward list configuration mode to configure a port-forwarding list, use the port-forward command in webvpn context configuration mode. To remove the port-forwarding list from the SSL VPN context configuration, use the no form of this command.
port-forwardname
noport-forwardname
Syntax Description
name
Name of the port-forwarding list.
Command Default
Webvpn port-forward list configuration mode is not entered, and a port-forwarding list is not configured.
Command Modes
Webvpn context configuration
Command History
Release
Modification
12.3(14)T
This command was introduced.
Usage Guidelines
The port-forward command is used to create the port-forwarding list. Application port number mapping (port forwarding) is configured with the local-port command in webvpn port-forward configuration mode.
A port-forwarding list is configured for thin client mode SSL VPN. Port forwarding extends the cryptographic functions of the SSL-protected browser to provide remote access to TCP-based applications that use well-known port numbers, such as POP3, SMTP, IMAP, Telnet, and SSH.
When port forwarding is enabled, the hosts file on the SSL VPN client is modified to map the application to the port number configured in the forwarding list. The application port mapping is restored to default when the user terminates the SSL VPN session.
Examples
The following example configures port forwarding for well-known e-mail application port numbers:
Remaps an application port number in a port-forwarding list.
webvpncontext
Enters webvpn context configuration mode to configure the SSL VPN context.
port-forward (policy group)
To attach a port-forwarding list to a policy group configuration, use the port-forwardcommand in webvpn group policy configuration mode. To remove the port-forwarding list from the policy group configuration, use the no form of this command.
Name of the port-forwarding list that was configured in webvpn context configuration mode.
auto-download
(Optional) Allows for automatic download of the port-forwarding Java applet on the portal page of a website.
http-proxy
(Optional) Allows the Java applet to act as a proxy for the browser of the user.
proxy-urlhomepage-url
(Optional) Page at this URL address opens as the portal page of the user.
Command Default
A port-forwarding list is not attached to a policy group configuration.
Command Modes
Webvpn group policy configuration (config-webvpn-group)
Command History
Release
Modification
12.4(6)T
This command was introduced.
12.4(9)T
This command was modified. The auto-download keyword was added.
Usage Guidelines
The configuration of this command applies to only clientless access mode. In clientless mode, the remote user accesses the internal or corporate network using the web browser on the client machine.
Examples
The following example shows how to apply the port-forwarding list to the policy group configuration:
The following example shows that HTTP proxy has been configured. The page at URL “http://www.example.com” will automatically download as the home page of the user.
Remaps an application port number in a port-forwarding list.
policygroup
Enters webvpn group policy configuration mode to configure a group policy.
port-forward
Enters webvpn port-forward list configuration mode to configure a port-forwarding list.
webvpncontext
Enters webvpn context configuration mode to configure the SSL VPN context.
port-misuse
To permit or deny HTTP traffic through the firewall on the basis of specified applications in the HTTP message, use the port-misuse command in
appfw-policy-http
configuration mode. To disable this inspection parameter, use the no form of this command.
Peer-to-peer protocol applications subject to inspection: Kazaa and Gnutella.
tunneling
Tunneling applications subject to inspection: HTTPPort/HTTPHost, GNU Httptunnel, GotoMyPC, Firethru, Http-tunnel.com Client
im
Instant messaging protocol applications subject to inspection: Yahoo Messenger.
default
All applications are subject to inspection.
action
Applications detected within the HTTP messages that are outside of the specified application are subject to the specified action (reset or allow).
reset
Sends a TCP reset notification to the client or server if the HTTP message fails the mode inspection.
allow
Forwards the packet through the firewall.
alarm
(Optional) Generates system logging (syslog) messages for the given action.
Command Default
If this command is not enabled, HTTP messages are permitted through the firewall if any of the applications are detected within the message.
Command Modes
appfw-policy-http
configuration
Command History
Release
Modification
12.3(14)T
This command was introduced.
Examples
The following example shows how to define the HTTP application firewall policy “mypolicy.” This policy includes all supported HTTP policy rules. After the policy is defined, it is applied to the inspection rule “firewall,” which will inspect all HTTP traffic entering the FastEthernet0/0 interface.
! Define the HTTP policy.
appfw policy-name mypolicy
application http
strict-http action allow alarm
content-length maximum 1 action allow alarm
content-type-verification match-req-rsp action allow alarm
max-header-length request 1 response 1 action allow alarm
max-uri-length 1 action allow alarm
port-misuse default action allow alarm
request-method rfc default action allow alarm
request-method extension default action allow alarm
transfer-encoding type default action allow alarm
!
!
! Apply the policy to an inspection rule.
ip inspect name firewall appfw mypolicy
ip inspect name firewall http
!
!
! Apply the inspection rule to all HTTP traffic entering the FastEthernet0/0 interface.
interface FastEthernet0/0
ip inspect firewall in
!
!