![]() |
Table Of Contents
H.323 RAS Support in Cisco IOS Firewall
Restrictions for H.323 RAS Support in Cisco IOS Firewall
How to Configure a Firewall Policy for H.323 RAS Protocol Inspection
Configuring a Class Map for H.323 RAS Protocol Inspection
Creating a Policy Map for H.323 RAS Protocol Inspection
Configuration Examples for H.225 RAS Protocol Inspection
H.323 RAS Protocol Inspection Configuration: Example
Feature Information for H.323 RAS Support in Cisco IOS Firewall
H.323 RAS Support in Cisco IOS Firewall
First Published: November 17, 2006Last Updated: November 17, 2006This feature introduces support for H.225 Registration, Admission, and Status (RAS) signaling in Cisco IOS firewalls. RAS is a signaling protocol that is used between endpoints (such as gateways) and gatekeepers.
The H.225 standard is used by H.323 for call setup. H.255 includes RAS control, which is used to communicate with the gatekeeper. A RAS signaling channel enables connections between the gatekeeper and H.323 endpoints.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Feature Information for H.323 RAS Support in Cisco IOS Firewall" section.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•
Restrictions for H.323 RAS Support in Cisco IOS Firewall
•
How to Configure a Firewall Policy for H.323 RAS Protocol Inspection
•
Configuration Examples for H.225 RAS Protocol Inspection
•
Feature Information for H.323 RAS Support in Cisco IOS Firewall
Restrictions for H.323 RAS Support in Cisco IOS Firewall
H.225 RAS inspection is supported only with zone-based policy firewall inspection.
How to Configure a Firewall Policy for H.323 RAS Protocol Inspection
This section contains the following configuration tasks:
•
Configuring a Class Map for H.323 RAS Protocol Inspection
•
Creating a Policy Map for H.323 RAS Protocol Inspection
Configuring a Class Map for H.323 RAS Protocol Inspection
Use this task to configure a class map for classifying network traffic.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
class-map type inspect [match any | match all] class-map-name
4.
match access-group {access-group | name access-group-name}
5.
match protocol protocol-name [signature]
6.
match class-map class-map-name
7.
exit
DETAILED STEPS
Creating a Policy Map for H.323 RAS Protocol Inspection
Use this task to create a policy map for a firewall policy that will be attached to zone pairs.
Note
If you are creating an inspect type policy map, only the following actions are allowed: drop, inspect, police, and pass.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
policy-map type inspect policy-map-name
4.
class type inspect class-name
5.
inspect [parameter-map-name]
6.
police rate bps burst size
7.
drop [log]
8.
pass
9.
exit
DETAILED STEPS
What to Do Next
After configuring an H.323 RAS protocol firewall policy, you want to attach the policy to a zone pair. For information on completing this task, see the "Zone-Based Policy Firewall" module.
Configuration Examples for H.225 RAS Protocol Inspection
This section contains the following configuration example:
•
H.323 RAS Protocol Inspection Configuration: Example
H.323 RAS Protocol Inspection Configuration: Example
The following example shows how to configure an H.323 RAS protocol inspection policy:
class-map type inspect match-any c1match protocol h323match protocol h225rasclass-map type inspect match-all c2match protocol icmp!policy-map type inspect p1class type inspect c1inspectclass class-defaultdroppolicy-map type inspect p2class type inspect c2inspectclass class-defaultdrop!zone security z1description One-Network zonezone security z2description Two-Network zonezone-pair security zp source z1 destination z2service-policy type inspect p1zone-pair security zp-rev source z2 destination z1service-policy type inspect p2!interface FastEthernet1/0ip address 10.0.0.0 255.255.0.0zone-member security z1duplex autospeed auto!interface FastEthernet1/1ip address 10.0.1.1 255.255.0.0zone-member security z2duplex autospeed autoAdditional References
The following sections provide references related to the H.323 RAS Support in Cisco IOS Firewall feature.
Related Documents
Related Topic Document TitleZone-based policy information: configurations, examples, descriptions
Zone-Based Policy Firewall, Cisco IOS Release 12.4(9)T
Zone-based policy configuration commands
MIBs
MIB MIBs LinkNo new or modified MIBs are supported.
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
Technical Assistance
Command Reference
This section documents the following modified command only:
match protocol (zone)
To configure the match criterion for a class map on the basis of the specified protocol, use the match protocol (zone) command in class-map configuration mode. To remove the protocol-based match criterion from a class map, use the no form of this command.
match protocol protocol-name [parameter-map] [signature]
no match protocol protocol-name [parameter-map] [signature]
Syntax Description
Command Default
None
Command Modes
Class-map configuration
Command History
Usage Guidelines
Use the match protocol (zone) command to specify traffic based on a particular protocol. You can use this command in conjunction with the match access-group and match class-map commands to build sophisticated traffic classes.
The match protocol (zone) command is available under the class-map type inspect command.
If you enter the match protocol (zone) command under the class-map type inspect command, the Port to Application Mapping (PAM) mappings are honored when the protocol field in the packet is matched against this command. All the port mappings configured in PAM appear under the class map.
Examples
The following example specifies a class map called c1 and configures the HTTP protocol as a match criterion:class-map type inspect c1match protocol httpRelated Commands
Command Descriptionclass-map type inspect
Creates a Layer 3 or Layer 4 inspect type class map.
match access-group
Configures the match criteria for a class map based on the specified ACL.
Feature Information for H.323 RAS Support in Cisco IOS Firewall
Table 1 lists the release history for this feature.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2006 Cisco Systems, Inc. All rights reserved.