If both are doing action "inspect" that is the way I understood it yeah,
but evidently I am missing something.  Anxiously awaiting a response from
somebody that knows what they are talking about more than I do haha

On Thu, Mar 22, 2012 at 4:40 PM, Eugene Pefti <[email protected]>wrote:

>  Oh, Christ...****
>
> In plain old English it should have said:****
>
> If you match the traffic for HTTP inspection in your custom class than the
> ASA will not match the same HTTP traffic in the default class.****
>
> Correct ?****
>
> ** **
>
> ****
>
> *From:* Joe Astorino [mailto:[email protected]]
> *Sent:* 22 March 2012 13:31
> *To:* Piotr Kaluzny
>
> *Cc:* Eugene Pefti; [email protected]
> *Subject:* Re: [OSL | CCIE_Security] Application not inspected once
> deniede****
>
>  ** **
>
> You guys have made me go doubt myself (hate when that happens!)
> haha...here is how I understood the technology to work, based on the
> following from the 8.0 configuration guide.  I take this to mean that if
> the packet matched the FIRST class map you have there matching on the ACL
> and it ALSO matched the class default policy, but the "feature type" was
> the same (inspect) that the action taken would be solely based on the first
> match (deny the flow in this case).  What am I missing?
>
> *Feature Matching Guidelines Within a Policy Map
>
> See the following guidelines for how a packet matches class maps in a
> policy map:
>
> 1. A packet can match only one class map in the policy map for each
> feature type.
>
> 2. When the packet matches a class map for a feature type, the security
> appliance does not attempt to match it to any subsequent class maps for
> that feature type.
>
> 3. If the packet matches a subsequent class map for a different feature
> type, however, then the security appliance also applies the actions for the
> subsequent class map, if supported. See the "Incompatibility of Certain
> Feature Actions" section for more information about unsupported
> combinations.
>
> For example, if a packet matches a class map for connection limits, and
> also matches a class map for application inspection, then both class map
> actions are applied.
>
> If a packet matches a class map for HTTP inspection, but also matches
> another class map that includes HTTP inspection, then the second class map
> actions are not applied. *
>
> On Thu, Mar 22, 2012 at 4:27 PM, Joe Astorino <[email protected]>
> wrote:
> > This is probably a dumb question, but I don't care : )  I don't
> > understand the logic of this situation.  Why should the traffic be
> > inspected if it is explicitly denied in the first class map?  At first
> > glance, I would think it works as it should -- The traffic flow comes
> > in, it is denied for inspection in the first class-map.  Why would it
> > pass through and be inspected by the class default?
> >
> > On Thu, Mar 22, 2012 at 4:05 PM, Piotr Kaluzny <[email protected]>
> wrote:
> >> Eugene,
> >>
> >> I don't believe "match not" is available in L3/4 class-map, at least it
> was
> >> not in older versions of code
> >>
> >> Regards,
> >> --
> >> Piotr Kaluzny
> >> CCIE #25665 (Security), CCSP, CCNP
> >> Sr. Support Engineer - IPexpert, Inc.
> >> URL: http://www.IPexpert.com
> >>
> >>
> >> On Thu, Mar 22, 2012 at 7:48 PM, Eugene Pefti <[email protected]>
> >> wrote:
> >>>
> >>> Wouldn’t it be better to use “match not” statement in the first
> class-map
> >>> to pass it to the default inspection class ?
> >>>
> >>>
> >>>
> >>> From: Piotr Kaluzny [mailto:[email protected]]
> >>> Sent: 22 March 2012 11:43
> >>> To: Kingsley Charles
> >>> Cc: Eugene Pefti; [email protected]
> >>> Subject: Re: [OSL | CCIE_Security] Application not inspected once
> deniede
> >>>
> >>>
> >>>
> >>> It won't hit any other class, again it is a little bit different with
> >>> "deny" in ACL than in MPF.
> >>>
> >>> The logic here is that the "deny" ACL entry actually matches the class
> as
> >>> long as an action (like e.g. inspect) is configured for this class. The
> >>> action will not be performed, however - it turns the specified action
> off
> >>> for the flow - useful with "inspect" when you want to only allow
> passive or
> >>> active FTP, not both.
> >>>
> >>> Regards,
> >>> --
> >>> Piotr Kaluzny
> >>> CCIE #25665 (Security), CCSP, CCNP
> >>> Sr. Support Engineer - IPexpert, Inc.
> >>> URL: http://www.IPexpert.com
> >>>
> >>> On Thu, Mar 22, 2012 at 7:04 PM, Kingsley Charles
> >>> <[email protected]> wrote:
> >>>
> >>> The denied http traffic should have been inspected by the next default
> >>> class map which is not happening.
> >>>
> >>> With regards
> >>> Kings
> >>>
> >>>
> >>>
> >>> On Thu, Mar 22, 2012 at 1:52 PM, Eugene Pefti <[email protected]
> >
> >>> wrote:
> >>>
> >>> I fear I didn't understand your question, Kings.
> >>>
> >>> Isn't what you are doing with placing the custom web class-map in
> front of
> >>> the default inspection class map to have the ASA inspection match
> first on
> >>> the traffic to 10.20.30.40.
> >>>
> >>> Or your point why HTTP is not inspected in the first place if we use
> >>> "deny" ACE? I believe we "permit" in the ACE to define the traffic
> that will
> >>> be matched and "deny" to exclude it from matching
> >>>
> >>>
> >>>
> >>> Eugene
> >>>
> >>>
> >>>
> >>> From: Kingsley Charles <[email protected]>
> >>> Date: Thu, 22 Mar 2012 12:59:24 +0530
> >>> To: <[email protected]>
> >>> Subject: [OSL | CCIE_Security] Application not inspected once deniede
> >>>
> >>>
> >>>
> >>> Hi all
> >>>
> >>> In ASA, once if we deny the flow for inspection, it never gets
> inspected
> >>> back in other policies. In the below configuration, http traffic to
> >>> 10.20.30.40 is not inspected by the  class inspection_default.
> >>>
> >>> Any comments?
> >>>
> >>>
> >>> HTTP traffic to 10.20.30.40 not inspect under  class inspection_default
> >>>
> >>> access-list web extended deny tcp any host 10.20.30.40 eq www
> >>> access-list web extended permit tcp any any eq www
> >>>
> >>> class-map web
> >>>  match access-list web
> >>>
> >>> policy-map global_policy
> >>>  class web
> >>>   inspect http
> >>>  class inspection_default
> >>>   inspect dns preset_dns_map
> >>>   inspect ftp
> >>>   inspect h323 h225
> >>>   inspect h323 ras
> >>>   inspect netbios
> >>>   inspect rsh
> >>>   inspect rtsp
> >>>   inspect skinny
> >>>   inspect esmtp
> >>>   inspect sqlnet
> >>>   inspect sunrpc
> >>>   inspect tftp
> >>>   inspect sip
> >>>   inspect xdmcp
> >>>   inspect http
> >>>
> >>>
> >>>
> >>> With regards
> >>> Kings
> >>>
> >>> _______________________________________________ For more information
> >>> regarding industry leading CCIE Lab training, please visit
> www.ipexpert.com
> >>> Are you a CCNP or CCIE and looking for a job? Check out
> >>> www.PlatinumPlacement.com
> >>>
> >>>
> >>>
> >>>
> >>> _______________________________________________
> >>> For more information regarding industry leading CCIE Lab training,
> please
> >>> visit www.ipexpert.com
> >>>
> >>> Are you a CCNP or CCIE and looking for a job? Check out
> >>> www.PlatinumPlacement.com
> >>>
> >>>
> >>
> >>
> >>
> >> _______________________________________________
> >> For more information regarding industry leading CCIE Lab training,
> please
> >> visit www.ipexpert.com
> >>
> >> Are you a CCNP or CCIE and looking for a job? Check out
> >> www.PlatinumPlacement.com
> >
> >
> >
> > --
> > Regards,
> >
> > Joe Astorino
> > CCIE #24347
> > http://astorinonetworks.com
> >
> > "He not busy being born is busy dying" - Dylan
>
>
>
> --
> Regards,
>
> Joe Astorino
> CCIE #24347
> http://astorinonetworks.com
>
> "He not busy being born is busy dying" - Dylan****
>



-- 
Regards,

Joe Astorino
CCIE #24347
http://astorinonetworks.com

"He not busy being born is busy dying" - Dylan
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to