- Zone-Based Policy Firewalls
- Zone-Based Policy Firewall IPv6 Support
- VRF-Aware Cisco Firewall
- Zone-Based Policy Firewall High Availability
- Interchassis Asymmetric Routing Support for Zone-Based Policy Firewalls
- WAAS Support in Zone-Based Firewalls
- Zone-Based Firewall Logging Export Using NetFlow
- Cisco IOS Firewall-SIP Enhancements ALG and AIC
- Firewall-H.323 V3 V4 Support
- H.323 RAS Support
- Application Inspection and Control for SMTP
- Subscription-Based Cisco IOS Content Filtering
- Cisco IOS Firewall Support for Skinny Local Traffic and CME
- User-Based Firewall Support
- On-Device Management for Security Features
H.323 RAS Support
This feature introduces support for H.225 Registration, Admission, and Status (RAS) signaling in zone-based firewalls. RAS is a signaling protocol that is used between endpoints (such as gateways) and gatekeepers.
The H.225 standard is used by H.323 for call setup. H.255 includes RAS control, which is used to communicate with the gatekeeper. A RAS signaling channel enables connections between the gatekeeper and H.323 endpoints.
- Finding Feature Information
- Restrictions for H.323 RAS Support
- How to Configure H.323 RAS Support
- Configuration Examples for H.323 RAS Support
- Additional References for H.323 RAS Support
- Feature Information for H.323 RAS Support
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for H.323 RAS Support
H.225 RAS inspection is supported only with zone-based policy firewall inspection.
How to Configure H.323 RAS Support
- Configuring a Class Map for H.323 RAS Protocol Inspection
- Creating a Policy Map for H.323 RAS Protocol Inspection
Configuring a Class Map for H.323 RAS Protocol Inspection
Use this task to configure a class map for classifying network traffic.
1.
enable
2.
configure
terminal
3.
class-map
type
inspect
[match-any | match-all] class-map-name
4.
match
access-group
{access-group | name access-group-name}
5.
match
protocol
protocol-name
[signature]
6.
match
protocol
protocol-name
[signature]
7.
match
class-map
class-map-name
8.
exit
DETAILED STEPS
Creating a Policy Map for H.323 RAS Protocol Inspection
Use this task to create a policy map for a firewall policy that will be attached to zone pairs.
Note | If you are creating an inspect type policy map, only the following actions are allowed: drop, inspect, police, and pass. |
1.
enable
2.
configure
terminal
3.
policy-map
type
inspect
policy-map-name
4.
class
type
inspect
class-name
5.
inspect
[parameter-map-name]
6.
police
rate
bps burst size
7.
drop
[log]
8.
pass
9.
exit
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable
Example: Router> enable |
Enables privileged EXEC mode.
| ||
Step 2 |
configure
terminal
Example: Router# configure terminal |
Enters global configuration mode. | ||
Step 3 |
policy-map
type
inspect
policy-map-name
Example: Router(config)# policy-map type inspect p1 |
Creates a Layer 3 and Layer 4 inspect type policy map and enters policy-map configuration mode. | ||
Step 4 |
class
type
inspect
class-name
Example: Router(config-pmap)# class type inspect c1 |
Specifies the traffic (class) on which an action is to be performed and enters policy-map class configuration mode. | ||
Step 5 |
inspect
[parameter-map-name] Example: Router(config-pmap-c)# inspect inspect-params |
Enables Cisco IOS stateful packet inspection. | ||
Step 6 |
police
rate
bps burst size
Example: Router(config-pmap-c)# police rate 2000 burst 3000 |
(Optional) Limits traffic matching within a firewall (inspect) policy. | ||
Step 7 |
drop
[log] Example: Router(config-pmap-c)# drop |
(Optional) Drops packets that are matched with the defined class.
| ||
Step 8 |
pass
Example: Router(config-pmap-c)# pass |
(Optional) Allows packets that are matched with the defined class. | ||
Step 9 |
exit
Example: Router(config-pmap-c)# exit |
Returns to policy-map configuration mode. |
What to Do Next
After configuring an H.323 RAS protocol firewall policy, you want to attach the policy to a zone pair. For information on completing this task, see the “Zone-Based Policy Firewall” module.
Configuration Examples for H.323 RAS Support
Example H.323 RAS Protocol Inspection Configuration
The following example shows how to configure an H.323 RAS protocol inspection policy:
class-map type inspect match-any c1 match protocol h323 match protocol h225ras class-map type inspect match-all c2 match protocol icmp ! policy-map type inspect p1 class type inspect c1 inspect class class-default drop policy-map type inspect p2 class type inspect c2 inspect class class-default drop ! zone security z1 description One-Network zone zone security z2 description Two-Network zone zone-pair security zp source z1 destination z2 service-policy type inspect p1 zone-pair security zp-rev source z2 destination z1 service-policy type inspect p2 ! interface FastEthernet1/0 ip address 10.0.0.0 255.255.0.0 zone-member security z1 duplex auto speed auto ! interface FastEthernet1/1 ip address 10.0.1.1 255.255.0.0 zone-member security z2 duplex auto speed auto
Example H.225 RAS Firewall Policy Configuration
The following example shows how to configure the firewall policy to inspect H.225 RAS messages:
interface GigabitEthernet 0/1/5 ip address 172.16.0.0 255.255.0.0 zone-member security private no shut ! interface GigabitEthernet 0/1/6 ip address 192.168.0.0 255.255.0.0 zone-member security internet no shut ! zone security private zone security internet ! class-map type inspect match-any internet-traffic-class match protocol h225ras match protocol h323 ! policy-map type inspect private-internet-policy class type inspect internet-traffic-class inspect class class-default ! zone-pair security private-internet source private destination internet service-policy type inspect private-internet-policy
Additional References for H.323 RAS Support
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
Firewall commands |
|
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for H.323 RAS Support
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Information |
---|---|---|
H.323 RAS Support |
12.4(11)T |
H.323 RAS Support feature introduces support for H.255 Registration, Admission, and Status (RAS) signaling in zone-based firewalls. The following command was introduced or modified: match protocol (zone). |