- Application Inspection and Control for SMTP
- Cisco IOS Firewall H.323 Support
- Cisco IOS Firewall Support for Skinny Local Traffic and CME
- H.323 RAS Support in Cisco IOS Firewall
- Cisco IOS Firewall: SIP Enhancements: ALG and AIC
- Subscription-based Cisco IOS Content Filtering
- Zone-Based Policy Firewall
- Finding Feature Information
- Contents
- Restrictions for H.323 RAS Support in Cisco IOS Firewall
- How to Configure a Firewall Policy for H.323 RAS Protocol Inspection
H.323 RAS Support in Cisco IOS Firewall
This feature introduces support for H.225 Registration, Admission, and Status (RAS) signaling in Cisco IOS firewalls. RAS is a signaling protocol that is used between endpoints (such as gateways) and gatekeepers.
The H.225 standard is used by H.323 for call setup. H.255 includes RAS control, which is used to communicate with the gatekeeper. A RAS signaling channel enables connections between the gatekeeper and H.323 endpoints.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the "Feature Information for H.323 RAS Support in Cisco IOS Firewall" section.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•Restrictions for H.323 RAS Support in Cisco IOS Firewall
•How to Configure a Firewall Policy for H.323 RAS Protocol Inspection
•Configuration Examples for H.225 RAS Protocol Inspection
•Feature Information for H.323 RAS Support in Cisco IOS Firewall
Restrictions for H.323 RAS Support in Cisco IOS Firewall
H.225 RAS inspection is supported only with zone-based policy firewall inspection.
How to Configure a Firewall Policy for H.323 RAS Protocol Inspection
•Configuring a Class Map for H.323 RAS Protocol Inspection
•Creating a Policy Map for H.323 RAS Protocol Inspection
Configuring a Class Map for H.323 RAS Protocol Inspection
Use this task to configure a class map for classifying network traffic.
SUMMARY STEPS
1. enable
2. configure terminal
3. class-map type inspect [match any | match all] class-map-name
4. match access-group {access-group | name access-group-name}
5. match protocol protocol-name [signature]
6. match protocol protocol-name [signature]
7. match class-map class-map-name
8. exit
DETAILED STEPS
Creating a Policy Map for H.323 RAS Protocol Inspection
Use this task to create a policy map for a firewall policy that will be attached to zone pairs.
Note If you are creating an inspect type policy map, only the following actions are allowed: drop, inspect, police, and pass.
SUMMARY STEPS
1. enable
2. configure terminal
3. policy-map type inspect policy-map-name
4. class type inspect class-name
5. inspect [parameter-map-name]
6. police rate bps burst size
7. drop [log]
8. pass
9. exit
DETAILED STEPS
What to Do Next
After configuring an H.323 RAS protocol firewall policy, you want to attach the policy to a zone pair. For information on completing this task, see the "Zone-Based Policy Firewall" module.
Configuration Examples for H.225 RAS Protocol Inspection
•Example: H.323 RAS Protocol Inspection Configuration
•Example: H.225 RAS Firewall Policy Configuration
Example: H.323 RAS Protocol Inspection Configuration
The following example shows how to configure an H.323 RAS protocol inspection policy:
class-map type inspect match-any c1
match protocol h323
match protocol h225ras
class-map type inspect match-all c2
match protocol icmp
!
policy-map type inspect p1
class type inspect c1
inspect
class class-default
drop
policy-map type inspect p2
class type inspect c2
inspect
class class-default
drop
!
zone security z1
description One-Network zone
zone security z2
description Two-Network zone
zone-pair security zp source z1 destination z2
service-policy type inspect p1
zone-pair security zp-rev source z2 destination z1
service-policy type inspect p2
!
interface FastEthernet1/0
ip address 10.0.0.0 255.255.0.0
zone-member security z1
duplex auto
speed auto
!
interface FastEthernet1/1
ip address 10.0.1.1 255.255.0.0
zone-member security z2
duplex auto
speed auto
Example: H.225 RAS Firewall Policy Configuration
The following example shows how to configure the firewall policy to inspect H.225 RAS messages:
interface GigabitEthernet 0/1/5 ip address 172.16.0.0 255.255.0.0 zone-member security private no shut ! interface GigabitEthernet 0/1/6 ip address 192.168.0.0 255.255.0.0 zone-member security internet no shut ! zone security private zone security internet ! class-map type inspect match-any internet-traffic-class match protocol h225ras match protocol h323 ! policy-map type inspect private-internet-policy class type inspect internet-traffic-class inspect class class-default ! zone-pair security private-internet source private destination internet service-policy type inspect private-internet-policy
Additional References
Related Documents
|
|
---|---|
Cisco IOS commands |
|
Zone-based policy configuration commands |
|
Zone-based policy information: configurations, examples, descriptions |
MIBs
|
|
---|---|
No new or modified MIBs are supported. |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: |
Technical Assistance
Feature Information for H.323 RAS Support in Cisco IOS Firewall
Table 1 lists the features in this module and provides links to specific configuration information.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 1 lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.