关於FTP端口更改后ASA访问列表设置问题

 在Internet 内有一台FTP SERVER,默认FTP端口是21,但为了安全考虑把FTP SERVER的ftp端口改为2000,我在ASA上这样设置访问列表:

access-list inside extended permit tcp host 192.168.0.2  host 10.224.20.14 eq 2000

这样不能访问,但我把FTP SERVER的端口改为默认的端口,我设置如下就能访问,请问怎么解决ftp端口更改后的问题?谢谢!

access-list inside extended permit tcp host 192.168.0.2  host 10.224.20.14 eq ftp
 
 

This is the right configuration:

ASA(config)#class-map ftp_traffic
ASA(config-cmap)#match port tcp eq 2000
ASA(config)#policy-map ftp_traffic_policy
ASA(config-pmap)#class ftp_traffic
ASA(config-pmap-c)#inspect ftp
ASA(config)#service-policy ftp_traffic_policy interface inside
ASA(config)#access-list inside extended permit tcp host 192.168.0.2  host 10.224.20.14 eq 2000


 

Remark:

This document from www.cisco.com

PIX/ASA 7.X: Disable Default Global Inspection and Enable Non-Default Application Inspection

Introduction

This document describes how to remove the default inspection from global policy for an application and how to enable the inspection for a non-default application.

Prerequisites

Requirements

There are no specific requirements for this document.

Components Used

The information in this document is based on the PIX Security Appliance that runs the 7.x software image.

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Related Products

This configuration can also be used with the Adaptive Security Appliance (ASA) that runs the 7.x software image.

Conventions

Refer to Cisco Technical Tips Conventions for more information on document conventions.

Default Global Policy

By default, the configuration includes a policy that matches all default application inspection traffic and applies certain inspections to the traffic on all interfaces (a global policy). Not all inspections are enabled by default. You can apply only one global policy. If you want to alter the global policy, you must either edit the default policy or disable it and apply a new one. (An interface policy overrides the global policy.)

The default policy configuration includes these commands:

class-map inspection_default
    
    
match default-inspection-traffic
    
    
policy-map type inspect dns preset_dns_map
    
    
parameters
    
    
message-length maximum 512
    
    
policy-map global_policy
    
    
class inspection_default
    
    
inspect dns preset_dns_map
    
    
inspect ftp
    
    
inspect h323 h225
    
    
inspect h323 ras
    
    
inspect rsh
    
    
inspect rtsp
    
    
inspect esmtp
    
    
inspect sqlnet
    
    
inspect skinny
    
    
inspect sunrpc
    
    
inspect xdmcp
    
    
inspect sip
    
    
inspect netbios
    
    
inspect tftp
    
    
service-policy global_policy global
  
  

In order to disable global inspection for an application, use the no version of the inspect command.

For example, in order to remove the global inspection for the FTP application to which the security appliance listens, use the no inspect ftp command in class configuration mode.

Class configuration mode is accessible from the policy map configuration mode. In order to remove the configuration, use the no form of the command.

pixfirewall(config)#policy-map global_policy
pixfirewall(config-pmap)#class inspection_default
pixfirewall(config-pmap-c)#no inspect ftp

Note: For more information on FTP inspection, refer to PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example.

Enable Inspection for Non-Default Application

Enhanced HTTP inspection is disabled by default.

In order to enable HTTP application inspection or in order to change the ports to which the security appliance listens, use the inspect http command in class configuration mode.

Class configuration mode is accessible from policy map configuration mode. In order to remove the configuration, use the no form of this command.

When used in conjunction with the http-map argument, the inspect http command protects against specific attacks and other threats that might be associated with HTTP traffic.

For more information on how to use the http-map argument with the inspect http command, refer to the inspect http section of inspect ctiqbe through inspect xdmcp Commands.

In this example, any HTTP connection (TCP traffic on port 80) that enters the security appliance through any interface is classified for HTTP inspection. Because the policy is a global policy, inspection occurs only as the traffic enters each interface.

hostname(config)#class-map http_traffic
hostname(config-cmap)#match port tcp eq 80
hostname(config)#policy-map http_traffic_policy
hostname(config-pmap)#class http_traffic
hostname(config-pmap-c)#inspect http
hostname(config)#service-policy http_traffic_policy global

In this example, any HTTP connection (TCP traffic on port 80) that enters or exits the security appliance through the outside interface is classified for HTTP inspection.

hostname(config)#class-map http_traffic
hostname(config-cmap)#match port tcp eq 80
hostname(config)#policy-map http_traffic_policy
hostname(config-pmap)#class http_traffic
hostname(config-pmap-c)#inspect http
hostname(config)#service-policy http_traffic_policy interface outside

This example shows how to identify HTTP traffic, define an HTTP map, define a policy, and apply the policy to the outside interface:

hostname(config)#class-map http-port
   
   
hostname(config-cmap)#match port tcp eq 80
   
   
hostname(config-cmap)#exit
   
   
hostname(config)#http-map inbound_http
   
   
hostname(config-http-map)#content-length min 100 max 2000 action reset log
   
   
hostname(config-http-map)#content-type-verification match-req-rsp reset log
   
   
hostname(config-http-map)#max-header-length request bytes 100 action log reset
   
   
hostname(config-http-map)#max-uri-length 100 action reset log
   
   
hostname(config-http-map)#exit
   
   
hostname(config)#policy-map inbound_policy
   
   
hostname(config-pmap)#class http-port
   
   
hostname(config-pmap-c)#inspect http inbound_http
   
   
hostname(config-pmap-c)#exit
   
   
hostname(config-pmap)#exit
   
   
hostname(config)#service-policy inbound_policy interface outside
  • 1
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值