Supported features for through traffic, Supported features for management traffic, Feature directionality – Cisco ASA 5505 User Manual
Page 640
32-2
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter 32 Configuring a Service Policy Using the Modular Policy Framework
Information About Service Policies
Supported Features for Through Traffic
lists the features supported by Modular Policy Framework.
Supported Features for Management Traffic
Modular Policy Framework supports the following features for management traffic:
•
Application inspection for RADIUS accounting traffic—See
Chapter 46, “Configuring Inspection
for Management Application Protocols.”
•
Connection limits—See
Chapter 53, “Configuring Connection Settings.”
Feature Directionality
Actions are applied to traffic bidirectionally or unidirectionally depending on the feature. For features
that are applied bidirectionally, all traffic that enters or exits the interface to which you apply the policy
map is affected if the traffic matches the class map for both directions.
Table 32-1
Modular Policy Framework
Feature
See:
Application inspection (multiple types)
•
Chapter 42, “Getting Started with Application Layer
Protocol Inspection.”
•
Chapter 43, “Configuring Inspection of Basic Internet
Protocols.”
•
Chapter 44, “Configuring Inspection for Voice and
Video Protocols.”
•
Chapter 45, “Configuring Inspection of Database and
Directory Protocols.”
•
Chapter 46, “Configuring Inspection for Management
Application Protocols.”
ASA CSC
Chapter 60, “Configuring the ASA CSC Module.”
ASA IPS
Chapter 58, “Configuring the ASA IPS Module.”
ASA CX
Chapter 59, “Configuring the ASA CX Module.”
NetFlow Secure Event Logging filtering
Chapter 78, “Configuring NetFlow Secure Event Logging
(NSEL).”
QoS input and output policing
Chapter 54, “Configuring QoS.”
QoS standard priority queue
Chapter 54, “Configuring QoS.”
QoS traffic shaping, hierarchical priority
queue
Chapter 54, “Configuring QoS.”
TCP and UDP connection limits and
timeouts, and TCP sequence number
randomization
Chapter 53, “Configuring Connection Settings.”
TCP normalization
Chapter 53, “Configuring Connection Settings.”
TCP state bypass