3.4 Ensure non-default application inspection is configured correctly

Information

Enables the inspection of an application that is not in the default global policy application inspection

Rationale:

By default, the ASA configuration includes a policy that matches all default application inspection traffic and applies certain inspections to the traffic on all interfaces (global policy). Not all inspections are enabled by default. The default policy can be edited in order to enable inspection for a specific application that is not by default included in it.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Run the following to enable the inspection of the protocol:

hostname(config)# policy-map global_policy
hostname(config-pmap)# class inspection_default
hostname(config-pmap-c)# inspect <protocol_name>
hostname(config-pmap-c)# exit
hostname(config-pmap)# exit
hostname(config)#service-policy global_policy global

Default Value:

The default policy configuration includes the following commands to inspect applications: class-map inspection_default match default-inspection-traffic policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect ip-options inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp service-policy global_policy global

See Also

https://workbench.cisecurity.org/files/3246

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-7(12)

Plugin: Cisco

Control ID: c3ed70399ede84b60c111445598750bf2a0c35b1dd485b7ece9ef524f3f4ac04