
6
Cisco PIX Security Appliance Release Notes Version 7.2
OL-10104-01
New Features
Typically, a client queries a server called the Endpoint Mapper (EPM) that listens on a well-known port
number for the dynamically allocated network information of a required service. The client then sets up
a secondary connection to the server instance that provides the service. The security appliance allows
the appropriate port number and network address and also applies NAT or PAT, if needed, for the
secondary connection.
For more information, see the “DCERPC Inspection” section in the Cisco Security Appliance Command
Line Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Enhanced NetBIOS Inspection
This feature allows you to change the default configuration values used for NetBIOS application
inspection.
NetBIOS application inspection performs NAT for the embedded IP address in the NetBIOS name
service packets and NetBIOS datagram services packets. It also enforces protocol conformance by
checking the various count and length fields for consistency.
For more information, see the “NetBIOS Inspection” section in the Cisco Security Appliance Command
Line Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Enhanced H.323 Inspection
This feature allows you to change the default configuration values used for H.323 application inspection.
H.323 inspection supports RAS, H.225, and H.245, and its functionality translates all embedded IP
addresses and ports. It performs state tracking and filtering and can do a cascade of inspect function
activation. H.323 inspection supports phone number filtering, dynamic T.120 control, H.245 tunneling
control, protocol state tracking, H.323 call duration enforcement, and audio and video control.
For more information, see the “H.323 Inspection” section in the Cisco Security Appliance Command
Line Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Enhanced DNS Inspection
This feature allows you to specify actions when a message violates a parameter that uses a DNS
inspection policy map. DNS application inspection supports DNS message controls that provide
protection against DNS spoofing and cache poisoning. User configurable rules allow filtering based on the
DNS header, domain name, and resource record TYPE and CLASS.
For more information, see the “DNS Inspection” section in the Cisco Security Appliance Command Line
Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Enhanced FTP Inspection
This feature allows you to change the default configuration values used for FTP application inspection.
FTP command filtering and security checks are provided using strict FTP inspection for improved
security and control. Protocol conformance includes packet length checks, delimiters and packet format
checks, command terminator checks, and command validation.
Komentarze do niniejszej Instrukcji