Cisco PIX-515-RPS - PIX 515-R - Firewall Instrukcja Użytkownika Strona 7

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 28
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 6
7
Cisco PIX Security Appliance Release Notes Version 7.2
OL-10104-01
New Features
Blocking FTP based on user values is also supported so that it is possible for FTP sites to post files for
download but restrict access to certain users. You can block FTP connections based on file type, server
name, and other attributes. System message logs are generated if an FTP connection is denied after
inspection.
For more information, see the “FTP Inspection” section in the Cisco Security Appliance Command Line
Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Enhanced HTTP Inspection
This feature allows you to change the default configuration values used for HTTP application inspection.
HTTP application inspection scans HTTP headers and body and performs various checks on the data.
These checks prevent various HTTP constructs, content types, and tunneling and messaging protocols
from traversing the security appliance.
HTTP application inspection can block tunneled applications and non-ASCII characters in HTTP
requests and responses, preventing malicious content from reaching the web server. Size limiting of
various elements in HTTP request and response headers, URL blocking, and HTTP server header type
spoofing are also supported.
For more information, see the “HTTP Inspection” section in the Cisco Security Appliance Command
Line Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Enhanced Skinny (SCCP) Inspection
This feature allows you to change the default configuration values used for SCCP (Skinny) application
inspection.
Skinny application inspection performs translation of embedded IP address and port numbers within the
packet data and dynamic opening of pinholes. It also performs additional protocol conformance checks
and basic state tracking.
For more information, see the “Skinny (SCCP) Inspection” section in the Cisco Security Appliance
Command Line Configuration Guide. For a complete description of the command syntax, see the Cisco
Security Appliance Command Reference.
Enhanced SIP Inspection
This feature allows you to change the default configuration values used for SIP application inspection.
SIP is a widely used protocol for Internet conferencing, telephony, events notification, and instant
messaging. Partially because of its text-based nature and partially because of its flexibility, SIP networks
are subject to a large number of security threats.
SIP application inspection provides address translation in the message header and body, dynamic
opening of ports, and basic sanity checks. It also supports application security and protocol
conformance, which enforces the sanity of the SIP messages, as well as detects SIP-based attacks.
For more information, see the “SIP Inspection” section in the Cisco Security Appliance Command Line
Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Przeglądanie stron 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 27 28

Komentarze do niniejszej Instrukcji

Brak uwag