H.323 RAS Support in Cisco IOS Firewall
|
|||||||||||||||||||||||||||||||||||||||||||||||
Contents
H.323 RAS Support in Cisco IOS FirewallLast Updated: December 21, 2012
This feature introduces support for H.225 Registration, Admission, and Status (RAS) signaling in Cisco IOS firewalls. RAS is a signaling protocol that is used between endpoints (such as gateways) and gatekeepers. The H.225 standard is used by H.323 for call setup. H.255 includes RAS control, which is used to communicate with the gatekeeper. A RAS signaling channel enables connections between the gatekeeper and H.323 endpoints.
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for H.323 RAS Support in Cisco IOS FirewallH.225 RAS inspection is supported only with zone-based policy firewall inspection. How to Configure a Firewall Policy for H.323 RAS Protocol Inspection
Configuring a Class Map for H.323 RAS Protocol Inspection
SUMMARY STEPS
DETAILED STEPS Creating a Policy Map for H.323 RAS Protocol InspectionUse this task to create a policy map for a firewall policy that will be attached to zone pairs.
DETAILED STEPS
Configuration Examples for H.225 RAS Protocol InspectionExample H.323 RAS Protocol Inspection ConfigurationThe following example shows how to configure an H.323 RAS protocol inspection policy: class-map type inspect match-any c1 match protocol h323 match protocol h225ras class-map type inspect match-all c2 match protocol icmp ! policy-map type inspect p1 class type inspect c1 inspect class class-default drop policy-map type inspect p2 class type inspect c2 inspect class class-default drop ! zone security z1 description One-Network zone zone security z2 description Two-Network zone zone-pair security zp source z1 destination z2 service-policy type inspect p1 zone-pair security zp-rev source z2 destination z1 service-policy type inspect p2 ! interface FastEthernet1/0 ip address 10.0.0.0 255.255.0.0 zone-member security z1 duplex auto speed auto ! interface FastEthernet1/1 ip address 10.0.1.1 255.255.0.0 zone-member security z2 duplex auto speed auto Example H.225 RAS Firewall Policy ConfigurationThe following example shows how to configure the firewall policy to inspect H.225 RAS messages: interface GigabitEthernet 0/1/5 ip address 172.16.0.0 255.255.0.0 zone-member security private no shut ! interface GigabitEthernet 0/1/6 ip address 192.168.0.0 255.255.0.0 zone-member security internet no shut ! zone security private zone security internet ! class-map type inspect match-any internet-traffic-class match protocol h225ras match protocol h323 ! policy-map type inspect private-internet-policy class type inspect internet-traffic-class inspect class class-default ! zone-pair security private-internet source private destination internet service-policy type inspect private-internet-policy Additional References for ALG-H.323 vTCP with High Availability Support for Firewall and NATTechnical Assistance
Feature Information for H.323 RAS Support in Cisco IOS FirewallThe following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. © 2012 Cisco Systems, Inc. All rights reserved.
|
|||||||||||||||||||||||||||||||||||||||||||||||