-
- IP Access List Features Roadmap
- IP Access List Overview
- Creating an IP Access List and Applying It to an Interface
- Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values
- Refining an IP Access List
- Displaying and Clearing IP Access List Data Using ACL Manageability
- Controlling Access to a Virtual Terminal Line
- Access List-Based RBSCP
- ACL IP Options Selective Drop
- ACL Authentication of Incoming rsh and rcp Requests
- Configuring Lock-and-Key Security for Dynamic Access Lists
- Configuring IP Session Filtering of Reflexive Access Lists
- Configuring TCP Intercept and Preventing Denial-of-Service Attacks
-
- Configuring Context-based Access Control
- Application Firewall - Instant Message Traffic Enforcement
- Cisco IOS Firewall MIB
- Cisco IOS Firewall Performance Improvements
- Cisco IOS Firewall Stateful Failover
- Cisco IOS Firewall Support for TRP
- Email Inspection Engine
- ESMTP Support for Cisco IOS Firewall
- Firewall ACL Bypass
- Firewall N2H2 Support
- Firewall Stateful Inspection of ICMP
- Firewall Support for SIP
- Firewall Support of Skinny Client Control Protocol
- Firewall Websense URL Filtering
- Granular Protocol Inspection
- HTTP Inspection Engine
- Inspection of Router-Generated Traffic
- TCP Out-of-Order Packet Support for Cisco IOS Firewall and Cisco IOS IPS
- Transparent Cisco IOS Firewall
- Virtual Fragmentation Reassembly
- VRF Aware Cisco IOS Firewall
- Configuring Port to Application Mapping
- Configuring Cisco IOS Intrusion Prevention System (IPS)
- Configuring IP Security Options
- Finding Feature Information
- Contents
- Prerequisites Cisco IOS Firewall MIB
- Restrictions for Cisco IOS Firewall MIB
- Information About Cisco IOS Firewall MIB
- How to Configure Cisco IOS Firewall MIB
Cisco IOS Firewall MIB
The Cisco IOS Firewall MIB feature introduces support for the Cisco Unified Firewall MIB, which helps to manage and monitor firewall performance via Simple Network Management Protocol (SNMP). Statistics can be collected and monitored via standards-based SNMP techniques for firewall features such as stateful packet inspection and URL filtering.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the "Feature Information for Cisco IOS Firewall MIB" section.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•
Prerequisites Cisco IOS Firewall MIB
•
Restrictions for Cisco IOS Firewall MIB
•
Information About Cisco IOS Firewall MIB
•
How to Configure Cisco IOS Firewall MIB
•
Configuration Examples for Cisco IOS Firewall MIB Monitoring
•
Feature Information for Cisco IOS Firewall MIB
Prerequisites Cisco IOS Firewall MIB
Before you can provide firewall connection and URL filtering statistics via SNMP, you must set up the firewall by performing the following tasks:
•
Configure a firewall policy via the ip inspect name command.
•
Enable the firewall by applying the firewall on a target via the interface command followed by the ip inspect command.
•
Enable URL filtering, if applicable, via the ip urlfilter server vendor command.
You must also enable SNMP on the router. For more information on enabling SNMP, see the section "Enabling SNMP for Firewall Sessions" later in this document.
Restrictions for Cisco IOS Firewall MIB
•
Cisco does not support all of the MIB variables that are defined in the Cisco Unified Firewall MIB. For a list of variables that are supported by this feature, see Table 1, Table 2, and Table 3.
•
MIB statistics are not provided when the firewall is configured using CPL.
Memory and Performance Impact
Depending on the number of targets that have a configured firewall and the number of configured URL filtering servers, the MIB functionality can create an adverse impact on memory. For each firewall policy that is configured on your system, more memory is required to store SNMP statistics.
The following information defines the minimum memory requirements for connection statistics only:
•
Global connection statistics: approximately 64 bytes.
•
Protocol-specific statistics: multiply the number of configured protocols by 56 to determine the minimum memory requirement.
•
Policy-target-protocol statistics: multiply the number of configured protocols and the number of targets for which the firewall policies are configured by 48 to determine the minimum memory requirement.
The following information defines the minimum memory requirements for URL filtering statistics only:
•
Global URL filtering statistics: approximately 96 bytes.
•
URL filtering server-specific statistics: multiply the number of configured URL filtering servers by 40 to determine the minimum memory requirement.
Information About Cisco IOS Firewall MIB
Connection Statistics
Connection statistics are a record of the firewall traffic streams that have attempted to flow through the firewall system. Connection statistics can be displayed on a global basis (that is, an aggregate of all connection statistics for the entire router), protocol-specific basis, or a firewall-policy-specific basis. The Firewall can allow, drop, or deny the connection based on firewall policies and firewall resources.
Table 1 lists all supported connection statistics—global, protocol-specific1 , or firewall-policy-specific2 —that are available via SNMP.
URL Filtering Statistics
URL Filtering feature provides an Internet management application that allows you to control web traffic for a given host or user on the basis of a specified security policy. URL filtering statistics include the status of distinct URL filtering servers that are configured on the firewall and the impact of the performance of the URL filtering servers on the latency and throughput of the firewall.
Table 2 and Table 3 list all supported URL filtering statistics—on a global basis or per server—that are available via SNMP.
A URL filtering server is identified by the following items, which also form the indexes into the URL filtering server statistics table:
•
URL Filtering Server Address Type—Type of IP address of the URL filtering server. For example, IPv4 or IPv6.
•
URL Filtering Server Address—IP address of the URL filtering server.
•
URL Filtering Server Port—Port number that the URL filtering server uses to receive filtering requests.
Firewall MIB Traps
To receive firewall MIB traps, you need a management station, and you must enable the snmp-server enable trap firewall serverstatuschange command (as shown in the configuration task table below).
Output for the SNMP trap fields, which are displated in on the management station, are as follows:
•
Server IP Address Type (IPv4 or IPv6)
•
Server IP Address Type Length. (4 for IPv4 and 16 for IPv6)
•
Server IP Address
•
Server Port
Note
Only IPv4 is currently supported.
How to Configure Cisco IOS Firewall MIB
•
Enabling SNMP for Firewall Sessions
•
Verifying Firewall Connection and URL Filtering Statistics
Enabling SNMP for Firewall Sessions
Perform this task to enable SNMP for firewall-related session management.
Prerequisites
Before you can begin monitoring firewall performance via SNMP, you must set up the firewall by performing the following tasks:
•
Configure a firewall policy via the ip inspect name command.
Note
Statistics are collected only for protocols that are specified via the ip inspect name command.
•
Enable the firewall by applying the firewall on a target via the interface command followed by the ip inspect command.
•
Enable URL filtering, if applicable, via the ip urlfilter server vendor command.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
snmp-server community string
4.
snmp-server host hostname community-string
5.
snmp-server enable traps firewall [serverstatuschange]
DETAILED STEPS
What to Do Next
After the firewall and SNMP have been properly enabled, statistics will begin to accumulate after the traffic flow starts. To verify whether statistics are being collected and view MIB counters, you can perform at least one of the steps in the task "Verifying Firewall Connection and URL Filtering Statistics."
Verifying Firewall Connection and URL Filtering Statistics
Use this task to verify firewall connection and URL filtering statistics via command-line interface (CLI). (These statistics can also be collected via any SNMP-capable client.)
Note
Effective with Cisco IOS Release 12.4(20)T, the debug ip inspect command is replaced by the debug policy-firewall command. See the Cisco IOS Debug Command Reference for more information.
SUMMARY STEPS
1.
enable
2.
show ip inspect mib connection-statistics {global | l4-protocol {all | icmp | tcp | udp} | l7-protocol {all | other | telnet | ftp} | policy policy-name target target name {l4-protocol {all | icmp | tcp | udp} | l7-protocol {all | other | telnet | ftp}}
3.
show ip urlfilter [mib] statistics {global | server {ip-address [port] | all}}]
4.
debug ip inspect mib {object-creation | object-deletion | events | retrieval | update}
DETAILED STEPS
Troubleshooting Tips
All statistics are accumulated since the last reboot of the firewall system. Thus, you must reboot the system to clear MIB connection statistics from your system.
Configuration Examples for Cisco IOS Firewall MIB Monitoring
•
Example: Sample Cisco IOS Firewall Configuration
•
Example: Sample URL Filtering Configuration
•
Example: show ip inspect mib Output
•
Example: show ip urlfilter mib statistics command output
Example: Sample Cisco IOS Firewall Configuration
The following output from the show running-config command shows how to configure a Cisco IOS Firewall:
Router# show running-config
Building configuration... Current configuration : 2205 bytes ! version 12.4 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal ! hostname Router ! boot-start-marker boot-end-marker ! no logging console ! no aaa new-model ! resource policy ! clock timezone MST -8 clock summer-time MDT recurring no ip cef ! ! ! ! ip inspect name test tcp ip inspect name test udp ip inspect name test icmp timeout 30 ip inspect name test ftp ip inspect name test http ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! policy-map ratelimit class class-default police cir 10000000 conform-action transmit exceed-action drop ! ! ! ! ! ! ! interface FastEthernet0/0 ip address 192.168.27.2 255.255.255.0 ip access-group 101 out ip inspect test in duplex full service-policy input ratelimit ! interface FastEthernet1/0 no ip address no ip route-cache shutdown duplex half ! interface FastEthernet4/0 ip address 192.168.127.2 255.255.255.0 ip access-group 102 in duplex full service-policy input ratelimit ! router eigrp 100 network 192.168.27.0 network 192.168.127.0 no auto-summary no eigrp log-neighbor-changes no eigrp log-neighbor-warnings ! ip default-gateway 192.168.27.116 ip route 192.168.100.0 255.255.255.0 192.168.27.1 ip route 192.168.200.0 255.255.255.0 192.168.127.1 no ip http server no ip http secure-server ! ! ! logging alarm informational access-list 101 permit tcp any any fragments access-list 101 permit udp any any fragments access-list 101 deny tcp any any access-list 101 deny udp any any access-list 101 permit ip any any access-list 102 permit tcp any any fragments access-list 102 permit udp any any fragments access-list 102 permit udp any gt 1024 any eq snmp access-list 102 deny tcp any any access-list 102 deny udp any any access-list 102 permit ip any any snmp-server community public RO snmp-server location FW Testbed UUT snmp-server contact STG/IOS FW Devtest ! ! ! ! ! ! control-plane ! ! ! ! ! ! gatekeeper shutdown ! ! line con 0 exec-timeout 0 0 stopbits 1 line aux 0 stopbits 1 line vty 0 4 login ! exception core-file sisu-devtest/coredump/Router.core exception dump 192.168.27.116 ! end
Example: Sample URL Filtering Configuration
The following sample output from the show running-config command shows how to configure a Websense server for URL filtering:
Router# show running-config
Building configuration...
Current configuration : 2043 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service internal
!
hostname Router
!
boot-start-marker
boot-end-marker
!
no logging console
!
no aaa new-model
!
resource policy
!
clock timezone MST -8
clock summer-time MDT recurring
no ip cef
!
!
ip inspect name test tcp
ip inspect name test udp
ip inspect name test http urlfilter
!
!
ip urlfilter allow-mode on
ip urlfilter exclusive-domain deny www.cnn.com
ip urlfilter exclusive-domain permit www.cpp.com
ip urlfilter server vendor websense 192.168.29.116
!
!
!
!
!
!
!
!
!
interface FastEthernet0/0
ip address 192.168.29.2 255.255.255.0
ip access-group 101 out
ip inspect test in
speed auto
full-duplex
!
interface FastEthernet0/1
ip address 192.168.129.2 255.255.255.0
ip access-group 102 in
duplex auto
speed auto
!
router eigrp 100
network 192.168.29.0
network 192.168.129.0
no auto-summary
no eigrp log-neighbor-changes
no eigrp log-neighbor-warnings
!
ip default-gateway 192.168.28.116
ip route 192.168.100.0 255.255.255.0 192.168.29.1
ip route 192.168.200.0 255.255.255.0 192.168.129.1
!
!
ip http server
no ip http secure-server
!
access-list 101 permit tcp any any fragments
access-list 101 permit udp any any fragments
access-list 101 deny tcp any any
access-list 101 deny udp any any
access-list 101 permit ip any any
access-list 102 permit tcp any any fragments
access-list 102 permit udp any any fragments
access-list 102 permit udp any gt 1024 any eq snmp
access-list 102 deny tcp any any
access-list 102 deny udp any any
access-list 102 permit ip any any
snmp-server community public RO
snmp-server location FW Testbed UUT
snmp-server contact STG/IOS FW Devtest
!
!
!
!
control-plane
!
!
!
line con 0
exec-timeout 0 0
transport output all
line aux 0
transport output all
line vty 0 4
login
!
exception core-file sisu-devtest/coredump/Router.core
exception dump 192.168.28.116
!
webvpn context Default_context
ssl authenticate verify all
!
no inservice
!
!
end
Example: show ip inspect mib Output
The following examples are sample outputs from the show ip inspect mib command with global or protocol-specific keywords:
•
Protocol-Based MIB Statistics
•
Policy-Target-Based MIB Statistics
Global MIB Statistics
Router# show ip inspect mib connection-statistics global
-------------------------------------------------- Connections Attempted 7 Connections Setup Aborted 0 Connections Policy Declined 0 Connections Resource Declined 0 Connections Half Open 2 Connections Active 3 Connections Expired 2 Connections Aborted 0 Connections Embryonic 0 Connections 1-min Setup Rate 5 Connections 5-min Setup Rate 7
Protocol-Based MIB Statistics
Router# show ip inspect mib connection-statistics l4-protocol tcp
--------------------------------------------------
Protocol tcp
Connections Attempted 3
Connections Setup Aborted 0
Connections Policy Declined 0
Connections Resource Declined 0
Connections Half Open 1
Connections Active 2
Connections Aborted 0
Connections 1-min Setup Rate 3
Connections 5-min Setup Rate 3
Router# show ip inspect mib connection-statistics l7-protocol http
--------------------------------------------------
Protocol http
Connections Attempted 3
Connections Setup Aborted 0
Connections Policy Declined 2
Connections Resource Declined 0
Connections Half Open 0
Connections Active 1
Connections Aborted 0
Connections 1-min Setup Rate 1
Connections 5-min Setup Rate 2
Policy-Target-Based MIB Statistics
Router# show ip inspect mib connection-statistics policy ftp interface GigabitEthernet0/0
l4-protocol tcp
! Policy Target Protocol Based Connection Summary Stats
------------------------------------------------------
Policy ftp-inspection
Target GigabitEthernet0/0
Protocol tcp
Connections Attempted 3
Connections Setup Aborted 0
Connections Policy Declined 0
Connections Resource Declined 0
Connections Half Open 1
Connections Active 2
Connections Aborted 0
Router# show ip inspect mib connection-statistics policy ftp interface GigabitEthernet0/0
l7-protocol ftp
! Policy Target Protocol Based Connection Summary Stats
------------------------------------------------------
Policy ftp-inspection
Target GigabitEthernet0/0
Protocol ftp
Connections Attempted 3
Connections Setup Aborted 0
Connections Policy Declined 0
Connections Resource Declined 0
Connections Half Open 1
Connections Active 2
Connections Aborted 0
Example: show ip urlfilter mib statistics command output
The following example is sample output when MIBs are enabled to track URL filtering statistics across the entire device (global):
Router# show ip urlfilter mib statistics global
URL Filtering Group Summary Statistics ------------------------------------------------------ URL Filtering Enabled Requests Processed 260 Requests Processed 1-minute Rate 240 Requests Processed 5-minute Rate 215 Requests Allowed 230 Requests Denied 30 Requests Denied 1-minute Rate 15 Requests Denied 5-minute Rate 0 Requests Cache Allowed 5 Requests Cache Denied 5 Allow Mode Requests Allowed 15 Allow Mode Requests Denied 15 Requests Resource Dropped 0 Requests Resource Dropped 1-minute Rate 0 Requests Resource Dropped 5-minute Rate 0 Server Timeouts 0 Server Retries 0 Late Server Responses 0 Access Responses Resource Dropped 0
The following example is sample output when MIBs are enabled to track URL filtering statistics across the server with IP address 192.168.27.116:
Router# show ip urlfilter mib statistics server address 192.168.27.116
URL Filtering Server Statistics
------------------------------------------------------
URL Server Host Name 192.168.27.116
Server Address 192.168.27.116
Server Port 15868
Server Vendor Websense
Server Status Online
Requests Processed 4
Requests Allowed 1
Requests Denied 3
Server Timeouts 0
Server Retries 9
Responses Received 1
Late Server Responses 12
1 Minute Average Response Time 0
5 Minute Average Response Time 0
Additional References
Related Documents
Standards
|
|
|
|---|---|
None |
— |
MIBs
RFCs
|
|
|
|---|---|
None |
— |
Technical Assistance
Feature Information for Cisco IOS Firewall MIB
Table 4 lists the features in this module and provides links to specific configuration information.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note
Table 4 lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Feedback