10-5
Cisco ASA Series Firewall ASDM Configuration Guide
Chapter 10 Getting Started with Application Layer Protocol Inspection
Default Settings and NAT Limitations
ICMP ERROR — — — —
ILS (LDAP) TCP/389 No extended PAT.
No NAT64.
——
Instant
Messaging (IM)
Varies by
client
No extended PAT.
No NAT64.
RFC 3860 —
IP Options — No NAT64. RFC 791, RFC
2113
—
IPsec Pass
Through
UDP/500 No PAT.
No NAT64.
——
IPv6 — No NAT64. RFC 2460 —
MGCP UDP/2427,
2727
No extended PAT.
No NAT64.
(Clustering) No static PAT.
RFC 2705bis-05 —
MMP TCP 5443 No extended PAT.
No NAT64.
——
NetBIOS Name
Server over IP
UDP/137,
138 (Source
ports)
No extended PAT.
No NAT64.
— NetBIOS is supported by performing
NAT of the packets for NBNS UDP port
137 and NBDS UDP port 138.
PPTP TCP/1723 No NAT64.
(Clustering) No static PAT.
RFC 2637 —
RADIUS
Accounting
1646 No NAT64. RFC 2865 —
RSH TCP/514 No PAT.
No NAT64.
(Clustering) No static PAT.
Berkeley UNIX —
RTSP TCP/554 No extended PAT.
No outside NAT.
No NAT64.
(Clustering) No static PAT.
RFC 2326, 2327,
1889
No handling for HTTP cloaking.
ScanSafe (Cloud
Web Security)
TCP/80
TCP/413
— — These ports are not included in the
default-inspection-traffic class for the
ScanSafe inspection.
Table 10-1 Supported Application Inspection Engines (continued)
Application
1
Default Port NAT Limitations Standards
2
Comments