
48-22
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter 48 Configuring Inspection for Voice and Video Protocols
RTSP Inspection
Fields
• RTSP Inspect Maps—Table that lists the defined RTSP inspect maps.
• Add—Configures a new RTSP inspect map.
• Edit—Edits the selected RTSP entry in the RTSP Inspect Maps table.
• Delete—Deletes the inspect map selected in the RTSP Inspect Maps table.
Modes
The following table shows the modes in which this feature is available:
Add/Edit RTSP Policy Map
Configuration > Global Objects > Inspect Maps > MGCP > MGCP Inspect Map > View
The Add/Edit RTSP Policy Map pane lets you configure the parameters and inspections settings for
RTSP application inspection maps.
Fields
• Name—When adding an RTSP map, enter the name of the RTSP map. When editing an RTSP map,
the name of the previously configured RTSP map is shown.
• Description—Enter the description of the RTSP map, up to 200 characters in length.
• Parameters—Tab that lets you restrict usage on reserved ports during media port negotiation, and
lets you set the URL length limit.
–
Enforce Reserve Port Protection—Lets you restrict the use of reserved ports during media port
negotiation.
–
Maximum URL Length—Specifies the maximum length of the URL allowed in the message.
Maximum value is 6000.
• Inspections—Tab that shows you the RTSP inspection configuration and lets you add or edit.
–
Match Type—Shows the match type, which can be a positive or negative match.
–
Criterion—Shows the criterion of the RTSP inspection.
–
Value—Shows the value to match in the RTSP inspection.
–
Action—Shows the action if the match condition is met.
–
Log—Shows the log state.
–
Add—Opens the Add RTSP Inspect dialog box to add a RTSP inspection.
–
Edit—Opens the Edit RTSP Inspect dialog box to edit a RTSP inspection.
–
Delete—Deletes a RTSP inspection.
–
Move Up—Moves an inspection up in the list.
–
Move Down—Moves an inspection down in the list.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
••••—