Cisco ASR 5000 Application Detection and Control Administration Guide Version 14.0
Total Page:16
File Type:pdf, Size:1020Kb
Cisco ASR 5000 Application Detection and Control Administration Guide Version 14.0 Last Updated February 28, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-27200-08 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phon e numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any u se of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco ASR 5000 Application Detection and Control Administration Guide © 2014 Cisco Systems, Inc. All rights reserved. CONTENTS About this Guide ................................................................................................. v Conventions Used ....................................................................................................................................vi Contacting Customer Support ................................................................................................................. vii Additional Information ............................................................................................................................. viii Application Detection and Control Overview .................................................. 9 ADC Overview ........................................................................................................................................ 10 Platform Requirements....................................................................................................................... 10 License Requirements........................................................................................................................ 11 Dynamic Software Upgrade ............................................................................................................... 11 Overview ........................................................................................................................................ 11 ADC Protocol Group Detection ...................................................................................................... 12 Behavioral Traffic ........................................................................................................................... 12 SSL Renegotiation Tracking .......................................................................................................... 12 Analyzer Interworking .................................................................................................................... 13 Traffic Sub-classification .................................................................................................................... 13 Bulk Statistics Support ....................................................................................................................... 13 How ADC Works ..................................................................................................................................... 15 Limitations .......................................................................................................................................... 15 Application Detection and Control Configuration ......................................... 17 Configuring Dynamic Software Upgrade ................................................................................................ 18 How to perform Dynamic Software Upgrade ..................................................................................... 18 Configuring System for ADC .................................................................................................................. 21 Initial Configuration ............................................................................................................................. 21 Enabling Enhanced Charging ........................................................................................................ 21 Modifying the Local Context........................................................................................................... 21 ADC Configuration ............................................................................................................................. 22 Creating the Active Charging Service ............................................................................................ 23 Configuring ADC Rules .................................................................................................................. 23 Configuring P2P Protocol Groups .................................................................................................. 25 Configuring Behavioral Detection .................................................................................................. 26 Configuring SSL Renegotiation ..................................................................................................... 26 Configuring Analyzers .................................................................................................................... 27 Configuring the Charging Action .................................................................................................... 27 Configuring the Rulebase .............................................................................................................. 28 Setting EDR Formats ..................................................................................................................... 29 Configuring IP Protocol and Server port mapping ......................................................................... 30 Configuring EDR for P2P Events ................................................................................................... 30 Gathering ADC Statistics ........................................................................................................................ 32 Supported Bulk Statistics ................................................................................................................... 33 P2P Reports ........................................................................................................................................... 34 Peer-to-Peer Protocol and Application Detection Support .......................... 35 Supported Protocols and Applications ................................................................................................... 36 New in this Release............................................................................................................................ 36 Cisco ASR 5000 Application Detection and Control Administration Guide ▄ OL-27200-08 iii ▀ Contents All Supported Protocols and Applications .......................................................................................... 37 Port-based Protocols .......................................................................................................................... 60 IP Protocols ........................................................................................................................................ 85 ▄ Cisco ASR 5000 Application Detection and Control Administration Guide iv OL-27200-08 About this Guide This document pertains to the features and functionality that run on and/or that are related to the Cisco® ASR 5000 Chassis. Cisco ASR 5000 Application