7-28
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
7






Configuring

Virtual

Servers
Configuring
Virtual

Servers
Ta
b

l

e


7-10
SIP
Protocol

Inspection

Conditions

and

Options
Condition
Description
Called
Party
Destination
or

called

party

specified

in

the

URI

of

the

SIP

To

header

used

for

SIP

protocol
inspection
decisions.
In
the

Called

Party

field,

enter

a

regular

expression

that

identifies

the

called

party

in

the

URI

of

the
SIP
To

header

for

this

match

condition.

Valid

entries

are

unquoted

text

strings

with

no

spaces

and
a
maximum

of

255


alphanumeric

characters.

The

ACE

supports

regular

expressions

for

matching
string
expressions.

Ta

b

l

e


14-33

lists

the

supported

characters

that

you

can

use

for

matching

string
expressions.
Calling
Party
Source
or

caller

specified

in

the

URI

of

the

SIP

From

header

used

for

SIP

protocol

inspection
decisions.
In
the

Calling

Party

field,

enter

a

regular

expression

that

identifies

the

calling

party

in

the

URI

of
the
SIP

From

header

for

this

match

condition.

Valid

entries

are

unquoted

text

strings

with

no

spaces
and
a

maximum

of

255

a

lphanumeric

characters.

The

ACE

supports

regul

ar

expressions

for
matching
string

expressions.

Ta

b

l

e


14-33

lists

the

supported

characters

that

you

can

use

for
matching
string

expressions.
IM
Subscriber
IM
(instant

messaging)

subscriber

used

for

application

inspection

decisions.
In
the

IP

Subscriber

field,

enter

a

regular

expression

that

identifies

the

IM

subscriber

for

this

match
condition.
Valid

entries

are

unquoted

text

strings

with

no

spaces

and

a

maximum

of

255
alphanumeric
characters.

The

ACE

supports

regular

expressions

for

matching

string

expressions.
Ta
b

l

e


14-33

lists

the

supported

characters

that

you

can

use

for

matching

string

expressions.
Message
Path
SIP
inspection

that

allows

you

to

filter

messages

coming

from

or

transiting

through

certain

SIP
proxy
servers.

The

ACE

maintains

a

list

of

the

unauthorized

SIP

proxy

IP

addresses

or

URLs

in

the
form
of

regular

expressions

and

checks

this

list

against

the

VIA

header

field

in

each

SIP

packet.
In
the

Message

Path

field,

enter

a

regular

expression

that

identifies

the

SIP

proxy

server

for

this
match
condition.

Valid

entries

are

unquoted

text

strings

with

no

spaces

and

a

maximum

of

255


alphanumeric
characters.

The

ACE

supports

regular

expressions

for

matching

string

expressions.
Ta
b

l

e


14-33

lists

the

supported

characters

that

you

can

use

for

matching

string

expressions.
SIP
Content

Length
SIP
message

body

content

length

used

for

SIP

protocol

inspection

decisions.
To
specify

SIP

traffic

based

on

SIP

message

body

length:
a.
In
the
Content
Operator
field,
confirm

that

Greater

Than

is

selected.
b.
In
the
Content
Length
field,
enter
the

maximum

size

of

a

SIP

message

body

in

bytes

that

the
ACE
is

to

allow

without

performing

SIP

protocol

inspection.

If

a

SIP

message

exceeds

the
specified
value,

the

ACE

performs

SIP

protocol

inspection

as

defined

in

an

associated

policy
map.
Valid

ent

ries

ar

e

fr

om

0

t

o

65534

bytes.
SIP
Content

Type
Content
type

in

the

SIP

me

ssage

body

used

for


SIP

protocol

inspection

decisions.
In
the

Content

Type

field,

enter

a

regular

expression

that

identifies

the

content

type

in

the

SIP
message
body

to

use

for

this

match

condition.

Valid

entries

are

unquoted

text

strings

with

no

spaces
and
a

maximum

of

255

a

lphanumeric

characters.

The

ACE

supports

regul

ar

expressions

for
matching
string

expressions.

Ta

b

l

e


14-33

lists

the

supported

characters

that

you

can

use

for
matching
string

expressions.
SIP
Request

Method
SIP
request

method

used

for

application

inspection

decisions.
In
the

Request

Method

field,

choose

the

request

method

that

is

to

be

inspected.