<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: http port 80 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216391#M1020255</link>
    <description>&lt;P&gt;It looks as if it is being forwarded from the outside to your sensor. Do you has access to the ASA to check the NAT rules?&lt;/P&gt;
&lt;P&gt;There is the remote possibility of the source IP being spoofed, and the traffic is originating from somewhere within your network.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Nov 2017 15:39:13 GMT</pubDate>
    <dc:creator>Seb Rupik</dc:creator>
    <dc:date>2017-11-14T15:39:13Z</dc:date>
    <item>
      <title>http port 80</title>
      <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216358#M1019999</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have an isensor device sitting behind our firewall and we keep getting alerts from the isensor device that http header is not blocked for that specified device. The only port that is open to that IP Address is smtp port 25. So why is the isensor saying that http is not blocked. Any help would greatly appreciated. I have pasted the isensor output below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Incident Summary&amp;nbsp; The CTOC has received an alert for '54322 VID90223 Generic OGNL Injection Attempt Inbound - HTTP Header' from your iSensor device (198.10.1.21) for traffic (Not Blocked) destined to port 80/tcp of 198.10.1.21 that occurred on 2017-11-13 at 19:25:53. This may indicate that 133.22.217.11 is attempting to discover whether 198.10.1.21 is vulnerable to OGNL injection. Object-Graph Navigation Language (OGNL) is a Java-based expression language that exposes some of the functionality of Java.&amp;nbsp; Attacker controlled input that gets evaluated as OGNL on the target's system(s) can result in arbitrary code execution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:45:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216358#M1019999</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2020-02-21T14:45:04Z</dc:date>
    </item>
    <item>
      <title>Re: http port 80</title>
      <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216363#M1020000</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;What's the output from:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input OUTSIDE tcp 133.22.217.11 45000 198.10.1.21 80&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(assuming your outbound interface is named 'OUTSIDE')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 15:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216363#M1020000</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-14T15:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: http port 80</title>
      <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216370#M1020252</link>
      <description>&lt;P&gt;Hi Seb,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't have a packet tracer output from our ASA firewall. This is a snippet of the isensor output. Any idea why we keep getting these alerts?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 15:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216370#M1020252</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-14T15:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: http port 80</title>
      <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216377#M1020253</link>
      <description>&lt;P&gt;Hi Lake,&lt;/P&gt;
&lt;P&gt;What I am trying to determine is if traffic from the internet is actually being forward to your sensor. Since 133.22.217.11 is a globally routable address then I suspect the answer is yes. The packet-tracer output would confirm this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 15:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216377#M1020253</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-14T15:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: http port 80</title>
      <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216387#M1020254</link>
      <description>&lt;P&gt;Hi Seb,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to for http traffic from the internet to go through the ASA even that port is not open on the firewall? By this I mean any http traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 15:35:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216387#M1020254</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-14T15:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: http port 80</title>
      <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216391#M1020255</link>
      <description>&lt;P&gt;It looks as if it is being forwarded from the outside to your sensor. Do you has access to the ASA to check the NAT rules?&lt;/P&gt;
&lt;P&gt;There is the remote possibility of the source IP being spoofed, and the traffic is originating from somewhere within your network.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 15:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216391#M1020255</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-14T15:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: http port 80</title>
      <link>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216397#M1020256</link>
      <description>&lt;P&gt;I will open a case with Cisco and let them take a look at it. I appreciate all your help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 15:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-port-80/m-p/3216397#M1020256</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-14T15:46:08Z</dc:date>
    </item>
  </channel>
</rss>

