<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: blocking AOL instant messenger with Cisco Pix 7.x in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699258#M1027738</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AIM != HTTP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Feb 2007 14:51:09 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2007-02-23T14:51:09Z</dc:date>
    <item>
      <title>blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699232#M1027693</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;I need to do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list External permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list External deny ip any any log&lt;/P&gt;&lt;P&gt;access-list Internal permit tcp any any eq 23&lt;/P&gt;&lt;P&gt;access-list Internal permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;access-list Internal permit udp any any eq 53&lt;/P&gt;&lt;P&gt;access-group External in interface outside&lt;/P&gt;&lt;P&gt;access-group Internal in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem is that user on the inside use AOL instant messgenging via port 23 and&lt;/P&gt;&lt;P&gt;I would like to block them from using&lt;/P&gt;&lt;P&gt;AOL IM on port 23 but I also would like&lt;/P&gt;&lt;P&gt;to allow legitimate telnet to go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do NOT want to block AOL destination IM&lt;/P&gt;&lt;P&gt;Server in the ACL.  I want to be the Pix to be smart enough to be able to accomplish via application inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can do this rather easily with Checkpoint SmartDefense which is builtin&lt;/P&gt;&lt;P&gt;with Checkpoint firewall.  I am migrating&lt;/P&gt;&lt;P&gt;over to Cisco Pix and I would like to do&lt;/P&gt;&lt;P&gt;the same thing.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas on how to do this?  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699232#M1027693</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2019-03-11T09:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699233#M1027695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want EVERYONE from the Internal to be able to&lt;/P&gt;&lt;P&gt;telnet out to anywhere on the Internet with&lt;/P&gt;&lt;P&gt;regular telnet application.  I do NOT want them&lt;/P&gt;&lt;P&gt;to masquerade port 23 with AOL IM application.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Checkpoint SmartDefense, I can accomplish&lt;/P&gt;&lt;P&gt;this task in less than 10 seconds.  I just &lt;/P&gt;&lt;P&gt;don't know how to do this with Cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Jan 2007 07:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699233#M1027695</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-01-28T07:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699234#M1027696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;like you said that you want to block AOL IM using port 23 at the same time you want to allow legitimate telnet to go through. idea is if you know this legitimate IP's only who should be allowed then you can just edit your ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. &lt;/P&gt;&lt;P&gt;access-list internal permit tcp ip host &amp;gt;legitimate IP&amp;lt; any eq 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will only allow them to access telnet through port 23 and all other users will be denied access using port 23.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;please rate if helped&lt;/P&gt;&lt;P&gt;regrads&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Feb 2007 04:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699234#M1027696</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-04T04:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699235#M1027698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm glad the checkpoint can do this in 10 seconds. I can do it on the PIX/ASA in 9 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Can you please let me know what version of sw your PIX is running? The solution depends on the version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Feb 2007 16:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699235#M1027698</guid>
      <dc:creator>bthibode</dc:creator>
      <dc:date>2007-02-04T16:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699236#M1027700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;I am running version 7.2(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Feb 2007 16:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699236#M1027700</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-04T16:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699237#M1027702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, here we go. This is going to be done using ASDM. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1: Launch ASDM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 2: Click on the Configuration button at the top of the page&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 3: Click on the Security Policy button on the left.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 4: Click on the Service Policy Rules Tab&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 5: If you don't have a Service Policy already, create one by clicking on the green plus sign next to the word Add. If you do already have a Service Policy, select the class (it should now be highlighted in blue), then click the green plus sign next to the work Add.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 6: Choose the Second Radio button - Global - applies to all interfaces, then click next&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 7: Leave Create a new traffic class selected and put a check mark next to Default Inspection Traffic under Traffic match criteria and click next&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 8: Select http and click next&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 9: Select HTTP and click the configure button directly to the right of HTTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 10: Select the 'Select a HTTP inspect map for fine control over inspection' radio button, then click on the Add button that is now activated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 11: On this screen, Give this new class a name. Then click the URI Filtering... button on the bottom right of the page&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 12: click on Add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 13: In the drop down menu for regular Expression, select _default_aim-messenger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 14: Click ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 15: Click ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 16: Click ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 17: Click ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 18: Click finish&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 19: Click Apply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will set up your ASA to look for and block AIM. I know this might seem like a lot of steps, but like every GUI, once you get used to it, it really takes no time at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 15:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699237#M1027702</guid>
      <dc:creator>bthibode</dc:creator>
      <dc:date>2007-02-05T15:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699238#M1027704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) does it apply to both Pix and ASA or only ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) did you test it and you are able to block&lt;/P&gt;&lt;P&gt;AOL Instant Messenging from traversing port&lt;/P&gt;&lt;P&gt;23?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that your instructions have to&lt;/P&gt;&lt;P&gt;do with blocking AOL IM via http port and not port 23.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 16:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699238#M1027704</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-05T16:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699239#M1027707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried what you suggested and I still can use&lt;/P&gt;&lt;P&gt;AOL IM over port 23.  The solution you provided&lt;/P&gt;&lt;P&gt;is for using AOL IM over http (aka port 80).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to block it over port 23.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anymore ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 17:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699239#M1027707</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-05T17:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699240#M1027709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) This works on any platform running 7.2(2) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Have not tested with AIM on port 23 (forgot you mentioned that). To make sure that this catches AIM on all ports, please check match any instead of match default inspection traffic in step 7 of my instructions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should scan all prots for AIM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 17:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699240#M1027709</guid>
      <dc:creator>bthibode</dc:creator>
      <dc:date>2007-02-05T17:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699241#M1027712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with this configuration is that&lt;/P&gt;&lt;P&gt;not only it drops my AOL IM over port 23 but it&lt;/P&gt;&lt;P&gt;also drops legitimate telnet application over&lt;/P&gt;&lt;P&gt;port 23.  Worse, it also drops my ssh as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 19:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699241#M1027712</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-05T19:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699242#M1027714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, that was unexpected. Obviously, thats not how this regex is supposed to work. I find it strange that it would drop ssh. SSH is encrypted, so you can't read anything to block it anyways. Thats why attacks using ssh are almost impossible to stop. Does your config look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect http AIM&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  protocol-violation action drop-connection&lt;/P&gt;&lt;P&gt; match request uri regex _default_aim-messenger&lt;/P&gt;&lt;P&gt;  drop-connection log&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;  inspect http AIM &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a similair set-up and are still unable to block AIM, then I'm out of ideas. I really don't understand how telnet and ssh would be clocked by the ASA because of this regex, though. Do the blocks show up in your log as being blocked by your service-policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 20:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699242#M1027714</guid>
      <dc:creator>bthibode</dc:creator>
      <dc:date>2007-02-05T20:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699243#M1027717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just started playing around with these settings myself and I must say, pretty impressive.  They are a little less intuitive than they could be.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try the following..it worked for me:&lt;/P&gt;&lt;P&gt;1) Create a new HTTP inspect map.&lt;/P&gt;&lt;P&gt;click on 'inspect maps' then 'http'. Enter a name and description. click 'customize' and uncheck 'check for protocol violations'. click 'ok'. click 'URL filtering' then 'add' and select the provided _default_aim-messenger regex and click 'ok'. click 'ok' again.  click 'add'. click 'apply'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) enable the new HTTP inspection on tcp port 23.&lt;/P&gt;&lt;P&gt;click on 'security policy'-&amp;gt;'add'. click 'Next'. check 'tcp or udp destination port' and click next. select 'telnet' as the service and click next. check 'http' and click 'configure'. select the HTTP inspect map you just created from the list and click 'ok'. click 'finish'.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Feb 2007 19:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699243#M1027717</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-02-06T19:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699244#M1027720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match port tcp eq telnet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect http test&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; match request uri regex _default_aim-messenger&lt;/P&gt;&lt;P&gt;  drop-connection log&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;  inspect http test&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It didn't work for me.  I can still use AOL IM on telnet port.  Can you post your config?  I am running version 7.2(2).  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 02:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699244#M1027720</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-07T02:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699245#M1027722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tested that specific regex using a browser, not the actual AOL IM client, and it worked. The "_default_aim-messenger" regex does a case insensitive search for "http.proxy.icq.com". Do you know if that is correct? I would recommend getting a trace of the client and looking for that specific string in the URL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I fired up an apache server on tcp port 23. When I connected with just &lt;A class="jive-link-custom" href="http://www.server.com:23" target="_blank"&gt;http://www.server.com:23&lt;/A&gt;, the default page came up.  When I connected with&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.server.com:23/http.proxy.icq.com" target="_blank"&gt;http://www.server.com:23/http.proxy.icq.com&lt;/A&gt; I got a "page cannot be displayed" error. The request timed out and wasn't reset. It would be better if the Pix sent a reset, which is an option when configuring the inspection. I know it worked though because here is the log entry:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5	Feb 07 2007	09:05:49	415006	&lt;CLIENT&gt;	&lt;SERVER&gt;	 HTTP - matched request uri regex _default_aim-messenger in policy-map aim-messenger, URI matched - Dropping connection from inside:&lt;CLIENT&gt;/15058 to outside:&lt;SERVER&gt;/23&lt;/SERVER&gt;&lt;/CLIENT&gt;&lt;/SERVER&gt;&lt;/CLIENT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would guess that the default regex is not correct, or at least not when used as a URL filter(i.e. regex matches somewhere else in HTTP request). Get that trace and find out if/where http.proxy.icq.com shows up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 15:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699245#M1027722</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-02-07T15:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699246#M1027724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FWIW, I just fired up AOL 6.0 --you owe me big for installing this crap;-)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nowhere during the login process did I see "http.proxy.icq.com".  I suspect that regex is no longer correct. Is this person using an external http proxy running on port 23 or what?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any event, AIM V6 appears to use HTTPS for authentication. You probably will have to use an ACL or proxy-based URL filtering to block that. Another alternative is to block the DNS lookups that occur. This probably won't work if the user is using an http proxy and not doing direct DNS lookups (get a trace!). I created a custom DNS inspection map that blocks the domain name kdc.uas.aol.com. The standard AIM V6 client no longer works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4	Feb 07 2007	10:28:34	410003	&lt;CLIENT&gt;	&lt;DNS server=""&gt;	 DNS Classification: Dropped DNS request (id 36921) from inside:&lt;CLIENT&gt;/1045 to outside:&lt;DNS server=""&gt;/53; matched Class 22: match domain-name regex aim_v6&lt;/DNS&gt;&lt;/CLIENT&gt;&lt;/DNS&gt;&lt;/CLIENT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 16:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699246#M1027724</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-02-07T16:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699247#M1027725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) i am using AOL IM version 6.0.&lt;/P&gt;&lt;P&gt;I am NOT using any external http proxy, just&lt;/P&gt;&lt;P&gt;straight forward port 23.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure about it uses https for authentication because when I run tcpdump on &lt;/P&gt;&lt;P&gt;my checkpoint firewall, I did NOT see any https,&lt;/P&gt;&lt;P&gt;I only see port 23 and DNS udp port 53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you suggested will work but I do not want&lt;/P&gt;&lt;P&gt;to do that.  It seems to me that Pix firewall&lt;/P&gt;&lt;P&gt;does not do "deep inspection" the way &lt;/P&gt;&lt;P&gt;checkpoint firewall does.  As I've stated &lt;/P&gt;&lt;P&gt;earlier, I can do this with Checkpoint in 10&lt;/P&gt;&lt;P&gt;seconds.  I don't want to deal with blocking&lt;/P&gt;&lt;P&gt;DNS because "smart" users know how to bypass&lt;/P&gt;&lt;P&gt;this security and hard-code the IP address &lt;/P&gt;&lt;P&gt;into AOL client (a few registries changes&lt;/P&gt;&lt;P&gt;is all it takes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for taking the time to go through&lt;/P&gt;&lt;P&gt;this exercise with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 17:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699247#M1027725</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-07T17:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699248#M1027726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm confused I guess, but then I'm not an AIM  user. AIM is not peer to peer is it?  The client actually connects to something on port 23...what is it connecting to?  Surely the AOL servers don't support connections on every port?  If it's not the AOL server, then doesn't it have to be either a proxy or a device the forwards connections to the AOL servers on the supported ports? I suppose I'm just naive with it comes to this client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any event, it does not matter. The pix DOES definitely support deep packet inspection for specific protocols, including HTTP. If you know the regex you want to block, then create it and the commands I suggested earlier will work. You just can't use the default regex supplied by Cisco.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 18:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699248#M1027726</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-02-07T18:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699249#M1027727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're wrong.  I can get the AOL client to &lt;/P&gt;&lt;P&gt;connect on port 23, 80, 443, 25, etc... therefore, the AOL servers can accept just about&lt;/P&gt;&lt;P&gt;every ports. BTW, the client is actually&lt;/P&gt;&lt;P&gt;connecting on port 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix may do deep packet inspection for http but&lt;/P&gt;&lt;P&gt;not for every other protocols as evidence in&lt;/P&gt;&lt;P&gt;my test with port 23.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know the regex for telnet port 23 to&lt;/P&gt;&lt;P&gt;block AOL IM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 20:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699249#M1027727</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-07T20:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699250#M1027728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using the pro client perhaps?  I tried it and indeed it allows changing the port and configuring a proxy.  I got a trace and this does not look like HTTP though. I think we're finally on the same page....you're SOL.  Does it look like HTTP in your trace? I don't think the Pix can generically inspect tcp sessions using regex matching.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 21:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699250#M1027728</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-02-07T21:49:13Z</dc:date>
    </item>
    <item>
      <title>Re: blocking AOL instant messenger with Cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699251#M1027729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the tcpdump on the External interface&lt;/P&gt;&lt;P&gt;of the Checkpoint firewall.  As you can see,&lt;/P&gt;&lt;P&gt;it connects via port 23 and dns udp port 53 &lt;/P&gt;&lt;P&gt;for resolution.  Yes, there are some port 80&lt;/P&gt;&lt;P&gt;but it is because when you connect with AOL, &lt;/P&gt;&lt;P&gt;it opens the browser and send advertisement&lt;/P&gt;&lt;P&gt;over port 80 but the actual communication is&lt;/P&gt;&lt;P&gt;going through port 23.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No I am not using AOL pro client, just &lt;/P&gt;&lt;P&gt;standard free version of AOL.  Nothing special.  Look at the tcpdump below on the&lt;/P&gt;&lt;P&gt;checkpoint:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dca2-Nokia-1-P[admin]# tcpdump -i eth3 -n not host 224.0.0.18 and host 217.200.1.125&lt;/P&gt;&lt;P&gt;tcpdump: listening on eth3&lt;/P&gt;&lt;P&gt;22:06:34.314049 O 217.200.1.125.10261 &amp;gt; 129.174.1.8.53:  10953+ (37)&lt;/P&gt;&lt;P&gt;22:06:34.319854 I 129.174.1.8.53 &amp;gt; 217.200.1.125.10261:  10953 2/3/3 (219) (DF)&lt;/P&gt;&lt;P&gt;22:06:34.343954 O 217.200.1.125.10557 &amp;gt; 64.12.161.153.23: S 3777049618:3777049618(0) win 65535 &lt;MSS 1460=""&gt; (DF)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;22:06:34.350832 I 64.12.161.153.23 &amp;gt; 217.200.1.125.10557: S 857085545:857085545(0) ack 3777049619 win 16384 &lt;MSS 1360=""&gt; (DF)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;22:06:34.351625 O 217.200.1.125.10557 &amp;gt; 64.12.161.153.23: . ack 1 win 65535 (DF)&lt;/P&gt;&lt;P&gt;22:06:34.357983 I 64.12.161.153.23 &amp;gt; 217.200.1.125.10557: P 1:11(10) ack 1 win 16384 (DF)&lt;/P&gt;&lt;P&gt;22:06:34.358671 O 217.200.1.125.10557 &amp;gt; 64.12.161.153.23: P 1:11(10) ack 11 win 65525 (DF)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 22:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-aol-instant-messenger-with-cisco-pix-7-x/m-p/699251#M1027729</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-07T22:13:10Z</dc:date>
    </item>
  </channel>
</rss>

