<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Marvin, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762982#M1033700</link>
    <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have the same issue. I am using firesight management VM 6.0. Is there any work around for this issue?.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shabeeb&lt;/P&gt;</description>
    <pubDate>Sat, 06 Feb 2016 19:39:55 GMT</pubDate>
    <dc:creator>SHABEEB KUNHIPOCKER</dc:creator>
    <dc:date>2016-02-06T19:39:55Z</dc:date>
    <item>
      <title>Block response page not displaying for blocked SSL (https://) URL</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762979#M1033696</link>
      <description>&lt;P&gt;We have a pair of&amp;nbsp;&amp;nbsp;ASA 5525 with sourcefire enabled. I'm tasked with blocking access to some&amp;nbsp;websites capable of file uploads like facebook or linked in. The issue I'm having is sites using http:// get the block response page. SSL sites using the https:// time out eventually then display page cannot be displayed.&lt;/P&gt;&lt;P&gt;So the sourcefire is doing it's job blocking access to restricted sites but the concern is that users will get page cannot be displayed and cause in influx of unnecessary calls to our helpdesk thinking the internet access is down...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've scoured the user guide but there doesn't seem to be an obvious answer how to get the SSL sites to display the block response page. If anyone knows the fix for this please do share I'd be greatly appreciative. Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762979#M1033696</guid>
      <dc:creator>jacenkoj33</dc:creator>
      <dc:date>2019-03-12T12:47:12Z</dc:date>
    </item>
    <item>
      <title>The block response page is</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762980#M1033697</link>
      <description>&lt;P&gt;The block response page is not available for SSL pages.&lt;/P&gt;&lt;P&gt;I had a customer with the same question&amp;nbsp;and the TAC confirmed it.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 12:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762980#M1033697</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-10-14T12:59:20Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin. I suspected as</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762981#M1033698</link>
      <description>&lt;P&gt;Thanks Marvin. I suspected as such.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 13:42:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762981#M1033698</guid>
      <dc:creator>jacenkoj33</dc:creator>
      <dc:date>2015-10-14T13:42:14Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762982#M1033700</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have the same issue. I am using firesight management VM 6.0. Is there any work around for this issue?.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shabeeb&lt;/P&gt;</description>
      <pubDate>Sat, 06 Feb 2016 19:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762982#M1033700</guid>
      <dc:creator>SHABEEB KUNHIPOCKER</dc:creator>
      <dc:date>2016-02-06T19:39:55Z</dc:date>
    </item>
    <item>
      <title>It seems the best you can do</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762983#M1033701</link>
      <description>&lt;P&gt;It seems the best you can do for now is to Block + Reset so the user doesn't have to wait for it to time-out and gets a more immediate "page cannot be displayed".&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 19:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762983#M1033701</guid>
      <dc:creator>smoores</dc:creator>
      <dc:date>2016-02-12T19:14:47Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762984#M1033703</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;It has been almost a year since this response was posted. Is there any enhancement on the subject? Could we display a block response webpage for https now?&lt;/P&gt;
&lt;P&gt;-Saif&lt;/P&gt;</description>
      <pubDate>Sat, 01 Oct 2016 16:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762984#M1033703</guid>
      <dc:creator>saifuddin.miyaji</dc:creator>
      <dc:date>2016-10-01T16:35:47Z</dc:date>
    </item>
    <item>
      <title>Sorry, but here's the current</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762985#M1033705</link>
      <description>&lt;P&gt;Sorry, but here's the current specifications of the block response pages (from the 6.1 Configuration Guide = current release as of October 2016)&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;The system displays a response page only for unencrypted or decrypted connections blocked (or interactively&amp;nbsp;blocked) either by access control rules or by the access control policy default action. The system does not&amp;nbsp;display a response page for:&lt;BR /&gt;• Tunnels and other connections blocked by a prefilter policy&lt;BR /&gt;• Connections blacklisted by Security Intelligence&lt;BR /&gt;• Encrypted connections blocked by an SSL policy&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Sat, 01 Oct 2016 18:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762985#M1033705</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-01T18:07:48Z</dc:date>
    </item>
    <item>
      <title>Actually... the excerpt you</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762986#M1033707</link>
      <description>&lt;P&gt;Actually... the excerpt you posted says the contrary of your point. This pushed me to look into the release notes for 6.1 and I confirmed that in fact, from 6.1 on you can display response pages for SSL traffic decrypted by an SSL rule and blocked by an Access Rule. I also spent about 1 hour with Cisco fighting with two techs who were from the backbone team and kept telling me this wasn't a feature!!! Yet I pulled up this information and was able to prove it. I am now updating so I can test. Good luck&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/ciscofix.png" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 22:28:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762986#M1033707</guid>
      <dc:creator>Gamaquifor</dc:creator>
      <dc:date>2016-10-04T22:28:57Z</dc:date>
    </item>
    <item>
      <title>If they are decrypted by</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762987#M1033708</link>
      <description>&lt;P&gt;If they are decrypted by policy - yes. If not (like 98% of the implementations out there) then - no.&lt;/P&gt;
&lt;P&gt;I've only ever seen one customer who had an SSL policy that was decrypting and resigning everything SSL outbound. It's very unusual as it requires having an internal PKI and trust of your certificates pushed to all client computers.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 22:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762987#M1033708</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-04T22:40:05Z</dc:date>
    </item>
    <item>
      <title>Well, is not that hard for</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762988#M1033710</link>
      <description>&lt;P&gt;Well, is not that hard for other appliances which is why I was very surprised when I originally revised this with Cisco about a year ago. Watchguard can do it. Not guessing, or reading I have actually configured a few myself. The appliance generates a self signed cert and it has the ability to inspect traffic, reencrypt and serve to client. There are some web apps which will not like this (banks for instance) but if you really want to secure your network... well.. the bad guys know how to use the https system as well. Not sure of the need for a PKI, but yes, all we had to do is deploy the cert with GP. This is an issue for third party browsers, actually Firefox only as Chrome uses the IE cert store.&lt;/P&gt;
&lt;P&gt;I can see environments where you wouldn't want to do that. It works for me on the support customers side of things. If I just let the browser show its default error the helpdesk guys will get killed with calls (&amp;gt;200 users env).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I can instead show that this is actually blocked by company policy, it will discourage a lot of calls from users.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 22:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762988#M1033710</guid>
      <dc:creator>Gamaquifor</dc:creator>
      <dc:date>2016-10-04T22:48:15Z</dc:date>
    </item>
    <item>
      <title>In case you are still</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762989#M1033712</link>
      <description>&lt;P style="text-align: left;" dir="ltr"&gt;In case you are still interested, this worked for me with firepower/firesight 6.1. The appliance can now effectively decrypt and resign HTTPS traffic (aka "decrypt resign). If it matches an access rule, the respective "response page" is returned. To keep performace in check, you can use categories and other parameters to decide which traffic to decrypt so that is a big plus in my env.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2016 03:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762989#M1033712</guid>
      <dc:creator>Gamaquifor</dc:creator>
      <dc:date>2016-10-06T03:32:12Z</dc:date>
    </item>
    <item>
      <title>Dear Gamaquifor,</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762990#M1033713</link>
      <description>&lt;P&gt;Dear Gamaquifor,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you tell me the step-by-step on how you get the response page for https blocked pages?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thank you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;best regards,&lt;/P&gt;
&lt;P&gt;chawki dib&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 08:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762990#M1033713</guid>
      <dc:creator>chawkideeb</dc:creator>
      <dc:date>2017-02-23T08:34:14Z</dc:date>
    </item>
    <item>
      <title>Nothing in special. Just use</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762991#M1033714</link>
      <description>&lt;P&gt;Nothing in special. Just use a Decrypt with Resign policy.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2017 15:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762991#M1033714</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-24T15:38:09Z</dc:date>
    </item>
    <item>
      <title>As Claudiu mentioned, the key</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762992#M1033715</link>
      <description>&lt;P&gt;As Claudiu mentioned, the key here is to decrypt the traffic first. For that you need to have an SSL Policy, this can found under Polcies&amp;gt;Access Contro&amp;gt; SSL. Key things to have in mind when deciding to decrypt SSL traffic:&lt;/P&gt;
&lt;P&gt;- There some web apps who DO NOT LIKE you decrypting the traffic. (i.e. Office 365). It is key that you add the respective SSL polices to Not Decrypt this traffic. You can use certificates CNs to white-list the traffic. O365 is just an example, you will need to observe your network so you know which applications will need to be white-listed&lt;/P&gt;
&lt;P&gt;- I would recommend to only decrypt traffic of interest and not all traffic. The more decryption/resigning you have going on, the bigger the hit on performance. I wouldn't go too crazy if you are just running a 5506.&lt;/P&gt;
&lt;P&gt;- Be sure you have distributed the firewall's Certificate to your clients (computers, servers) before you put an SSL policy in play.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Once you create SSL policy, you need to assign it to your Access Control Policy. When you open your Policy you will see on the top an option that says "SSL Policy:" here you can assign the policy you just created.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Lastly, a lot can go wrong with SSL decryption if not done right. Although I have done on a few appliances, I always run tests on each environment before production.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2017 15:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762992#M1033715</guid>
      <dc:creator>Gamaquifor</dc:creator>
      <dc:date>2017-02-24T15:52:15Z</dc:date>
    </item>
    <item>
      <title>We have created an SSL Policy</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762993#M1033716</link>
      <description>&lt;P&gt;We have created an SSL Policy that matches interesting traffic utilizing the decrypt-resign action. A corresponding Access Control Policy blocking the interesting traffic with an HTTP responder has also created.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When browsing to an SSL/HTTPS site using Internet Explorer, the site is properly blocked and we receive the HTTP response page.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, when using Chrome/Firefox browsers, the page does not properly inject. Each browser complains about&amp;nbsp;&lt;EM&gt;HTTP Strict Transport Security&lt;/EM&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;EM&gt;HSTS&lt;/EM&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anyone else running into this issue? Any fixes?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 11:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762993#M1033716</guid>
      <dc:creator>msamadpour</dc:creator>
      <dc:date>2017-06-22T11:41:25Z</dc:date>
    </item>
    <item>
      <title>If the webpage uses HSTS I do</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762994#M1033717</link>
      <description>&lt;P&gt;If the webpage uses HSTS I do not think that you will be able to "fix" this.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is working as intended.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 17:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/2762994#M1033717</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2017-06-27T17:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4460487#M1083374</link>
      <description>&lt;P&gt;As long as SSL Decryption is running, then yes, you can display a block response for HTTPS websites.&lt;/P&gt;&lt;P&gt;However, for HSTS websites, SSL Decryption can't work, because it's basically viewed as a "Man In The Middle" attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 15:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4460487#M1083374</guid>
      <dc:creator>bcoverstone</dc:creator>
      <dc:date>2021-09-06T15:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: If they are decrypted by</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4460490#M1083375</link>
      <description>&lt;P&gt;We're the second! I'm doing it for every single website, except financial and healthcare.&lt;/P&gt;&lt;P&gt;We've had our own trusted root certificate in our domain for years and now we finally have a firewall that utilizes it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I find odd is HSTS websites seem to magically bypass the SSL Decryption even though I have EVERYTHING set to decrypt, such as &lt;A href="https://www.google.com" target="_blank"&gt;https://www.google.com&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did see it resign &lt;A href="https://www.google.com" target="_blank"&gt;https://www.google.com&lt;/A&gt;&amp;nbsp;once and throw an HSTS error, but that was a couple of weeks ago. I can't seem to make that happen now, so I don't know what I did differently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the SSL Decryption feature is VERY finicky. If you put too many rules in (i.e. select everything and choose to not decrypt trusted URLs) it just won't decrypt anything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like you said, I'm the second person to actually use this, and the bugginess in the SSL Decryption setup reflects that.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 15:36:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4460490#M1083375</guid>
      <dc:creator>bcoverstone</dc:creator>
      <dc:date>2021-09-06T15:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: The block response page is</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4556139#M1087553</link>
      <description>&lt;P&gt;Is this still true 7 years later (02/20/2022) using Cisco Firepower? Documentation makes it sound like it should work... Yet, I do notice that within the Access Control Policy the tab for this feature only states "HTTP" and NOT "HTTP(S)"...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Feb 2022 18:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4556139#M1087553</guid>
      <dc:creator>Daniel Weber</dc:creator>
      <dc:date>2022-02-20T18:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: The block response page is</title>
      <link>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4557725#M1087605</link>
      <description>&lt;P&gt;To answer my own question, yes it does work with HTTPS websites... The insertion page is VERY finicky though. my particular issue was that I had originally created the root CA for my microsoft trusted certificate authority with SHA1... Everything started working after migrating the certificate to SHA2.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 04:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-response-page-not-displaying-for-blocked-ssl-https-url/m-p/4557725#M1087605</guid>
      <dc:creator>Daniel Weber</dc:creator>
      <dc:date>2022-02-23T04:16:16Z</dc:date>
    </item>
  </channel>
</rss>

