<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic packet inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-inspection/m-p/4042694#M1067541</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to add inspect http and https&amp;nbsp; in&amp;nbsp;global_policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 09 Mar 2020 11:16:45 GMT</pubDate>
    <dc:creator>kp-tkr2014</dc:creator>
    <dc:date>2020-03-09T11:16:45Z</dc:date>
    <item>
      <title>packet inspection</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection/m-p/4042694#M1067541</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to add inspect http and https&amp;nbsp; in&amp;nbsp;global_policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 11:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection/m-p/4042694#M1067541</guid>
      <dc:creator>kp-tkr2014</dc:creator>
      <dc:date>2020-03-09T11:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: packet inspection</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection/m-p/4042730#M1067543</link>
      <description>&lt;P&gt;Firewall point of view yes its good to have inspect policy globally (until there is any use cases specific to environment).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Inspecting HTTP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;HTTP inspection policy is implemented to examine and analyze traffic destined to protected servers or clients. It’s main core is to minimize HTTP content to the minimal set of requirements and to look deeply in the application signature for known bad cues mainly using regular expressions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for reference :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113069-asa-disgi-enai-asdm-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113069-asa-disgi-enai-asdm-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 12:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection/m-p/4042730#M1067543</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-03-09T12:27:48Z</dc:date>
    </item>
  </channel>
</rss>

