<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,I think the easiest way in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5545-interfering-with-https-traffic/m-p/2701426#M190710</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think the easiest way for checking this would be to go ahead and disable the redirection the traffic to the CX module and verify the issue is re-occurring or not ?&lt;/P&gt;&lt;P&gt;"show run policy-map" would show you if the policy is there which is redirecting the traffic to the CX and "show service-policy" would show you if this policy is applied or not ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jun 2015 16:31:00 GMT</pubDate>
    <dc:creator>Vibhor Amrodia</dc:creator>
    <dc:date>2015-06-11T16:31:00Z</dc:date>
    <item>
      <title>ASA 5545 interfering with HTTPS Traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5545-interfering-with-https-traffic/m-p/2701425#M190709</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am having a strange issue with HTTPS traffic that I think has to do with our ASA. &amp;nbsp;The basics is that HTTPS sessions around the web are extremely slow and sometimes time out. &amp;nbsp;This happens when browsing the web through Chrome or Internet Explorer but this issue is also affecting our remote VPN phones that create a SSL tunnel into our DMZ. &amp;nbsp; The phones will work for two - three minutes then the SSL connection is reset. &amp;nbsp;So I have two different interfaces (Internal and DMZ) and I am seeing the same issue with services behind both of them which is what leads me to believe that the ASA is doing something to HTTPS traffic. &amp;nbsp;What is seems to me is that the ASA is somehow inspecting or slowing down HTTPS traffic though I cannot for the life of me find any inspection policies that would apply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This ASA has a CX module but I have not configured it to do anything. &amp;nbsp;When I login to the CX module it shows that no information, data, policies or otherwise. &amp;nbsp;So I don't think it is the CX module.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts on how I can figure out what is going on? &amp;nbsp;Does anyone know if there are default inspection polices on HTTPS when not using the CX module? &amp;nbsp;Could there be some other service running on the ASA that could be causing this?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:05:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5545-interfering-with-https-traffic/m-p/2701425#M190709</guid>
      <dc:creator>brownmattc</dc:creator>
      <dc:date>2019-03-12T06:05:45Z</dc:date>
    </item>
    <item>
      <title>Hi,I think the easiest way</title>
      <link>https://community.cisco.com/t5/network-security/asa-5545-interfering-with-https-traffic/m-p/2701426#M190710</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think the easiest way for checking this would be to go ahead and disable the redirection the traffic to the CX module and verify the issue is re-occurring or not ?&lt;/P&gt;&lt;P&gt;"show run policy-map" would show you if the policy is there which is redirecting the traffic to the CX and "show service-policy" would show you if this policy is applied or not ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2015 16:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5545-interfering-with-https-traffic/m-p/2701426#M190710</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-06-11T16:31:00Z</dc:date>
    </item>
    <item>
      <title>Thank you for your reply -</title>
      <link>https://community.cisco.com/t5/network-security/asa-5545-interfering-with-https-traffic/m-p/2701427#M190711</link>
      <description>&lt;P&gt;Thank you for your reply - sorry that my question wasn't clear but I do not think that we currently have the CX module in use which is the hard part of the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sh Run Policy-Map:&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh service-policy&lt;/P&gt;&lt;P&gt;Global policy:&lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: dns preset_dns_map, packet 9328277, lock fail 0, drop 386, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: ftp, packet 399645, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: h323 h225 _default_h323_map, packet 2158, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: h323 ras _default_h323_map, packet 79, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: ip-options _default_ip_options_map, packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: netbios, packet 4028, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: rsh, packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: rtsp, packet 49597, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: skinny , packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: sqlnet, packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: sunrpc, packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: tftp, packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: sip , packet 136, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;tcp-proxy: bytes in buffer 0, bytes dropped 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: xdmcp, packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: http, packet 786473478, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: icmp, packet 4111478, lock fail 0, drop 17, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Inspect: icmp error, packet 15112, lock fail 0, drop 54, reset-drop 0, v6-fail-close 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Class-map: class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Default Queueing &amp;nbsp;Packet recieved 40877, sent 101196, attack 10639&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2015 17:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5545-interfering-with-https-traffic/m-p/2701427#M190711</guid>
      <dc:creator>brownmattc</dc:creator>
      <dc:date>2015-06-11T17:39:49Z</dc:date>
    </item>
  </channel>
</rss>

