<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hi,did you configure ACL and in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705988#M193153</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;did you configure ACL and class-maps for both HTTP and HTTPS traffic?&lt;/P&gt;&lt;P&gt;did you also apply your 'service-policy' map to an interface?&lt;/P&gt;&lt;P&gt;a lot of times it's applied to the 'inside' interface.&lt;/P&gt;</description>
    <pubDate>Mon, 03 Aug 2015 07:12:05 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2015-08-03T07:12:05Z</dc:date>
    <item>
      <title>ASA HTTP inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705987#M193149</link>
      <description>&lt;P&gt;Hello Everyone.&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are testing a HTTP inspection on ASA for our corporate network in development network. after doing config of the commands&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect http HTTP_Inspection_Map&lt;BR /&gt;&amp;nbsp;description Inspect the HTTP traffic&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection log&lt;BR /&gt;&amp;nbsp;match req-resp content-type mismatch&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;inspect http HTTP_Inspection_Map&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The clinets&amp;nbsp;are&amp;nbsp;not going on any webpage apart from if we tell them to do a&amp;nbsp;&amp;nbsp;https in web browser (&lt;A href="https://bing.com" target="_blank"&gt;https://bing.com&lt;/A&gt;). Kindly please suggest what could be the casue of the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Inspect: http HTTP_Inspection_Map, packet 11444, drop 74, reset-drop 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705987#M193149</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-03-12T06:22:18Z</dc:date>
    </item>
    <item>
      <title>hi,did you configure ACL and</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705988#M193153</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;did you configure ACL and class-maps for both HTTP and HTTPS traffic?&lt;/P&gt;&lt;P&gt;did you also apply your 'service-policy' map to an interface?&lt;/P&gt;&lt;P&gt;a lot of times it's applied to the 'inside' interface.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 07:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705988#M193153</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-08-03T07:12:05Z</dc:date>
    </item>
    <item>
      <title>JohnlloydI configure the</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705989#M193156</link>
      <description>&lt;P&gt;Johnlloyd&lt;/P&gt;&lt;P&gt;I configure the policy in global policy so i beleive i do not need to configure a ACL?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 12:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705989#M193156</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2015-08-03T12:15:50Z</dc:date>
    </item>
    <item>
      <title>hi,you still need it.what are</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705990#M193158</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;you still need it.&lt;/P&gt;&lt;P&gt;what are you trying to achieve in this setup?&lt;/P&gt;&lt;P&gt;are you re-directing traffic to a proxy server or to an appliance (i.e. websense)?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 13:58:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705990#M193158</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-08-03T13:58:38Z</dc:date>
    </item>
    <item>
      <title>Hi Johnlloydwe are using a</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705991#M193160</link>
      <description>&lt;P&gt;Hi Johnlloyd&lt;/P&gt;&lt;P&gt;we are using a websense virtual appliance. Does HTTP inspection must have to work in conjunction with proxy server or websense.&lt;/P&gt;&lt;P&gt;I&amp;nbsp;assumed the ASA http inspection&amp;nbsp;with these above setting will do the&amp;nbsp;job even without websense?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the aim is to ASA inspection HTTP traffic and if there is a violation of the protocol than that traffic must be drop and reset the HTTP connection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 14:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705991#M193160</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2015-08-03T14:41:29Z</dc:date>
    </item>
    <item>
      <title>hi,we're also doing websense</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705992#M193162</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;we're also doing websense redirect for a client but not using the MPF. i've checked my ASA config and it has CLI similar to below:&lt;/P&gt;&lt;P&gt;url-server (inside) vendor websense host &amp;lt;WEBSENSE IP&amp;gt; timeout 30 protocol TCP version 1 connections 10&lt;/P&gt;&lt;P&gt;filter https 443 &amp;lt;INSIDE LAN SUBNET&amp;gt; &amp;lt;SM&amp;gt; 0.0.0.0 0.0.0.0 allow&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 02:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705992#M193162</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-08-04T02:27:34Z</dc:date>
    </item>
    <item>
      <title>thanks Johnlloyds.Seems I was</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705993#M193163</link>
      <description>&lt;P&gt;thanks Johnlloyds.&lt;/P&gt;&lt;P&gt;Seems I was under impression that ASA can do http inspection as standalone but seem it could not do this. thank you for your valued input.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 08:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-inspection/m-p/2705993#M193163</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2015-08-04T08:42:09Z</dc:date>
    </item>
  </channel>
</rss>

