<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,Thank you for answer.But, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684662#M193697</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thank you for answer.&lt;/P&gt;&lt;P&gt;But, then I’ll still have usual issues when there is no SSL interception like:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Block all destination that doesn’t have valid cert.&lt;/LI&gt;&lt;LI&gt;Cannot see inside HTTPS traffic for let say DLP or malware scanning&lt;/LI&gt;&lt;LI&gt;Cannot see inside HTTPS traffic for HTTP methods, you can only see HTTPS CONNECT method.&lt;/LI&gt;&lt;LI&gt;Block SSL, user cannot see error page because there is no SSL interception. &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So, for that we need SSL Appliance?&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jul 2015 15:35:12 GMT</pubDate>
    <dc:creator>Juraj Ban</dc:creator>
    <dc:date>2015-07-17T15:35:12Z</dc:date>
    <item>
      <title>Web SSL Inspection</title>
      <link>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684660#M193695</link>
      <description>&lt;P&gt;Can ASA with FirePower services inspect SSL traffic or we need SSL inspection appliance.&lt;/P&gt;&lt;P&gt;How can ASA force Application Control for SSL. Let say, allow only reading of Social Networking while bloking upload/post if not be able to see inside SSL?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:17:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684660#M193695</guid>
      <dc:creator>Juraj Ban</dc:creator>
      <dc:date>2019-03-12T06:17:00Z</dc:date>
    </item>
    <item>
      <title>ASA cannot block</title>
      <link>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684661#M193696</link>
      <description>&lt;P&gt;ASA cannot block HTTPS&lt;/P&gt;&lt;P&gt;Firepower has an option of URL blocking that treats http and https as equal&lt;/P&gt;&lt;P&gt;You can go through it for more info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/AC-Rules-App-URL-Reputation.html#pgfId-1537119&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Puneesh&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:10px;"&gt;Please rate the helpful posts&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 15:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684661#M193696</guid>
      <dc:creator>Puneesh Chhabra</dc:creator>
      <dc:date>2015-07-17T15:10:16Z</dc:date>
    </item>
    <item>
      <title>Hi,Thank you for answer.But,</title>
      <link>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684662#M193697</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thank you for answer.&lt;/P&gt;&lt;P&gt;But, then I’ll still have usual issues when there is no SSL interception like:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Block all destination that doesn’t have valid cert.&lt;/LI&gt;&lt;LI&gt;Cannot see inside HTTPS traffic for let say DLP or malware scanning&lt;/LI&gt;&lt;LI&gt;Cannot see inside HTTPS traffic for HTTP methods, you can only see HTTPS CONNECT method.&lt;/LI&gt;&lt;LI&gt;Block SSL, user cannot see error page because there is no SSL interception. &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So, for that we need SSL Appliance?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 15:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684662#M193697</guid>
      <dc:creator>Juraj Ban</dc:creator>
      <dc:date>2015-07-17T15:35:12Z</dc:date>
    </item>
    <item>
      <title>Yes, you'd require web</title>
      <link>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684663#M193699</link>
      <description>&lt;P&gt;Yes, you'd require web application firewalls for all those.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Puneesh&lt;/P&gt;&lt;P&gt;&lt;EM style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);"&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10px;"&gt;Please rate the helpful posts&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2015 01:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684663#M193699</guid>
      <dc:creator>Puneesh Chhabra</dc:creator>
      <dc:date>2015-07-18T01:57:37Z</dc:date>
    </item>
    <item>
      <title>Hi,Adding on to what puneesh</title>
      <link>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684664#M193701</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Adding on to what puneesh said , we can use DNS REGEX on the ASA device is the DNS queries are going through the ASA device and then block the HTTPS websites as well if only blocking is required and not looking in the SSL header is the required.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2015 05:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-ssl-inspection/m-p/2684664#M193701</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-07-18T05:23:46Z</dc:date>
    </item>
  </channel>
</rss>

