<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Then you need to find a in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536628#M237244</link>
    <description>&lt;P&gt;Then you need to find a different solution...you might want to look at solutions such as clientless SSL VPN, Citrix, or similar.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 26 Jun 2014 06:36:50 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-06-26T06:36:50Z</dc:date>
    <item>
      <title>Cisco ASA rely HTTP port to HTTPS without using CNAME DNS-record</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536622#M237235</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;could anyone tell me Is it possible to configure ASA so when customer rely &lt;STRONG&gt;http://&lt;/STRONG&gt;domain.com Cisco ASA rely to &lt;STRONG&gt;https://&lt;/STRONG&gt;domain.com (it's similar with CName function of domain record).&lt;/P&gt;&lt;P&gt;P.S. resource of domain.com located behind ASA and DNS A-record rely on public ASA ip address&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536622#M237235</guid>
      <dc:creator>Vadim Semenov</dc:creator>
      <dc:date>2019-03-12T04:22:27Z</dc:date>
    </item>
    <item>
      <title>The ASA can not do this</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536623#M237238</link>
      <description>&lt;P&gt;The ASA can not do this redirect based on URL/FQDN.&amp;nbsp; You would need to find another way of doing it.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2014 10:26:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536623#M237238</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-25T10:26:17Z</dc:date>
    </item>
    <item>
      <title>What version ASA are you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536624#M237239</link>
      <description>&lt;P&gt;What version ASA are you running?&lt;/P&gt;&lt;P&gt;If the server has both static public and private IPs you could use NAT to redirect HTTP traffic to HTTPS based on IP.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network PUBLIC_IP&lt;BR /&gt;&amp;nbsp; host 1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network REAL_IP&lt;BR /&gt;&amp;nbsp; host 2.2.2.2&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static PUBLIC_IP http https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that you will also need a NAT statement that maintains https to the server.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2014 10:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536624#M237239</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-25T10:42:50Z</dc:date>
    </item>
    <item>
      <title>Hello, Marius,thank you for</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536625#M237241</link>
      <description>&lt;P&gt;Hello, Marius,&lt;/P&gt;&lt;P&gt;thank you for your reply. I understand that we should find another way of doing it.&lt;/P&gt;&lt;P&gt;From your example follow what server must work with http protocol and after ASA it will be already https protocol?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2014 06:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536625#M237241</guid>
      <dc:creator>Vadim Semenov</dc:creator>
      <dc:date>2014-06-26T06:04:31Z</dc:date>
    </item>
    <item>
      <title>In my example above, any http</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536626#M237242</link>
      <description>&lt;P&gt;In my example above, any http traffic that is destined for public IP 1.1.1.1 will be translated to the private IP of 2.2.2.2 and the port will be translated to https.&lt;/P&gt;&lt;P&gt;http to 1.1.1.1 --&amp;gt;&amp;nbsp; https to 2.2.2.2&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2014 06:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536626#M237242</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-26T06:21:23Z</dc:date>
    </item>
    <item>
      <title>Ok, but it highly neccessery</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536627#M237243</link>
      <description>&lt;P&gt;Ok, but it highly neccessery to force customer using https until ASA, and it not very critical what we using https inside network.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2014 06:34:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536627#M237243</guid>
      <dc:creator>Vadim Semenov</dc:creator>
      <dc:date>2014-06-26T06:34:44Z</dc:date>
    </item>
    <item>
      <title>Then you need to find a</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536628#M237244</link>
      <description>&lt;P&gt;Then you need to find a different solution...you might want to look at solutions such as clientless SSL VPN, Citrix, or similar.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2014 06:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-rely-http-port-to-https-without-using-cname-dns-record/m-p/2536628#M237244</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-26T06:36:50Z</dc:date>
    </item>
  </channel>
</rss>

