<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I'm not sure which reference in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437260#M267784</link>
    <description>&lt;P&gt;I'm not sure which reference you're citing, but in ASDM if you go to "Configuration &amp;gt; Firewall &amp;gt; Objects &amp;gt; Inspect Maps &amp;gt; HTTP" and click on "Add" you will see a dialog box with a slider which shows what each level consists of by default. You can further customize by choosing the Details, URI Filtering, etc.&lt;/P&gt;&lt;P&gt;(Very very few people actually use the built-in http inspection and instead use either a 3rd party solution like WebSense URL filtering or a Proxy server like WSA or BlueCoat or else use the ASA CSC module of NGFX CX module with AVC and WSE.)&lt;/P&gt;&lt;P&gt;See the following screenshot for what I wan talking about in my first paragraph:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/capture_5.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 Apr 2014 03:01:36 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-04-07T03:01:36Z</dc:date>
    <item>
      <title>Default HTTP inspection map</title>
      <link>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437259#M267783</link>
      <description>&lt;P&gt;Hi guys.&lt;/P&gt;&lt;P&gt;When configuring Inspect HTTP there is an option to use Default HTTP Inspection Map.&lt;/P&gt;&lt;P&gt;Its used here as an example on the documentation;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;From the Select HTTP Inspect Map window, check the radio button next to&amp;nbsp;&lt;/SPAN&gt;&lt;B style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;Use the Default HTTP inspection map&lt;/B&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;. The default HTTP inspection is used in this example. Then, click&amp;nbsp;&lt;/SPAN&gt;&lt;B style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;OK&lt;/B&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;However I cannot actually see anywhere what these Default settings are.&lt;/P&gt;&lt;P&gt;For example; it is possible to set varying security levels when configuring manually (low-medium-high) with differing options in each, but what are the security level and specific settings when choosing default?&lt;/P&gt;&lt;P&gt;I cannot find any reference to these.&lt;/P&gt;&lt;P&gt;If anyone can help that would be great.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437259#M267783</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2019-03-12T04:02:21Z</dc:date>
    </item>
    <item>
      <title>I'm not sure which reference</title>
      <link>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437260#M267784</link>
      <description>&lt;P&gt;I'm not sure which reference you're citing, but in ASDM if you go to "Configuration &amp;gt; Firewall &amp;gt; Objects &amp;gt; Inspect Maps &amp;gt; HTTP" and click on "Add" you will see a dialog box with a slider which shows what each level consists of by default. You can further customize by choosing the Details, URI Filtering, etc.&lt;/P&gt;&lt;P&gt;(Very very few people actually use the built-in http inspection and instead use either a 3rd party solution like WebSense URL filtering or a Proxy server like WSA or BlueCoat or else use the ASA CSC module of NGFX CX module with AVC and WSE.)&lt;/P&gt;&lt;P&gt;See the following screenshot for what I wan talking about in my first paragraph:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/capture_5.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2014 03:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437260#M267784</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-07T03:01:36Z</dc:date>
    </item>
    <item>
      <title>Sorry I think I confused</title>
      <link>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437261#M267785</link>
      <description>&lt;P&gt;Sorry I think I confused things slightly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i realise an inspection map can be created. What I am referring to is that when you simply select "Use the default HTTP inspection map" - what configuration does it actually use here?&lt;/P&gt;&lt;P&gt;I cannot see any default map listed or what it's default settings are?&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2014 10:16:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437261#M267785</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2014-04-07T10:16:34Z</dc:date>
    </item>
    <item>
      <title>To enable HTTP inspection you</title>
      <link>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437262#M267786</link>
      <description>&lt;P&gt;To enable HTTP inspection you have to specify/choose an inspection map. This is needed because in order to inspect something, it needs to know what to inspect. From what I understand, using default HTTP inspection map means that you are verifying all HTTP packets that use port 80 to conform with RFC 2616. Keep in mind that it is only verifying and won't do anything to that traffic unless you specify a policy map.&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2014 13:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-http-inspection-map/m-p/2437262#M267786</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-07T13:05:32Z</dc:date>
    </item>
  </channel>
</rss>

