<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how to block https sites with asa 5515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-block-https-sites-with-asa-5515/m-p/2481857#M267900</link>
    <description>&lt;P&gt;Hi friends, i want to block https sites and i have a cisco asa 5515-x, somebody have idea for do that?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:01:20 GMT</pubDate>
    <dc:creator>Shakespeare Rodas</dc:creator>
    <dc:date>2019-03-12T04:01:20Z</dc:date>
    <item>
      <title>how to block https sites with asa 5515</title>
      <link>https://community.cisco.com/t5/network-security/how-to-block-https-sites-with-asa-5515/m-p/2481857#M267900</link>
      <description>&lt;P&gt;Hi friends, i want to block https sites and i have a cisco asa 5515-x, somebody have idea for do that?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-block-https-sites-with-asa-5515/m-p/2481857#M267900</guid>
      <dc:creator>Shakespeare Rodas</dc:creator>
      <dc:date>2019-03-12T04:01:20Z</dc:date>
    </item>
    <item>
      <title>The default behavior of an</title>
      <link>https://community.cisco.com/t5/network-security/how-to-block-https-sites-with-asa-5515/m-p/2481858#M267901</link>
      <description>&lt;P&gt;The default behavior of an ASA is to allow all traffic from more secure (Inside) to less secure (Outside) interfaces. If you want to change that then add an access-list.&lt;/P&gt;&lt;P&gt;The problem is that most - but not all - sites use tcp/443 for https. So while a simple deny tcp/443 followed by a permit any (required because once you put and access control list entry on an interface, an implicit "deny any" is added to the end of the list) will catch most of the https, it won't catch it all.&lt;/P&gt;&lt;P&gt;But if that suffices for your purposes go for it.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2014 20:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-block-https-sites-with-asa-5515/m-p/2481858#M267901</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-01T20:37:23Z</dc:date>
    </item>
  </channel>
</rss>

