<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic protecting a web server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400730#M309164</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can configure that also through ASDM, but it's still complex:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/inspect_basic.html#wp2161256"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/inspect_basic.html#wp2161256&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps you should first focus on the host-security of your server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Nov 2013 15:42:59 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2013-11-12T15:42:59Z</dc:date>
    <item>
      <title>protecting a web server</title>
      <link>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400725#M309159</link>
      <description>&lt;P&gt;i have set up my ASA 5505 with a DMZ, in the DMZ i have my web server. Is it possible for my server to be attacked by hackers? what do i need to do to "harden" the config and make sure i avoid ANY attacks on my server. Most of my users access this server via FTP and this is a vulnerability, i ned to harden my ASA 5505 in this place.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400725#M309159</guid>
      <dc:creator>Amos Kafwembe</dc:creator>
      <dc:date>2019-03-12T03:03:36Z</dc:date>
    </item>
    <item>
      <title>protecting a web server</title>
      <link>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400726#M309160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First: You will never make your server 100% secure, but with some effort you can rise the bar that mach, that a casual attacker won't have much luck in that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some things to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Host-security / patch-management. That depends on the OS and the application you use.&lt;/P&gt;&lt;P&gt;2) Application-Inspection on the ASA. The ASA can inspect many protocols for protocol-conformance and application-layer attacks. That are the layer5-7 policy-maps. These are available both for your used protocols FTP and also HTTP. For that you first have to understand the applications and the protocol they are using.&lt;/P&gt;&lt;P&gt;3) Use IPS. The build-in IPS of the ASA is completely outdated to a module is needed. Fot the 5505 the module is EOL announced and so it's probably not an option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are left with hardening the server and then look into the Layer7-policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 09:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400726#M309160</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-11-12T09:52:37Z</dc:date>
    </item>
    <item>
      <title>protecting a web server</title>
      <link>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400727#M309161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the response. please see below, are those the application inspections you are refering to? i didnt configure them though, they were there by default. do i need to changeanything?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 10:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400727#M309161</guid>
      <dc:creator>Amos Kafwembe</dc:creator>
      <dc:date>2013-11-12T10:02:28Z</dc:date>
    </item>
    <item>
      <title>protecting a web server</title>
      <link>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400728#M309162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no, that's the Layer3-4 inspection. Here is the link to the L7-inspection in the config-guide:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/inspect_basic.html#wp2161256"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/inspect_basic.html#wp2161256&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before you can start on configuring that you have to know exactly how you want to protect the protocol. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 10:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400728#M309162</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-11-12T10:08:43Z</dc:date>
    </item>
    <item>
      <title>protecting a web server</title>
      <link>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400729#M309163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there an easy way to do this like through ASDM? i have tried to go throgh the link you pasted but eesh &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; i dont get it. am not the best of ASA admins. Thanks for the link too! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 15:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400729#M309163</guid>
      <dc:creator>Amos Kafwembe</dc:creator>
      <dc:date>2013-11-12T15:29:28Z</dc:date>
    </item>
    <item>
      <title>protecting a web server</title>
      <link>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400730#M309164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can configure that also through ASDM, but it's still complex:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/inspect_basic.html#wp2161256"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/inspect_basic.html#wp2161256&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps you should first focus on the host-security of your server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 15:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protecting-a-web-server/m-p/2400730#M309164</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-11-12T15:42:59Z</dc:date>
    </item>
  </channel>
</rss>

