<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA HTTP Parameters in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-http-parameters/m-p/2305501#M344657</link>
    <description>&lt;P&gt;We can create an HTTP Inspect policy map and under the parameters configure it in such a way that it should spoof&amp;nbsp; the HTTP Banner however when it comes to HTTPS server ASA doesnt support HTTPS filtering therefore we wont be able to spoof the header . Correct me if I am wrong &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will we be able to spoof HTTPS header using IPS ? &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:25:54 GMT</pubDate>
    <dc:creator>communication.boy</dc:creator>
    <dc:date>2019-03-12T02:25:54Z</dc:date>
    <item>
      <title>ASA HTTP Parameters</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-parameters/m-p/2305501#M344657</link>
      <description>&lt;P&gt;We can create an HTTP Inspect policy map and under the parameters configure it in such a way that it should spoof&amp;nbsp; the HTTP Banner however when it comes to HTTPS server ASA doesnt support HTTPS filtering therefore we wont be able to spoof the header . Correct me if I am wrong &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will we be able to spoof HTTPS header using IPS ? &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-parameters/m-p/2305501#M344657</guid>
      <dc:creator>communication.boy</dc:creator>
      <dc:date>2019-03-12T02:25:54Z</dc:date>
    </item>
    <item>
      <title>ASA HTTP Parameters</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-parameters/m-p/2305502#M344658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the IPS also can't look into the HTTPS-communication, so there are no checks or modifications possible at all. You could do it in the Webserver-configuration or with the help of a reverse-proxy that also terminates the HTTPS-traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Aug 2013 08:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-parameters/m-p/2305502#M344658</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-08-15T08:15:42Z</dc:date>
    </item>
  </channel>
</rss>

