<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inbound Allow ACL when http headers inspection is true. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247875#M349795</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we do it like this (No need for the regex class-map and lets use the header host):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;lass-map type inspect http match-all DENYCDNCLASS&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match not request header host regex &lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;CDNHEADER &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt; Remember to rate all of the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 May 2013 23:22:08 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-05-22T23:22:08Z</dc:date>
    <item>
      <title>Inbound Allow ACL when http headers inspection is true.</title>
      <link>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247870#M349790</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a request to make the following work on an asa 5515 deployment and I'm receiving a lot of conflicting information about how to implement the solution. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an external provider that requires access to an internal non-ssl webpage. They are unable to provide IP address details to lock down the ACL. They have asked if we can allow access based on http-header-inspection within the request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe this is possible using a class map to run the regex search for whatever he header string might be some form of AND rule such as;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(In english)&lt;/P&gt;&lt;P&gt;if outside-&amp;gt;inside ACL ANY to HOST TCP 80 is true&lt;/P&gt;&lt;P&gt;&amp;amp;&lt;/P&gt;&lt;P&gt;if classmap regex is true&lt;/P&gt;&lt;P&gt;Then allow access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you advise what type of technology would be required to get this working? If it is possible with the current 5515 technology what would you advise the answer is (or can you point me in the right direction to read the answer)?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247870#M349790</guid>
      <dc:creator>Andrew Sinclair</dc:creator>
      <dc:date>2019-03-12T01:44:21Z</dc:date>
    </item>
    <item>
      <title>Inbound Allow ACL when http headers inspection is true.</title>
      <link>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247871#M349791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the MPF setup &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 16:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247871#M349791</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-16T16:56:10Z</dc:date>
    </item>
    <item>
      <title>Inbound Allow ACL when http headers inspection is true.</title>
      <link>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247872#M349792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure that we can do what we need to do with MPF.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What we have is a standard HTTP/80 domain test.example.com. This domain needs to be accessible from anywhere but only when the incoming HTTP session contains the HTTP header X-example: "somestring".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way it works just now is a regex match has been created for "somestring".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This match is then added to an HTTP inspection policy as MATCH NOT and the string class.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is then assigned to a service-policy that that has an ACL specified as ANY -&amp;gt; HOST.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would have assumed that this means any traffic on that ACL will be inspected and any HTTP sessions that do NOT contain the string "somestring" would be dropped. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for this is the only people who should have access to this page is a CDN network to cache the webpage however as they have so many source IP addresses it wouldn't be practical to create an ACL based on that logic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone offer any advice on this topic. It would be greatly appreciated. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 20:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247872#M349792</guid>
      <dc:creator>Andrew Sinclair</dc:creator>
      <dc:date>2013-05-22T20:23:29Z</dc:date>
    </item>
    <item>
      <title>Inbound Allow ACL when http headers inspection is true.</title>
      <link>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247873#M349793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It makes sense,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean I would match the traffic with an ACL with port 80 and then use a match-not with the specific regex and drop/reset option as you suggested,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you done it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 21:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247873#M349793</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-22T21:37:26Z</dc:date>
    </item>
    <item>
      <title>Inbound Allow ACL when http headers inspection is true.</title>
      <link>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247874#M349794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will give this another test as soon as I can, I'm not sure I need to make the class CDN_REGEX_MAP, I think I could simply place the 'match not request header regex CDNHEADER' in the inspect policy. I will let you know how it goes. For sake of &lt;SPAN style="font-size: 10pt;"&gt;completeness &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;I've included my code. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; regex CDNHEADER "someheader"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class-map type regex match-any CDN_REGEX_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;match regex CDNHEADER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class-map type inspect http match-all DENYCDNCLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;match not request header regex class CDN_REGEX_MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; policy-map type inspect http CDNPOLICYMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;class DENYCDNCLASS&lt;/P&gt;&lt;P&gt; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list OUTSIDE_MPF extended permit tcp any 1.1.1.1 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class-map OUTSIDEMPF-CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;match access-list OUTSIDE_MPF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map outside_policy&lt;/P&gt;&lt;P&gt; class OUTSIDEMPF-CMAP&lt;/P&gt;&lt;P&gt; inspect http CDNPOLICYMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; service-policy outside_policy interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 23:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247874#M349794</guid>
      <dc:creator>Andrew Sinclair</dc:creator>
      <dc:date>2013-05-22T23:03:15Z</dc:date>
    </item>
    <item>
      <title>Inbound Allow ACL when http headers inspection is true.</title>
      <link>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247875#M349795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we do it like this (No need for the regex class-map and lets use the header host):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;lass-map type inspect http match-all DENYCDNCLASS&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match not request header host regex &lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;CDNHEADER &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt; Remember to rate all of the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 23:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-allow-acl-when-http-headers-inspection-is-true/m-p/2247875#M349795</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-22T23:22:08Z</dc:date>
    </item>
  </channel>
</rss>

