<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Asa 5510 blocks https access to Internet websites in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099490#M392462</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, to any https server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dimitrios&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Jan 2013 07:11:34 GMT</pubDate>
    <dc:creator>kilias</dc:creator>
    <dc:date>2013-01-22T07:11:34Z</dc:date>
    <item>
      <title>Asa 5510 blocks https access to Internet websites</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099486#M392450</link>
      <description>&lt;P&gt;I have installed a new ASA5510 with CSC, and everything is working properly except the access to websites using https. All sites/access to them seem to be blocked by the ASA. I have read that this access is by default enabled and I have tried to add configuration to allow https access to the firewall but without success. Can someone help me on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the system configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)&lt;BR /&gt;!&lt;BR /&gt;hostname test&lt;BR /&gt;enable password XXXXXXX&lt;BR /&gt;passwd XXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.240.10 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif Internal&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network MailInternal&lt;BR /&gt;host 192.168.10.190&lt;BR /&gt;object network mailServer&lt;BR /&gt;host 194.219.197.80&lt;BR /&gt;access-list OUTSIDE_IN_ACL extended permit icmp any any echo-reply&lt;BR /&gt;access-list OUTSIDE_IN_ACL extended permit icmp any any time-exceeded&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Internal 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (Internal,Outside) dynamic interface&lt;BR /&gt;access-group OUTSIDE_IN_ACL in interface Outside&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 192.168.240.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.10.0 255.255.255.0 Internal&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet 192.168.10.0 255.255.255.0 Internal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 193.92.150.3 source Outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;username rtel password vj1wQJw/7OjGiJ/3 encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map Outside-class&lt;BR /&gt;match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect ctiqbe&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect ils&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp; inspect mgcp&lt;BR /&gt;&amp;nbsp; inspect snmp&lt;BR /&gt;policy-map Outside-policy&lt;BR /&gt;class Outside-class&lt;BR /&gt;&amp;nbsp; csc fail-open&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy Outside-policy interface Outside&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:e821552c28089bf25b5a3449cd9f3835&lt;BR /&gt;: end&lt;BR /&gt;test#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099486#M392450</guid>
      <dc:creator>kilias</dc:creator>
      <dc:date>2019-03-12T00:50:07Z</dc:date>
    </item>
    <item>
      <title>Asa 5510 blocks https access to Internet websites</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099487#M392453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kilias,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version on the CSC are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the configuration is not the one recommended...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the following&lt;/P&gt;&lt;P&gt;access-list CSC deny ip host x.x.x.x (CSC module Ip address) any&lt;/P&gt;&lt;P&gt;access-list CSC permit tcp any any eq 25&lt;/P&gt;&lt;P&gt;access-list CSC permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;access-list CSC permit tcp any any eq 21&lt;/P&gt;&lt;P&gt;access-list CSC permit tcp any any eq 110&lt;/P&gt;&lt;P&gt;access-list CSC permit tcp any any eq 443 ( If you are running a version that supports the inspection/filtering of HTTPS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map CSC&lt;/P&gt;&lt;P&gt;match access-list CSC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map Outside-policy&lt;/P&gt;&lt;P&gt;no class Outside-class&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map Outside-policy&lt;/P&gt;&lt;P&gt;class CSC&lt;/P&gt;&lt;P&gt;csc fail-open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2013 18:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099487#M392453</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-21T18:24:18Z</dc:date>
    </item>
    <item>
      <title>Asa 5510 blocks https access to Internet websites</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099488#M392455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Jcarvaja,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have entered the above code but it still doesn't work. I think the problem is in the firewall and not in the CSC.&lt;/P&gt;&lt;P&gt;Please look at the following output from the ASA syslog:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Jan 21 2013|19:58:14|302013|192.168.10.10|55598|195.39.236.226|443|Built outbound TCP connection 34563 for Outside:195.39.236.226/443 (195.39.236.226/443) to Internal:192.168.10.10/55598 (192.168.240.10/55598)&lt;/P&gt;&lt;P&gt;6|Jan 21 2013|19:58:13|302014|195.39.236.226|443|192.168.10.10|55598|Teardown TCP connection 34562 for Outside:195.39.236.226/443 to Internal:192.168.10.10/55598 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jan 21 2013|19:58:13|302013|192.168.10.10|55598|195.39.236.226|443|Built outbound TCP connection 34562 for Outside:195.39.236.226/443 (195.39.236.226/443) to Internal:192.168.10.10/55598 (192.168.240.10/55598)&lt;/P&gt;&lt;P&gt;6|Jan 21 2013|19:58:13|302014|195.39.236.226|443|192.168.10.10|55598|Teardown TCP connection 34561 for Outside:195.39.236.226/443 to Internal:192.168.10.10/55598 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jan 21 2013|19:58:13|302014|195.39.236.226|443|192.168.10.10|55597|Teardown TCP connection 34560 for Outside:195.39.236.226/443 to Internal:192.168.10.10/55597 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jan 21 2013|19:58:13|302013|192.168.10.10|55598|195.39.236.226|443|Built outbound TCP connection 34561 for Outside:195.39.236.226/443 (195.39.236.226/443) to Internal:192.168.10.10/55598 (192.168.240.10/55598)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that the firewall blocks any internet https access and I don't know why.&lt;/P&gt;&lt;P&gt;I have also checked the https access directly to the router and it works OK, so the problem is for sure within the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA version is 8.44-K8&lt;/P&gt;&lt;P&gt;CSC SSM version is 6.3.1172.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas of how to resolve this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 07:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099488#M392455</guid>
      <dc:creator>kilias</dc:creator>
      <dc:date>2013-01-22T07:03:35Z</dc:date>
    </item>
    <item>
      <title>Asa 5510 blocks https access to Internet websites</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099489#M392459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually the logs say you are receiving a reset packet from the outside servers...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you get the same logs if you try to access another HTTPS server??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 07:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099489#M392459</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-22T07:06:23Z</dc:date>
    </item>
    <item>
      <title>Asa 5510 blocks https access to Internet websites</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099490#M392462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, to any https server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dimitrios&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 07:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099490#M392462</guid>
      <dc:creator>kilias</dc:creator>
      <dc:date>2013-01-22T07:11:34Z</dc:date>
    </item>
    <item>
      <title>Asa 5510 blocks https access to Internet websites</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099491#M392465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is pretty weird as everything seems to be good on your config,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens if you take the ASA out of the picture, does it work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 05:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099491#M392465</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-23T05:40:35Z</dc:date>
    </item>
    <item>
      <title>Asa 5510 blocks https access to Internet websites</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099492#M392468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear jcarvaja.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sorry for the delayed reply but I was out of town for a project. Well, if ASA is out of the picture, everything works fine.&lt;/P&gt;&lt;P&gt;Today I managed to have a work around and pinpointed the problem to the CSC rather to the firewall. I have exluded the csc for all https traffic, and the access to https sites is OK now. This is a semi-acceptable solution because the office can work OK but the ASA can't perform CSC management for https traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyhow, I will look into this in more detail during the week and will post more info of how to solve the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Jan 2013 16:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-blocks-https-access-to-internet-websites/m-p/2099492#M392468</guid>
      <dc:creator>kilias</dc:creator>
      <dc:date>2013-01-27T16:39:14Z</dc:date>
    </item>
  </channel>
</rss>

