<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Proxy inspector drop reset in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/proxy-inspector-drop-reset/m-p/2079537#M393910</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This looks like port 80 traffic. Do you have http inspection enabled? If so, you can try to remove http inspection and see if the client is able to load the website hosted behind the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt; no inspect http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/community/netpro/expert-corner" rel="nofollow"&gt;https://supportforums.cisco.com/community/netpro/expert-corner#view=webcasts&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Upcoming Live Webcast in English: January 15, 2013 &lt;BR /&gt;Troubleshooting ASA and Firewall Service Modules &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Register today: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/squish/42F25" rel="nofollow"&gt;http://tools.cisco.com/squish/42F25&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 13 Jan 2013 19:17:52 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2013-01-13T19:17:52Z</dc:date>
    <item>
      <title>Proxy inspector drop reset</title>
      <link>https://community.cisco.com/t5/network-security/proxy-inspector-drop-reset/m-p/2079536#M393909</link>
      <description>&lt;P&gt;Outside users with certain public ip addresses are not able to access our website.&amp;nbsp; Below is a log from our ASA 5550 8.2(5)&amp;nbsp; on one of the clients that's being dropped.&amp;nbsp; Packet trace result shows that the outside public addresses are allowed.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have a TAC case open but wanted to also check the forum if anyone had ran in to this issue before.&amp;nbsp;&amp;nbsp; Any comment is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #993300;"&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dec 19 2012&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15:40:15&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 507003&amp;nbsp; xxx.xxx.x.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23348&amp;nbsp;&amp;nbsp;&amp;nbsp; xxx.xxx.88.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp flow from outside:xxx.xxx.xxx.2/23348 to DMZ:xxx.xxx.xx.1/80 terminated by inspection engine, reason - proxy inspector drop reset.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #993300;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #993300;"&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proxy-inspector-drop-reset/m-p/2079536#M393909</guid>
      <dc:creator>Richard Dumag</dc:creator>
      <dc:date>2019-03-12T00:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: Proxy inspector drop reset</title>
      <link>https://community.cisco.com/t5/network-security/proxy-inspector-drop-reset/m-p/2079537#M393910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This looks like port 80 traffic. Do you have http inspection enabled? If so, you can try to remove http inspection and see if the client is able to load the website hosted behind the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt; no inspect http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/community/netpro/expert-corner" rel="nofollow"&gt;https://supportforums.cisco.com/community/netpro/expert-corner#view=webcasts&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Upcoming Live Webcast in English: January 15, 2013 &lt;BR /&gt;Troubleshooting ASA and Firewall Service Modules &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Register today: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/squish/42F25" rel="nofollow"&gt;http://tools.cisco.com/squish/42F25&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 19:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proxy-inspector-drop-reset/m-p/2079537#M393910</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-13T19:17:52Z</dc:date>
    </item>
  </channel>
</rss>

