<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HTTP Inspection Cisco PIX 525 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061719#M398843</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Matthias&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you Make sure that your acl HACKBLOCK_HOSTS properly configured&amp;nbsp; and you are getting hits on the ACL when you are trying ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Sep 2012 14:38:25 GMT</pubDate>
    <dc:creator>Harish Balakrishnan</dc:creator>
    <dc:date>2012-09-25T14:38:25Z</dc:date>
    <item>
      <title>HTTP Inspection Cisco PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061718#M398842</link>
      <description>&lt;P&gt;I need to filter inbound HTTP requests &amp;lt;outside&amp;gt; to &amp;lt;dmz&amp;gt; headed to &lt;A href="http://www.XYZ.com/XXX/admin/XXX.jsp" target="_blank"&gt;www.XYZ.com/XXX/admin/XXX.jsp&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My regex is:&amp;nbsp;&amp;nbsp;&amp;nbsp; regex HACKBLOCK "*/admin/.*\.jsp*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My class-maps are:&amp;nbsp; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type regex match-any HACKBLOCK_METHOD&lt;/P&gt;&lt;P&gt; match regex GET&lt;/P&gt;&lt;P&gt;class-map XXXXTWBLOCK&lt;/P&gt;&lt;P&gt; match access-list HACKBLOCK_HOSTS&lt;/P&gt;&lt;P&gt;class-map type regex match-any HACKBLOCK_URL&lt;/P&gt;&lt;P&gt; match regex HACKBLOCK&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all HACKBLOCK_FILTER&lt;/P&gt;&lt;P&gt; match request uri regex class HACKBLOCK_URL&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My policy-maps are:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect http HACKBLOCK_HTTP&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; class HACKBLOCK_FILTER&lt;/P&gt;&lt;P&gt;&amp;nbsp; log&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt; class XXXXTWBLOCK&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http HACKBLOCK_HTTP &lt;/P&gt;&lt;P&gt;policy-map OUTSIDE&lt;/P&gt;&lt;P&gt; class XXXXTWBLOCK&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http HACKBLOCK_HTTP &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 1200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, I added the inspection rule to a seperate class name ENPROTWBLOCK.&amp;nbsp; This matches traffic based on destination of our class C.&amp;nbsp; I see that I am matching traffic in the ACL, but no matches on the HTTP inspection rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh service-pol inspec http&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;Global policy: &lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy: global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: XXXXTWBLOCK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: http HACKBLOCK_HTTP, packet 745097, drop 0, reset-drop 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol violations&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet 34206&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class HACKBLOCK_FILTER&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log, packet 0&lt;/P&gt;&lt;P&gt;enp-amer-clt-pix525-a# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am generating bogus traffic to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www" target="_blank"&gt;http://www&lt;/A&gt;&lt;SPAN&gt;.&amp;lt;ourdomain&amp;gt;.com/admin/test.jsp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea whats going on here and why I am not macthing the HTTP uri's ????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matthias&amp;nbsp; CCIE# 28445&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061718#M398842</guid>
      <dc:creator>matthiasbuchholz</dc:creator>
      <dc:date>2019-03-11T23:58:44Z</dc:date>
    </item>
    <item>
      <title>HTTP Inspection Cisco PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061719#M398843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Matthias&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you Make sure that your acl HACKBLOCK_HOSTS properly configured&amp;nbsp; and you are getting hits on the ACL when you are trying ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 14:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061719#M398843</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-25T14:38:25Z</dc:date>
    </item>
    <item>
      <title>HTTP Inspection Cisco PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061720#M398845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I get hits on the ACL.&amp;nbsp; The issue is that the HTTP inspection does not seem to function.&amp;nbsp; Just for my own understanding, the global policy will match inbound traffic arriving on the outside interface right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list HACKBLOCK_HOSTS line 1 extended permit ip any 66.192.168.0 255.255.255.0 (hitcnt=65138) 0x6402ac20 &lt;/P&gt;&lt;P&gt;enp-amer-clt-pix525-a# sh access-list HACKBLOCK_HOSTS&lt;/P&gt;&lt;P&gt;access-list HACKBLOCK_HOSTS; 1 elements&lt;/P&gt;&lt;P&gt;access-list HACKBLOCK_HOSTS line 1 extended permit ip any 66.192.168.0 255.255.255.0 (hitcnt=65245) 0x6402ac20 &lt;/P&gt;&lt;P&gt;enp-amer-clt-pix525-a# sh access-list HACKBLOCK_HOSTS&lt;/P&gt;&lt;P&gt;access-list HACKBLOCK_HOSTS; 1 elements&lt;/P&gt;&lt;P&gt;access-list HACKBLOCK_HOSTS line 1 extended permit ip any 66.192.168.0 255.255.255.0 (hitcnt=65285) 0x6402ac20 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 14:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061720#M398845</guid>
      <dc:creator>matthiasbuchholz</dc:creator>
      <dc:date>2012-09-25T14:45:02Z</dc:date>
    </item>
    <item>
      <title>HTTP Inspection Cisco PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061721#M398848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I figured it out !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The regular expression was incorrect: &lt;/P&gt;&lt;P&gt;I had:&amp;nbsp; &lt;/P&gt;&lt;P&gt;regex HACKBLOCK "*/admin/.*\.jsp*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I needed&lt;/P&gt;&lt;P&gt;regex HACKBLOCK "&lt;STRONG&gt;.&lt;/STRONG&gt;*/admin/.*\.jsp&lt;STRONG&gt;.&lt;/STRONG&gt;*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now I see matched traffic:&lt;/P&gt;&lt;P&gt;Global policy: &lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy: global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: ENPROTWBLOCK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: http HACKBLOCK_HTTP, packet 25380, drop 0, reset-drop 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol violations&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet 1628&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class HACKBLOCK_FILTER&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log, packet 2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 14:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection-cisco-pix-525/m-p/2061721#M398848</guid>
      <dc:creator>matthiasbuchholz</dc:creator>
      <dc:date>2012-09-25T14:59:26Z</dc:date>
    </item>
  </channel>
</rss>

