<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA port-misuse issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481300#M428565</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, and thanks for the feedback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried doing what you wrote.  The problem is that im and p2p applications are still being let through.  I need to block im and p2p programs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stevan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jul 2005 11:42:37 GMT</pubDate>
    <dc:creator>stevezups</dc:creator>
    <dc:date>2005-07-19T11:42:37Z</dc:date>
    <item>
      <title>ASA port-misuse issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481298#M428563</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just got an ASA 5520 VPN Plus and I'm having trouble blocking p2p and im programs.&lt;/P&gt;&lt;P&gt;The problem is when I block p2p and im programs, no other web sites work.  Here is my config below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.0(1)&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; nameif Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxxxxxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;passwd xxxx&lt;/P&gt;&lt;P&gt;hostname xxxxxxx&lt;/P&gt;&lt;P&gt;domain-name xxxxxxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;http-map test-http&lt;/P&gt;&lt;P&gt; port-misuse p2p action drop&lt;/P&gt;&lt;P&gt; port-misuse tunnelling action allow&lt;/P&gt;&lt;P&gt; port-misuse im action drop&lt;/P&gt;&lt;P&gt; port-misuse default action allow&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu Internet 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;monitor-interface Inside&lt;/P&gt;&lt;P&gt;monitor-interface Internet&lt;/P&gt;&lt;P&gt;monitor-interface management&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-501.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Internet) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route Internet xxxxxxx&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.10.2 255.255.255.255 Inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map test&lt;/P&gt;&lt;P&gt; match access-list 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map policy&lt;/P&gt;&lt;P&gt; class test&lt;/P&gt;&lt;P&gt;  inspect http test-http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stevan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481298#M428563</guid>
      <dc:creator>stevezups</dc:creator>
      <dc:date>2020-02-21T08:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port-misuse issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481299#M428564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As soon as you define a http-map it tells the PIX to start strict HTTP inspection, regardless of the other specific parameters you set within the http-map.  I think what might be going on is the fact your class-map is directing ALL IP traffic through this http-map via access-list 100, and because that traffic is not actually HTTP it is dropped by the strict inspection rules.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest changing your class map to only send HTTP packets through the http-map, that should allow all other packets to flow through correctly (and it will speed them up greatly also).  The following should resolve your problem:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;class-map test&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;match port tcp eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will ensure that only HTTP packets are sent through the HTTP inspection engine, which makes sense anyway.  Another way to do it, especially if you want to define a few different port numbers as HTTP traffic (8080, 8800, etc), is to change your ACL 100 to define only TCP traffic on those ports, rather than "ip any any" as you currently have.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2005 22:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481299#M428564</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2005-07-18T22:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port-misuse issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481300#M428565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, and thanks for the feedback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried doing what you wrote.  The problem is that im and p2p applications are still being let through.  I need to block im and p2p programs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stevan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2005 11:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481300#M428565</guid>
      <dc:creator>stevezups</dc:creator>
      <dc:date>2005-07-19T11:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port-misuse issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481301#M428566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;For version 7.0 not all p2p &amp;amp; im gets detected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;p2p: only detects Kazaa &amp;amp; Gnutella.&lt;/P&gt;&lt;P&gt;im: only detects Yahoo messenger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try turning it around like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http-map test-http &lt;/P&gt;&lt;P&gt;port-misuse tunnelling action allow &lt;/P&gt;&lt;P&gt;port-misuse default action drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to only match port 80 traffic in your class-map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jul 2005 08:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481301#M428566</guid>
      <dc:creator>ThomasMoeller</dc:creator>
      <dc:date>2005-07-22T08:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port-misuse issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481302#M428567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't work - it's a bug (and still is!) - see CSCsb41742&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2005 09:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-misuse-issues/m-p/481302#M428567</guid>
      <dc:creator>JPMS</dc:creator>
      <dc:date>2005-12-14T09:47:08Z</dc:date>
    </item>
  </channel>
</rss>

