<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA blocking IM using http? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560016#M429326</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Greg, &lt;/P&gt;&lt;P&gt;Unfortunately,there is no URL filtering in the PIX as it wasn't designed for that.The IMs blocking is a relatively new feature too.&lt;/P&gt;&lt;P&gt;I suggest you go in for some good URL filtering software to crack down on those HTTP-MSN users. I believe Websense is the best in the market and if I'm not mistaken , I believe Cisco has some tie up with those guys too. &lt;/P&gt;&lt;P&gt;So the answer to your question, No.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 25 Mar 2006 05:38:02 GMT</pubDate>
    <dc:creator>victorrodrigues</dc:creator>
    <dc:date>2006-03-25T05:38:02Z</dc:date>
    <item>
      <title>ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560010#M429319</link>
      <description>&lt;P&gt;I'm confused. The cisco ASA book I have states to block Instant Messaging use a http-map. Most IM aren't using http or port 80 correct? I tried the commands http-map Filter_http &lt;/P&gt;&lt;P&gt;port-misuse im action drop&lt;/P&gt;&lt;P&gt;IM still works? Any ideas? I may just use an ACL with IP addresses.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560010#M429319</guid>
      <dc:creator>PaulWelc</dc:creator>
      <dc:date>2020-02-21T08:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560011#M429321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IMs like MSN and Yahoo messenger by default will try to use their configured port (1863 and 5050 respectively). If they can't connect using these ports, they will then try port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So block these ports first then in addition leave the http-map that you have configured so it will block their attempt to encapsulate the message in http.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it can still get through the pix, you can check the logs to see what port it uses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Mar 2006 23:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560011#M429321</guid>
      <dc:creator>Michael Tan</dc:creator>
      <dc:date>2006-03-23T23:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560012#M429322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another thing you need to add:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http-map Filter_http &lt;/P&gt;&lt;P&gt;port-misuse im action drop &lt;/P&gt;&lt;P&gt;port-misuse tunnelling action drop &amp;lt;&amp;lt;&amp;lt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will drop IM apps trying to tunnel to port 80 as explained earlier.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Mar 2006 02:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560012#M429322</guid>
      <dc:creator>Michael Tan</dc:creator>
      <dc:date>2006-03-24T02:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560013#M429323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks michtan. We do use webex and gotomypc on occasion when vendors need to access a PC. We also have VPN tunnels. Will the last command "port-misuse tunnelling action drop" effect either?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Mar 2006 15:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560013#M429323</guid>
      <dc:creator>PaulWelc</dc:creator>
      <dc:date>2006-03-24T15:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560014#M429324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you better not use the "port-misuse tunnelling action drop" command since it will drop gotomypc sessions. Not sure about webex though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to check out this bug CSCsb41742. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;" P2P/IM and tunneling traffic is only blocked with the 'strict-http action drop'.&lt;/P&gt;&lt;P&gt;If the option is set to 'strict-http action drop' both http and P2P/IM and tunneling traffic will be dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This allows all traffic&lt;/P&gt;&lt;P&gt;http-map Match_Restricted_Programs&lt;/P&gt;&lt;P&gt;strict-http action allow log&lt;/P&gt;&lt;P&gt;port-misuse im action drop log&lt;/P&gt;&lt;P&gt;port-misuse p2p action drop log&lt;/P&gt;&lt;P&gt;port-misuse tunneling action drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This drops all traffic (p2p/http/im/tunnelling)&lt;/P&gt;&lt;P&gt;http-map Match_Restricted_Programs&lt;/P&gt;&lt;P&gt;strict-http action drop log&lt;/P&gt;&lt;P&gt;port-misuse im action drop log&lt;/P&gt;&lt;P&gt;port-misuse p2p action drop log&lt;/P&gt;&lt;P&gt;port-misuse tunneling action drop log"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Mar 2006 18:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560014#M429324</guid>
      <dc:creator>Michael Tan</dc:creator>
      <dc:date>2006-03-24T18:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560015#M429325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried your example above but it didn't Block IM when just inspecting port 80. I had to put a range of ports from 500 - 3000 in order to block it. However this is only working for MS Messenger application, my users are still able to login to the web based version of IM to get around this... Is there any way of blocking the webbase version as well using http-map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Mar 2006 19:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560015#M429325</guid>
      <dc:creator>gregm</dc:creator>
      <dc:date>2006-03-24T19:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560016#M429326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Greg, &lt;/P&gt;&lt;P&gt;Unfortunately,there is no URL filtering in the PIX as it wasn't designed for that.The IMs blocking is a relatively new feature too.&lt;/P&gt;&lt;P&gt;I suggest you go in for some good URL filtering software to crack down on those HTTP-MSN users. I believe Websense is the best in the market and if I'm not mistaken , I believe Cisco has some tie up with those guys too. &lt;/P&gt;&lt;P&gt;So the answer to your question, No.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Mar 2006 05:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560016#M429326</guid>
      <dc:creator>victorrodrigues</dc:creator>
      <dc:date>2006-03-25T05:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA blocking IM using http?</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560017#M429327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have websense, but it wasn't blocking IM. I spoke to their tech support and they stated I need to add a 2nd NIC to the websense server, then I need to span a port on my 6509 to run all traffic to the Websense box because by default it is only looking at port 80 traffic. I was hoping there was a simple EASY way to do this, LOL. (I have an ASA box).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2006 15:39:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-im-using-http/m-p/560017#M429327</guid>
      <dc:creator>PaulWelc</dc:creator>
      <dc:date>2006-03-27T15:39:40Z</dc:date>
    </item>
  </channel>
</rss>

