<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Http inspection dropping all http traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/http-inspection-dropping-all-http-traffic/m-p/1901967#M437303</link>
    <description>&lt;P&gt;I am testing out some inspection options on an ASA 5505, and I am running into a situation in which applying a http inspection is dropping all outbound http traffic. I get a "protocol violation" error in the logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the setup: I'm not sure why the web traffic is getting dropped. Maybe I am missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; message-length maximum client auto&lt;/P&gt;&lt;P&gt; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map type inspect http http-inspect-map&lt;/P&gt;&lt;P&gt; description Advanced http inspection&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; protocol-violation action drop-connection log&lt;/P&gt;&lt;P&gt; match req-resp content-type mismatch&lt;/P&gt;&lt;P&gt; drop-connection log&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt; inspect ftp &lt;/P&gt;&lt;P&gt; inspect rsh &lt;/P&gt;&lt;P&gt; inspect rtsp &lt;/P&gt;&lt;P&gt; inspect esmtp &lt;/P&gt;&lt;P&gt; inspect sqlnet &lt;/P&gt;&lt;P&gt; inspect sunrpc &lt;/P&gt;&lt;P&gt; inspect xdmcp &lt;/P&gt;&lt;P&gt; inspect sip &lt;/P&gt;&lt;P&gt; inspect netbios &lt;/P&gt;&lt;P&gt; inspect tftp &lt;/P&gt;&lt;P&gt; inspect ip-options &lt;/P&gt;&lt;P&gt; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt; inspect http http-inspect-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:05:12 GMT</pubDate>
    <dc:creator>Colin Higgins</dc:creator>
    <dc:date>2019-03-11T23:05:12Z</dc:date>
    <item>
      <title>Http inspection dropping all http traffic</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection-dropping-all-http-traffic/m-p/1901967#M437303</link>
      <description>&lt;P&gt;I am testing out some inspection options on an ASA 5505, and I am running into a situation in which applying a http inspection is dropping all outbound http traffic. I get a "protocol violation" error in the logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the setup: I'm not sure why the web traffic is getting dropped. Maybe I am missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; message-length maximum client auto&lt;/P&gt;&lt;P&gt; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map type inspect http http-inspect-map&lt;/P&gt;&lt;P&gt; description Advanced http inspection&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; protocol-violation action drop-connection log&lt;/P&gt;&lt;P&gt; match req-resp content-type mismatch&lt;/P&gt;&lt;P&gt; drop-connection log&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt; inspect ftp &lt;/P&gt;&lt;P&gt; inspect rsh &lt;/P&gt;&lt;P&gt; inspect rtsp &lt;/P&gt;&lt;P&gt; inspect esmtp &lt;/P&gt;&lt;P&gt; inspect sqlnet &lt;/P&gt;&lt;P&gt; inspect sunrpc &lt;/P&gt;&lt;P&gt; inspect xdmcp &lt;/P&gt;&lt;P&gt; inspect sip &lt;/P&gt;&lt;P&gt; inspect netbios &lt;/P&gt;&lt;P&gt; inspect tftp &lt;/P&gt;&lt;P&gt; inspect ip-options &lt;/P&gt;&lt;P&gt; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt; inspect http http-inspect-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:05:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection-dropping-all-http-traffic/m-p/1901967#M437303</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2019-03-11T23:05:12Z</dc:date>
    </item>
    <item>
      <title>Http inspection dropping all http traffic</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection-dropping-all-http-traffic/m-p/1901968#M437304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Coling,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing is that the ASA is going to do&amp;nbsp; a deep packet inspection for the HTTP traffic, if you do want to know&lt;/P&gt;&lt;P&gt;why the ASA is dropping the packets you will need to take captures on the ASA for that particular traffic and then check the RFC and analize the reason of why the packets are getting dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration is fine, that is why you are getting the drops....The ASA is taking into consideration the layer 7 policy map for the HTTP protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would not use the inspect HTTP into the ASA as this additional inspection might add some latency problems to the end-users and if I add another security layer as the layer 7 inspection then you will need to make sure the HTTP packets are perfect as with just one violation on the packet this one will get dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 17:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection-dropping-all-http-traffic/m-p/1901968#M437304</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-10T17:35:10Z</dc:date>
    </item>
    <item>
      <title>Http inspection dropping all http traffic</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection-dropping-all-http-traffic/m-p/1901969#M437305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Julio:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;The funny thing is, when this policy is applied, ALL http traffic is dropped, with a "protocol violation" error. Just opening a page to Google fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;I wonder if it has something to do with the content-type-mismatch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 21:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection-dropping-all-http-traffic/m-p/1901969#M437305</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2012-05-10T21:32:45Z</dc:date>
    </item>
  </channel>
</rss>

