<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall messages in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-messages/m-p/2008242#M439869</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bump!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Jul 2012 16:05:15 GMT</pubDate>
    <dc:creator>Chris Gabel</dc:creator>
    <dc:date>2012-07-09T16:05:15Z</dc:date>
    <item>
      <title>Firewall messages</title>
      <link>https://community.cisco.com/t5/network-security/firewall-messages/m-p/2008241#M439868</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm really new to firewalls, I have configured one using CCP and the basic firewall wizard with medium security. I just have my laptop plugged into the LAN port and I noticed a couple weird logs that I want to ask about when surfing the web, and retrieving outlook emails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting 4 main messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;004528: Jul&amp;nbsp; 6 11:26:46.528 MDT: %APPFW-4-HTTP_DEOBFUSCATION: Deobfuscation signature (15) detected - session 192.168.0.2:64657 74.125.225.121:80 on zone-pair ccp-zp-in-out class ccp-protocol-http appl-class ccp-http-blockparam&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 004620: Jul&amp;nbsp; 6 11:30:21.596 MDT: %APPFW-4-HTTP_DEOBFUSCATION: Deobfuscation signature (16) detected - session 192.168.0.2:64640 74.125.225.121:80 on zone-pair ccp-zp-in-out class ccp-protocol-http appl-class ccp-http-blockparam&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;004603: Jul&amp;nbsp; 6 11:27:08.164 MDT: %APPFW-4-HTTP_PROTOCOL_VIOLATION: HTTP protocol violation (0) detected - session 208.38.45.167:80 192.168.0.2:64852 on zone-pair ccp-zp-in-out class ccp-protocol-http appl-class ccp-http-blockparam&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; When using Send/Receive in Outlook i get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;004630: Jul&amp;nbsp; 6 11:33:39.980 MDT: %FW-5-POP3_INVALID_COMMAND: (target:class)-(ccp-zp-in-out:ccp-protocol-pop3):Invalid POP3 command from initiator (192.168.0.2:64993): Invalid verb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything seems to work fine, I can send and receive emails, I can surf websites and google with no issues. Is this just logging or should I be worried about any of these messages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;More Info&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;#show policy-map type inspect http&lt;/P&gt;&lt;P&gt;&amp;nbsp; Policy Map type inspect http ccp-action-app-http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class ccp-http-blockparam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class ccp-app-httpmethods&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Reset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class ccp-http-allowparam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#show class-map type inspect http&lt;/P&gt;&lt;P&gt; Class Map type inspect http match-any ccp-app-httpmethods (id &lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method bcopy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method bdelete&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method bmove&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method bpropfind&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method bproppatch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method connect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method copy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method delete&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method edit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method getattribute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method getattributenames&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method getproperties&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method index&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method lock&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method mkcol&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method mkdir&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method move&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method notify&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method options&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method poll&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method propfind&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method proppatch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method put&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method revadd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method revlabel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method revlog&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method revnum&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method save&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method search&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method setattribute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method startrev&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method stoprev&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method subscribe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method trace&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method unedit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method unlock&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request method unsubscribe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Class Map type inspect http match-any ccp-http-blockparam (id 15)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request port-misuse im&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request port-misuse p2p&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; req-resp protocol-violation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Class Map type inspect http match-any ccp-http-allowparam (id 4)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match&amp;nbsp; request port-misuse tunneling&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-messages/m-p/2008241#M439868</guid>
      <dc:creator>Chris Gabel</dc:creator>
      <dc:date>2019-03-11T23:27:28Z</dc:date>
    </item>
    <item>
      <title>Firewall messages</title>
      <link>https://community.cisco.com/t5/network-security/firewall-messages/m-p/2008242#M439869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bump!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2012 16:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-messages/m-p/2008242#M439869</guid>
      <dc:creator>Chris Gabel</dc:creator>
      <dc:date>2012-07-09T16:05:15Z</dc:date>
    </item>
    <item>
      <title>Firewall messages</title>
      <link>https://community.cisco.com/t5/network-security/firewall-messages/m-p/2008243#M439870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WAMP!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Chris, Mike here. I see the problem there. We have a section ask the expert where Julio Carvajal is answering Firewalling questions in IOS devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Going back to the question, I see where the problem is. Many Websites on the internet are not HTTP compliant, what you are doing with the configuration you did with CCP is creating this AGGRESSIVE inspection in layer 7 inspection for web traffic, meaning, the traffic on HTTP may slow down or have Random connectivity issues. This is mainly because of the service policy configured inside of the HTTP inspection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I can see is not only HTTP but it is extending to other protocols as well, my best advice for you is, if you are sure where attack may come from, apply a deep packet inspection to it. I dont particularly like wizzards so if you wanna get deep to a protocol it would be better if you know what you want to match. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Leave the protocols without layer 7 inspection, they will still look at the form of the packet and make sure it is RFC compliant, custom commands (POP and SMTP) custom Methods (HTTP) may get dropped as you can see. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps!!! &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 06:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-messages/m-p/2008243#M439870</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-07-10T06:21:39Z</dc:date>
    </item>
  </channel>
</rss>

