<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The reverse proxy doesn't in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593431#M45302</link>
    <description>&lt;P&gt;The reverse proxy doesn't have anything to do with the ASA:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In a DMZ you have a host acting as a reverse proxy. I prefer a Linux-box with nginx for that. This host gets the HTTPS-requests from the internet and forwards them as HTTP to the real server (inside or in another DMZ)&lt;/LI&gt;&lt;LI&gt;On the outside interface you allow HTTPS to the reverse proxy and also add a coresponding NAT for that system&lt;/LI&gt;&lt;LI&gt;On the interface where the reverse-proxy is, you allow HTTP to the real web-server. In addition to that you make sure that your MPF sends this traffic to the IPS-module.&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Mon, 24 Nov 2014 06:55:05 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2014-11-24T06:55:05Z</dc:date>
    <item>
      <title>ASA-NG IPS Inspect Encrypted Traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593428#M45297</link>
      <description>&lt;P&gt;&lt;SPAN style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;Hi&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;We Are Buy ASA 5525-X with IPS for We Network . We have a number of servers that provide Web services Applications .&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;We have a big problem at setup ASA This is &amp;nbsp;We can not use Inspect ASA and IPS features Because above 80% Traffic Through Encrypted .&amp;nbsp;&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;Thank you tell me how can I solve this problem.&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;I know that a solution use HTTPS Proxy in ASA but&amp;nbsp;For some reason, this solution can not be implemented.&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;Thanks.&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593428#M45297</guid>
      <dc:creator>bahmanjafari</dc:creator>
      <dc:date>2019-03-10T13:17:07Z</dc:date>
    </item>
    <item>
      <title>If you want to protect you</title>
      <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593429#M45298</link>
      <description>&lt;P&gt;If you want to protect you own Webservers from attacks from the internet. you can't use the HTTPS-Decryption of the ASA-CX as the internet-clients don't have your CX-certificate.&lt;/P&gt;&lt;P&gt;The typical way to solve this is to place a reverse-proxy into a DMZ and do the SSL/TLS-handling there. The reverse-proxy sends plain HTTP through the ASA and the IPS can inspect that and protect your servers.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Nov 2014 16:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593429#M45298</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-23T16:58:43Z</dc:date>
    </item>
    <item>
      <title>Thanks for your answerI Can</title>
      <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593430#M45301</link>
      <description>&lt;P&gt;Thanks for your answer&lt;/P&gt;&lt;P&gt;I Can implement&amp;nbsp;reverse proxy with ASA5525-X ?&lt;/P&gt;&lt;P&gt;If the answer is negative&lt;/P&gt;&lt;P&gt;Please help me in selecting the&amp;nbsp;best practice for&amp;nbsp;implement&amp;nbsp;reverse proxy.&lt;/P&gt;&lt;P&gt;Do not use Cisco Agent Security for this Solutions&amp;nbsp;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2014 05:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593430#M45301</guid>
      <dc:creator>bahmanjafari</dc:creator>
      <dc:date>2014-11-24T05:07:59Z</dc:date>
    </item>
    <item>
      <title>The reverse proxy doesn't</title>
      <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593431#M45302</link>
      <description>&lt;P&gt;The reverse proxy doesn't have anything to do with the ASA:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In a DMZ you have a host acting as a reverse proxy. I prefer a Linux-box with nginx for that. This host gets the HTTPS-requests from the internet and forwards them as HTTP to the real server (inside or in another DMZ)&lt;/LI&gt;&lt;LI&gt;On the outside interface you allow HTTPS to the reverse proxy and also add a coresponding NAT for that system&lt;/LI&gt;&lt;LI&gt;On the interface where the reverse-proxy is, you allow HTTP to the real web-server. In addition to that you make sure that your MPF sends this traffic to the IPS-module.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 24 Nov 2014 06:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593431#M45302</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-24T06:55:05Z</dc:date>
    </item>
    <item>
      <title>HiThanks for your Complete</title>
      <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593432#M45303</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Thanks for your Complete&amp;nbsp;answer.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Excuse me, I have a question. Is it possible to use ASA to Act https&amp;nbsp;proxy servers&amp;nbsp;Similar CSC&amp;nbsp;to the previous generation ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 09:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593432#M45303</guid>
      <dc:creator>bahmanjafari</dc:creator>
      <dc:date>2014-11-26T09:56:26Z</dc:date>
    </item>
    <item>
      <title>No, the ASA can't do that.</title>
      <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593433#M45304</link>
      <description>&lt;P&gt;No, the ASA can't do that. You need an external device for that.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 10:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593433#M45304</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-26T10:47:08Z</dc:date>
    </item>
    <item>
      <title>Thank you  Which Device Can</title>
      <link>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593434#M45307</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which Device Can use For This Solutions ?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2014 07:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ng-ips-inspect-encrypted-traffic/m-p/2593434#M45307</guid>
      <dc:creator>bahmanjafari</dc:creator>
      <dc:date>2014-12-03T07:04:31Z</dc:date>
    </item>
  </channel>
</rss>

