<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need to block HTTPS traffic in CSC module in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817696#M491011</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned in the post I am still facing the problem with filtering https traffice with SSM-CSC-10 module. And I find the this is a drawback of the the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I am facing a different kind of issue. When I am trying to access sites that has not been blocked in https filter, I am getting an SSl error mostly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attaching the screen shot along. Can anyone help me with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Mar 2012 06:58:24 GMT</pubDate>
    <dc:creator>alexageorge</dc:creator>
    <dc:date>2012-03-29T06:58:24Z</dc:date>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817682#M490997</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having an ASA5510 with a CSC-SSM-10 module. I am able to block http traffic through the ASA but cannot block https traffic through it. Can anyone please help me in blocking https traffic using the CSC module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817682#M490997</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2019-03-11T22:02:47Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817683#M490998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To block https traffic through CSC module, you need to run the version 6.6.1125.0 on the CSC module. This version is only compatible with ASA version 8.4.2 and ASDM 6.4.5, kindly go through the release notes for detailed information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/csc/csc66/release/notes/cscrn66.html"&gt;http://www.cisco.com/en/US/docs/security/csc/csc66/release/notes/cscrn66.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 09:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817683#M490998</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-16T09:53:19Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817684#M490999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here, this should also help you a great deal:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/csc/csc66/administration/guide/csc1.html"&gt;http://www.cisco.com/en/US/docs/security/csc/csc66/administration/guide/csc1.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 09:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817684#M490999</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-16T09:57:51Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817685#M491000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The version of the device is the same you have mentioned. I gave facebook.com and *.facebook.com, facebook is getting blocked when accessed as &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.facebook.com"&gt;http://www.facebook.com&lt;/A&gt;&lt;SPAN&gt; but is accessible by &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.facebook.com"&gt;https://www.facebook.com&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Dec 2011 04:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817685#M491000</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2011-12-17T04:41:57Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817686#M491001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you on the URL filtering include the HTTPS option?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure you have the same 3 versions that Varun mentioned (CSC version, ASA version, ASDM version)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is correct you should be able to block it, I mean you have the rigth configuration, are you sending the HTTPS traffic to the CSC module via the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Dec 2011 08:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817686#M491001</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-17T08:21:48Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817687#M491002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First you need to send all HTTPS traffic to the CSC module. If all traffic going towards CSC module and still you are facing problem with HTTPS filtering then let me know which browser you are using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because HTTPS traffic filtering will support only from Internet Explorer 9.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it is works with Firefox.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Janardhan &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Dec 2011 08:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817687#M491002</guid>
      <dc:creator>Janardhan Meesala</dc:creator>
      <dc:date>2011-12-19T08:54:09Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817688#M491003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The versions are correct. The sh version and sh module all outputs are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Sh Version:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.4(2)&lt;/P&gt;&lt;P&gt;Device Manager Version 6.4(5)204&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compiled on Wed 15-Jun-11 18:17 by builders&lt;/P&gt;&lt;P&gt;System image file is "disk0:/asa842-k8.bin"&lt;/P&gt;&lt;P&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Olive-ASA up 2 days 19 hours&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1599 MHz&lt;/P&gt;&lt;P&gt;Internal ATA Compact Flash, 256MB&lt;/P&gt;&lt;P&gt;BIOS Flash M50FW016 @ 0xfff00000, 2048KB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CN1000-MC-BOOT-2.00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNLite-MC-SSLm-PLUS-2.03&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNlite-MC-IPSECm-MAIN-2.06&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of accelerators: 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 0: Ext: Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is e8b7.483d.0110, irq 9&lt;/P&gt;&lt;P&gt; 1: Ext: Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is e8b7.483d.0111, irq 9&lt;/P&gt;&lt;P&gt; 2: Ext: Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is e8b7.483d.0112, irq 9&lt;/P&gt;&lt;P&gt; 3: Ext: Ethernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is e8b7.483d.0113, irq 9&lt;/P&gt;&lt;P&gt; 4: Ext: Management0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is e8b7.483d.010f, irq 11&lt;/P&gt;&lt;P&gt; 5: Int: Internal-Data0/0&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0000.0001.0002, irq 11&lt;/P&gt;&lt;P&gt; 6: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Maximum VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Active&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Security Contexts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;GTP/GPRS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 250&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 250&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 250&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;UC Phone Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Intercompany Media Engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This platform has an ASA 5510 Security Plus license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Serial Number: JMX1525L293&lt;/P&gt;&lt;P&gt;Running Permanent Activation Key: 0x0e06f44b 0xc08d056d 0x21f329e0 0xc02054d8 0x&lt;/P&gt;&lt;P&gt;8004e9a2&lt;/P&gt;&lt;P&gt;Configuration register is 0x1&lt;/P&gt;&lt;P&gt;Configuration has not been modified since last system restart.&lt;/P&gt;&lt;P&gt;Olive-ASA#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Sh Module All:&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod Card Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Model&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Serial No.&lt;/P&gt;&lt;P&gt;--- -------------------------------------------- ------------------ -----------&lt;/P&gt;&lt;P&gt;&amp;nbsp; 0 ASA 5510 Adaptive Security Appliance&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA5510&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; JMX1525L293&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 ASA 5500 Series Content Security Services Mo ASA-SSM-CSC-10-K9&amp;nbsp; JAF1521BKBJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod MAC Address Range&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hw Version&amp;nbsp;&amp;nbsp; Fw Version&amp;nbsp;&amp;nbsp; Sw Version&lt;/P&gt;&lt;P&gt;--- --------------------------------- ------------ ------------ ---------------&lt;/P&gt;&lt;P&gt;&amp;nbsp; 0 e8b7.483d.010f to e8b7.483d.0113&amp;nbsp; 2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.0(11)5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.4(2)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 1cdf.0f2c.77af to 1cdf.0f2c.77af&amp;nbsp; 1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.0(11)5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CSC SSM 6.6.1125&lt;/P&gt;&lt;P&gt;.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod SSM Application Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSM Application Version&lt;/P&gt;&lt;P&gt;--- ------------------------------ ---------------- --------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 CSC SSM&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6.6.1125.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mod Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Data Plane Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Compatibility&lt;/P&gt;&lt;P&gt;--- ------------------ --------------------- -------------&lt;/P&gt;&lt;P&gt;&amp;nbsp; 0 Up Sys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Not Applicable&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 04:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817688#M491003</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2011-12-22T04:36:53Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817689#M491004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Janardhan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the traffic is passing thru the CSC module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list csc extended deny ip host 192.168.2.2 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I'm using firefox.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 04:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817689#M491004</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2011-12-22T04:40:44Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817690#M491005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct the versions are okay, what about the other questions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;Did you include the HTTPS option on the URL filtering&amp;nbsp; ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;If that is correct you should be able to block it, I mean you have the rigth configuration, are you sending the HTTPS traffic to the CSC module via the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 04:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817690#M491005</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-22T04:41:50Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817691#M491006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have checked the column &lt;STRONG&gt;"Include HTTPS traffic&lt;/STRONG&gt;" in the URL blocking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also have done the follwing configuration in the ASA for passing all the traffic thru the CSC module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list csc extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list csc extended deny ip host 192.168.2.2 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 05:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817691#M491006</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2011-12-22T05:00:34Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817692#M491007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to block the https traffic by giving *.xxxx.com (eg, *.facebook.com) in the https block option. But I am facing another problem. I am able block the https traffic in firefox and chrome but is able to access the site in IE. I checked in IE6 and IE8 where the sites were able to be opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 08:41:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817692#M491007</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2012-01-27T08:41:44Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817693#M491008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to block the https traffic by giving&amp;nbsp; *.xxxx.com (eg, *.facebook.com) in the https block option. But I am&amp;nbsp; facing another problem. I am able block the https traffic in firefox and&amp;nbsp; chrome but is able to access the site in IE. I checked in IE6 and IE8&amp;nbsp; where the sites were able to be opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 08:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817693#M491008</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2012-01-27T08:42:46Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817694#M491009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Janardhan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to block the https traffic by giving&amp;nbsp; *.xxxx.com (eg, *.facebook.com) in the https block option. But I am&amp;nbsp; facing another problem. I am able block the https traffic in firefox and&amp;nbsp; chrome but is able to access the site in IE. I checked in IE6 and IE8&amp;nbsp; where the sites were able to be opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 08:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817694#M491009</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2012-01-27T08:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817695#M491010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is one of the limitation of ASA firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Https filtering it will not work with pre versions of IE-9. It will works&lt;/P&gt;&lt;P&gt;from IE-9 on-wards.( IE-9 does not support with Win-XP but support on wards&lt;/P&gt;&lt;P&gt;Vista)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer the CSC release guide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Janardhan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Fri, Jan 27, 2012 at 2:13 PM, alexageorge &amp;lt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 15:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817695#M491010</guid>
      <dc:creator>Janardhan Meesala</dc:creator>
      <dc:date>2012-01-27T15:48:23Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817696#M491011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned in the post I am still facing the problem with filtering https traffice with SSM-CSC-10 module. And I find the this is a drawback of the the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I am facing a different kind of issue. When I am trying to access sites that has not been blocked in https filter, I am getting an SSl error mostly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attaching the screen shot along. Can anyone help me with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 06:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817696#M491011</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2012-03-29T06:58:24Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817697#M491012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Janardhan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned in the post I am still facing the problem&amp;nbsp; with filtering https traffice with SSM-CSC-10 module. And I find the&amp;nbsp; this is a drawback of the the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I am facing a&amp;nbsp; different kind of issue. When I am trying to access sites that has not&amp;nbsp; been blocked in https filter, I am getting an SSl error mostly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attaching the screen shot along. Can anyone help me with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 07:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817697#M491012</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2012-03-29T07:00:13Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817698#M491013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/3/1/6/82613-SSL%20error.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned in the post I am still facing the problem&amp;nbsp; with filtering https traffice with SSM-CSC-10 module. And I find the&amp;nbsp; this is a drawback of the the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I am facing a&amp;nbsp; different kind of issue. When I am trying to access sites that has not&amp;nbsp; been blocked in https filter, I am getting an SSl error mostly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attaching the screen shot along. Can anyone help me with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 07:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817698#M491013</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2012-03-29T07:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817699#M491014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Alex George,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the URL filtering, uncheck the unrated sites in the Generel tab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also check the configuration in the webreputation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Janardhan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 14:27:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817699#M491014</guid>
      <dc:creator>Janardhan Meesala</dc:creator>
      <dc:date>2012-06-30T14:27:17Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817700#M491015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a customer that would like to confirm based on this post whether this is true...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"This is one of the limitation of ASA firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Https filtering it will not work with pre versions of IE-9. It will works&lt;/P&gt;&lt;P&gt;from IE-9 on-wards.( IE-9 does not support with Win-XP but support on wards&lt;/P&gt;&lt;P&gt;Vista)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer the CSC release guide.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please show me where it says that? I need to confirm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 20:31:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817700#M491015</guid>
      <dc:creator>szumbado</dc:creator>
      <dc:date>2012-09-18T20:31:15Z</dc:date>
    </item>
    <item>
      <title>Need to block HTTPS traffic in CSC module</title>
      <link>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817701#M491016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Stephan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the attachement (page 10 under important notes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/csc/csc66/administration/guide/csc4.html#wp1098890"&gt;http://www.cisco.com/en/US/docs/security/csc/csc66/administration/guide/csc4.html#wp1098890&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alex George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 05:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-block-https-traffic-in-csc-module/m-p/1817701#M491016</guid>
      <dc:creator>alexageorge</dc:creator>
      <dc:date>2012-09-19T05:57:38Z</dc:date>
    </item>
  </channel>
</rss>

