<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA filters URLs in HTTPS? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811107#M492561</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inspection can only be on for non -default applictions Frist it should understand the protocol then only it can open the packet and see the content.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Nov 2011 07:19:04 GMT</pubDate>
    <dc:creator>ajay chauhan</dc:creator>
    <dc:date>2011-11-25T07:19:04Z</dc:date>
    <item>
      <title>ASA filters URLs in HTTPS?</title>
      <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811101#M492554</link>
      <description>&lt;P&gt;Hi experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My company uses a pair of 5510 ASAs as the gateway to Internet. I once configured policy-map to filter certain webpages (facebook, twitter, ...etc) and they work fine. However nowdays those websites all support HTTPS. In the https the URL seems encrypted so can't do regex match... Is there anyway that I can still block those webpages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another two ways I can think of are&lt;/P&gt;&lt;P&gt;1. Block IPs (don't really want do this unless absolutely necessary)&lt;/P&gt;&lt;P&gt;2. Block DNS for the URL (however they can work around by setting static DNS entries)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Difan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:54:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811101#M492554</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2019-03-11T21:54:42Z</dc:date>
    </item>
    <item>
      <title>ASA filters URLs in HTTPS?</title>
      <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811102#M492556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are absolutely correct .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Blocking IP really wont help much since its not fixed for these kind of sites.&lt;/P&gt;&lt;P&gt;2. DNS Entries wise you can do if you want to block few.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically websense is used with ASA to these kind of filtering thats 3rd party request get redirected to server and based on policy traffic is allowed/deny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Nov 2011 07:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811102#M492556</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-24T07:06:34Z</dc:date>
    </item>
    <item>
      <title>ASA filters URLs in HTTPS?</title>
      <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811103#M492557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Difan Zhao,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding to what Ajay just said, you can also implement the Content Security and Control (CSC) module into the ASA, this module running version 6 is able to block the https sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is one link you can take a look:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/csc/csc66/administration/guide/csc4.html#wp1098125"&gt;http://www.cisco.com/en/US/docs/security/csc/csc66/administration/guide/csc4.html#wp1098125&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is another option just in case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Nov 2011 07:15:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811103#M492557</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-24T07:15:24Z</dc:date>
    </item>
    <item>
      <title>ASA filters URLs in HTTPS?</title>
      <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811104#M492558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys thanks so much for your replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ajay, with websense, does it filter based on the IPs? Just being curious how it works... Technically even with websense it can't look into the HTTPS packets, correct? So I guess the websense just keeps updated IPs for certain websites and filter by IPs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio, I read your link very carefully and I see how CSC filters URLs based on the TLS extension SNI in the client request. I did wireshark capture and I see "www.facebook.com" in the extension. I'm wondering: since this is in clear text, maybe ASA without CSC can still check the specific field in the TLS packet and drop the TLS packet which in turn destroy the web traffic. I will give it a try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Difan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Nov 2011 19:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811104#M492558</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2011-11-24T19:34:48Z</dc:date>
    </item>
    <item>
      <title>ASA filters URLs in HTTPS?</title>
      <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811105#M492559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically, mirrored traffic is directed to Websense's monitoring card.&amp;nbsp; Network Agent sniffs that traffic, and then sends spoofed packets to block the traffic, while at the same time redirecting the user to a block page hosted on the Websense server.&lt;/P&gt;&lt;P&gt;you can specify an IP Address Range, a specific host name (www.yourhost.com), it can use regular expressions ([Yy][Oo][Uu][Rr][Hh][Oo][Ss][Tt]\.[Cc][… which will match Yourhost.com, yourHost.com, YoUrHoSt.CoM, or any case of yourhost.com, etc. Finally, it can do a keyword match so that if you request a web site that contains ReallBadSwearWord in any of it's content, headers, etc, the page will be blocked. There's probably more that I didn't mention, but Websense does things in a very intelligent manner and gives users control over what they can block. Furthermore, they have already pre-classified sites into different categories (sex, proxy-avoidance, illegal, gambling, etc) and it lets you recategorize these sites to different categories. So, you can make &lt;A href="https://community.cisco.com/www.playboy.com" target="_blank"&gt;www.playboy.com&lt;/A&gt; appear as a gaming site versus a sex site.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Nov 2011 19:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811105#M492559</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-24T19:45:12Z</dc:date>
    </item>
    <item>
      <title>ASA filters URLs in HTTPS?</title>
      <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811106#M492560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Ajay. Last question. Can ASA do packet inspection on protocols it doesn't support? For example, you want to drop a packet which contains ASCII value of "facebook". In this case it doesn't matter if ASA understands the protocol or not. It drops the packet as long as the packet contains the specified string. Possible??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 01:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811106#M492560</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2011-11-25T01:54:20Z</dc:date>
    </item>
    <item>
      <title>ASA filters URLs in HTTPS?</title>
      <link>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811107#M492561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inspection can only be on for non -default applictions Frist it should understand the protocol then only it can open the packet and see the content.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 07:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-filters-urls-in-https/m-p/1811107#M492561</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-25T07:19:04Z</dc:date>
    </item>
  </channel>
</rss>

