<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering Java &amp; ActiveX on PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/filtering-java-activex-on-pix/m-p/400263#M560100</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for the information.  After configuring the PIX for Java &amp;amp; ActiveX filtering as mentioned by you, Is there any way to verify that these are filtered out or not from the HTML web pages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanking you once again.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards // Anoop&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Oct 2004 10:04:10 GMT</pubDate>
    <dc:creator>anup_bekal</dc:creator>
    <dc:date>2004-10-01T10:04:10Z</dc:date>
    <item>
      <title>Filtering Java &amp; ActiveX on PIX</title>
      <link>https://community.cisco.com/t5/network-security/filtering-java-activex-on-pix/m-p/400261#M560098</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What exactly the following commands on PIX do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. filter java port local_ip mask foreign_ip mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. filter activex port local_ip mask foreign_ip mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the benefits of blocking Java &amp;amp; ActiveX on the WebPages?  Do they help in reducing the threat of malicious codes hidden in the ActiveX and Java applets?  After configuring this on PIX how do I verify that the filtering is in effect?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards // Anoop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-java-activex-on-pix/m-p/400261#M560098</guid>
      <dc:creator>anup_bekal</dc:creator>
      <dc:date>2020-02-21T07:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Java &amp; ActiveX on PIX</title>
      <link>https://community.cisco.com/t5/network-security/filtering-java-activex-on-pix/m-p/400262#M560099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;filter java&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The filter java command filters out Java applets that return to the PIX Firewall from an outbound connection. The user still receives the HTML page, but the web page source for the applet is commented out so that the applet cannot execute. Use 0 for the local_ip or foreign_ip IP addresses to mean all hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note If Java applets are known to be in &lt;OBJECT&gt; tags, use the filter activex command to remove them.&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To specify that all outbound connections have Java applet blocking, use the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;filter java 80 0 0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command specifies that the Java applet blocking applies to Web traffic on port 80 from any local host and for connections to any foreign host. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following example specifies that Java applet blocking applies to web traffic on port 80 from local subnet &lt;/P&gt;&lt;P&gt;10.10.10.0 and for connections to any foreign host:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;filter java http 10.10.10.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=============================================================================&lt;/P&gt;&lt;P&gt;filter activex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The filter activex command filters out ActiveX, Java applets, and other HTML &lt;OBJECT&gt; usages from outbound packets. ActiveX controls, formerly known as OLE or OCX controls, are components you can insert in a web page or other application. These controls include custom forms, calendars, or any of the extensive third-party forms for gathering or displaying information.&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a technology, it creates many potential problems for the network clients including causing workstations to fail, introducing network security problems, or be used to attack servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This feature blocks the HTML &lt;OBJECT&gt; tag and comments it out within the HTML web page.&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note The &lt;OBJECT&gt; tag is also used for Java applets, image files, and multimedia objects, which will also be blocked by the filter activex command. If the &lt;OBJECT&gt; or &lt;/OBJECT&gt; HTML tags split across network packets or if the code in the tags is longer than the number of bytes in the MTU, the PIX Firewall cannot block the tag.&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ActiveX blocking does not occur when users access an IP address referenced by the alias command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To specify that all outbound connections have ActiveX blocking, use the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;filter activex 80 0 0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command specifies that the ActiveX blocking applies to Web traffic on port 80 from any local host and for connections to any foreign host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show filter ?&lt;/P&gt;&lt;P&gt;Enable, disable, or view URL, FTP, HTTPS, Java, and ActiveX filters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See command reference for version 6.3:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1131454" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1131454&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Sep 2004 15:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-java-activex-on-pix/m-p/400262#M560099</guid>
      <dc:creator>piseli</dc:creator>
      <dc:date>2004-09-29T15:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Java &amp; ActiveX on PIX</title>
      <link>https://community.cisco.com/t5/network-security/filtering-java-activex-on-pix/m-p/400263#M560100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for the information.  After configuring the PIX for Java &amp;amp; ActiveX filtering as mentioned by you, Is there any way to verify that these are filtered out or not from the HTML web pages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanking you once again.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards // Anoop&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Oct 2004 10:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-java-activex-on-pix/m-p/400263#M560100</guid>
      <dc:creator>anup_bekal</dc:creator>
      <dc:date>2004-10-01T10:04:10Z</dc:date>
    </item>
  </channel>
</rss>

