<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Default HTTP inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514448#M588992</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I have to enable an Inspect-map, then there are packet drops. Like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http HTTP_Secure&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect http HTTP_Secure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, now I have packets drops in websites that I need to allow. How can I allow some websites that they don't pass the protocol-violation test?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Dec 2010 09:01:39 GMT</pubDate>
    <dc:creator>jmprats</dc:creator>
    <dc:date>2010-12-03T09:01:39Z</dc:date>
    <item>
      <title>ASA Default HTTP inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514445#M588989</link>
      <description>&lt;P&gt;I have enabled default http inspection in a ASA Firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inspect http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it doing anything? or does it need an inspection map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It inspects packets but doesn't drop anything&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh service-poli global inspect http"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global policy: &lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: http, packet 729530, drop 0, reset-drop 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tested with very large URL and strange caracters or telnet to port 80 ... But the drop count is 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help to see one drop?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:14:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514445#M588989</guid>
      <dc:creator>jmprats</dc:creator>
      <dc:date>2019-03-11T19:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Default HTTP inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514446#M588990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default HTTP inspection protects against specific attacks or threats against HTTP traffic.&lt;/P&gt;&lt;P&gt;If you would like to customize the inspection for additional control you would have to create a Layer 7 Policy Map for HTTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 14:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514446#M588990</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-25T14:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Default HTTP inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514447#M588991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, but how can I test it is working?&lt;/P&gt;&lt;P&gt;I can't see any drop yet, with sh service-policy inspect http&lt;/P&gt;&lt;P&gt;It seems to do nothing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 08:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514447#M588991</guid>
      <dc:creator>jmprats</dc:creator>
      <dc:date>2010-11-26T08:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Default HTTP inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514448#M588992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I have to enable an Inspect-map, then there are packet drops. Like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http HTTP_Secure&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect http HTTP_Secure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, now I have packets drops in websites that I need to allow. How can I allow some websites that they don't pass the protocol-violation test?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 09:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514448#M588992</guid>
      <dc:creator>jmprats</dc:creator>
      <dc:date>2010-12-03T09:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Default HTTP inspection</title>
      <link>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514449#M588993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use regex to block traffic for only some URLs (or not block some URLs).&lt;/P&gt;&lt;P&gt;Please take a look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1268"&gt;https://supportforums.cisco.com/docs/DOC-1268&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 13:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-default-http-inspection/m-p/1514449#M588993</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-03T13:09:48Z</dc:date>
    </item>
  </channel>
</rss>

