<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624859#M590714</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, there is no software update on CSC module that will allow that because to be able to unencrypt the HTTPS traffic and inspect it, you will be required to perform man-in-the-middle as the packet is encrypted, and CSC-module is not capable of doing that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Feb 2011 06:29:39 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-02-25T06:29:39Z</dc:date>
    <item>
      <title>HTTPS inspection</title>
      <link>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624858#M590708</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to block some social networking sites using ASA 5510-CSC-SSM, As I searched and come to know that ASA 5510 can't inspect and intercept for https traffic because it is encrypted while traversing throught the ASA. I want the ASA to make functioning for https too, not only http. Can i perform this task by updating any software on existing device?? Any response will be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;&lt;P&gt;Hari,&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624858#M590708</guid>
      <dc:creator>harisapkota123</dc:creator>
      <dc:date>2019-03-26T00:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624859#M590714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, there is no software update on CSC module that will allow that because to be able to unencrypt the HTTPS traffic and inspect it, you will be required to perform man-in-the-middle as the packet is encrypted, and CSC-module is not capable of doing that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 06:29:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624859#M590714</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-25T06:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624860#M590720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am afraid the only one thing you can do, is http inspection with uri orl url regex and then appropriate action.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Nice document to this : &lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1268"&gt;https://supportforums.cisco.com/docs/DOC-1268&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 13:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624860#M590720</guid>
      <dc:creator>Pavel Pokorny</dc:creator>
      <dc:date>2011-02-25T13:55:22Z</dc:date>
    </item>
    <item>
      <title>Hellohttp inspection working;</title>
      <link>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624861#M590731</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;http inspection working; but https gets me to the page i am trying to hide..&lt;/P&gt;&lt;P&gt;i can block&lt;/P&gt;&lt;P&gt;http://xxx.whatever.com/somewhere_i_want_to_hide/page.html&lt;/P&gt;&lt;P&gt;using the documents referenced above&lt;/P&gt;&lt;P&gt;owever; if i prepend the url with https:// this bypasses the http inspection on the ASA (V9)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now i understand "deep packet" inspection is not possible due to encryption under SSL but why&amp;nbsp;cant the ASA&amp;nbsp;block the access to the page seeing as the top level url is not actually anything but clear text?&lt;/P&gt;&lt;P&gt;this is my code snippet that works ok to block the http with "webservices" in it&lt;/P&gt;&lt;P&gt;i need to do the same for https:// {blah-webservices-blah}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regex blockex1 ".*webservices.*\.svc"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map type inspect http match-any block-url-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;match request uri regex blockex1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect http block-url-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp;class block-url-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;description inspect and block specific http URI requests&lt;/P&gt;&lt;P&gt;&amp;nbsp;class inspection_default&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http block-url-policy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;dave&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 14:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624861#M590731</guid>
      <dc:creator>DAVID THORNTON</dc:creator>
      <dc:date>2014-08-20T14:36:12Z</dc:date>
    </item>
    <item>
      <title>Hi,I'm afraid, when used</title>
      <link>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624862#M590737</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm afraid, when used protocol is https (and not http), so http inspection won't work.&lt;/P&gt;&lt;P&gt;You can try this:&lt;/P&gt;&lt;P&gt;http://www.tunnelsup.com/using-just-a-cisco-asa-to-block-specific-websites&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 18:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-inspection/m-p/1624862#M590737</guid>
      <dc:creator>Pavel Pokorny</dc:creator>
      <dc:date>2014-08-20T18:42:09Z</dc:date>
    </item>
  </channel>
</rss>

