<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5520/m-p/1590580#M593712</link>
    <description>&lt;P&gt;how can we block proxy address x.x.x.x..in ASA5520. Means some smart users entered in their browser proxy (same proxy ISP provided) with port 8080.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then their traffic bypass our Firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What was the solution with ASA5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for quick response.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:37:50 GMT</pubDate>
    <dc:creator>mkashifashraf</dc:creator>
    <dc:date>2019-03-11T19:37:50Z</dc:date>
    <item>
      <title>ASA5520</title>
      <link>https://community.cisco.com/t5/network-security/asa5520/m-p/1590580#M593712</link>
      <description>&lt;P&gt;how can we block proxy address x.x.x.x..in ASA5520. Means some smart users entered in their browser proxy (same proxy ISP provided) with port 8080.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then their traffic bypass our Firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What was the solution with ASA5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for quick response.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520/m-p/1590580#M593712</guid>
      <dc:creator>mkashifashraf</dc:creator>
      <dc:date>2019-03-11T19:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520</title>
      <link>https://community.cisco.com/t5/network-security/asa5520/m-p/1590581#M593713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be clear, you want to block any source from accessing a spec&lt;SPAN style="background-color: #f8fafd;"&gt;ific destination and port?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;That port being TCP 8080?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;If so, then a simple ACL on your incoming interface will be sufficient, e.g.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;EM&gt;access-list proxy-blocker deny tcp &lt;SOURCE ips=""&gt; host &lt;DESTINATION ip=""&gt; eq 8080&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jan 2011 13:53:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520/m-p/1590581#M593713</guid>
      <dc:creator>handsy</dc:creator>
      <dc:date>2011-01-20T13:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520</title>
      <link>https://community.cisco.com/t5/network-security/asa5520/m-p/1590582#M593714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ashraf,&lt;/P&gt;&lt;P&gt;Do you have an ACL applied on the inside interface? You probably don't that is the reason all these connections destined to port 8080 are allowed. You may want to restric what traffic leaves the firewall so, you can block this proxy IP and port 8080 in that ACL. May sure to allow what you need to allow or the implicit deny any any will block everything.&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;access-list inside-acl deny tcp any host p.p.p.p eq 8080 (where p.p.p.p is the proxy ip that people are using in the browser to bypass)&lt;/P&gt;&lt;P&gt;access-list inside--acl per tcp any any eq 80&lt;/P&gt;&lt;P&gt;access-list inside-acl per udp any any eq 53&lt;/P&gt;&lt;P&gt;..&lt;/P&gt;&lt;P&gt;allow what ever else you need to allow and apply the acl on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aceess-g inside-acl in int inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jan 2011 05:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520/m-p/1590582#M593714</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-21T05:07:54Z</dc:date>
    </item>
  </channel>
</rss>

