<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detecting Proxy HTTP traffic on ASA 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/detecting-proxy-http-traffic-on-asa-5520/m-p/1600441#M604516</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are trying to block HTTP traffic on all ports except TCP/80 correct? If so, you can use something like this:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;access-list nonhttp-acl extended deny tcp any any eq www&lt;BR /&gt;access-list nonhttp-acl extended permit tcp any any&lt;BR /&gt;!&lt;BR /&gt;regex allhosts "[0-9a-z]*"&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect http match-all block-all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match request header host regex allhosts&lt;BR /&gt;class-map nonhttp-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match access-list nonhttp-acl&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http block-http-proxy&lt;BR /&gt; parameters&lt;BR /&gt; class block-all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map noproxy-policy&lt;BR /&gt; class nonhttp-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect http block-http-proxy&lt;BR /&gt;!&lt;BR /&gt;service-policy noproxy-policy interface lab&lt;/PRE&gt;&lt;P&gt;This will put all non-port 80 traffic through the HTTP inspection engine. If the inspection finds an HTTP header going to any host, it will drop the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested this briefly in the lab and it does what you're looking for, but you may want to test it first in your environment as you'll be pushing a lot of traffic through the HTTP inspection which will certainly add some overhead to the ASA's packet processing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Feb 2011 20:46:52 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-02-22T20:46:52Z</dc:date>
    <item>
      <title>Detecting Proxy HTTP traffic on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/detecting-proxy-http-traffic-on-asa-5520/m-p/1600440#M604515</link>
      <description>&lt;P&gt;I'm not sure if this is the best location for this discussion.&amp;nbsp; I want to make sure that my group policy objects are working to deny users the ability to use proxy servers to browse the web which would bypass my non Cisco content filter.&amp;nbsp; How can I determine if there is HTTP traffic going in/out of nonstandard ports? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/detecting-proxy-http-traffic-on-asa-5520/m-p/1600440#M604515</guid>
      <dc:creator>nmoore1978</dc:creator>
      <dc:date>2019-03-11T19:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting Proxy HTTP traffic on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/detecting-proxy-http-traffic-on-asa-5520/m-p/1600441#M604516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are trying to block HTTP traffic on all ports except TCP/80 correct? If so, you can use something like this:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;access-list nonhttp-acl extended deny tcp any any eq www&lt;BR /&gt;access-list nonhttp-acl extended permit tcp any any&lt;BR /&gt;!&lt;BR /&gt;regex allhosts "[0-9a-z]*"&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect http match-all block-all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match request header host regex allhosts&lt;BR /&gt;class-map nonhttp-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match access-list nonhttp-acl&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http block-http-proxy&lt;BR /&gt; parameters&lt;BR /&gt; class block-all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map noproxy-policy&lt;BR /&gt; class nonhttp-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect http block-http-proxy&lt;BR /&gt;!&lt;BR /&gt;service-policy noproxy-policy interface lab&lt;/PRE&gt;&lt;P&gt;This will put all non-port 80 traffic through the HTTP inspection engine. If the inspection finds an HTTP header going to any host, it will drop the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested this briefly in the lab and it does what you're looking for, but you may want to test it first in your environment as you'll be pushing a lot of traffic through the HTTP inspection which will certainly add some overhead to the ASA's packet processing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Feb 2011 20:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/detecting-proxy-http-traffic-on-asa-5520/m-p/1600441#M604516</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-02-22T20:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting Proxy HTTP traffic on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/detecting-proxy-http-traffic-on-asa-5520/m-p/1600442#M604517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the tip.&amp;nbsp; I'll check it out this weekend when we have lower utilitzation and test it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 14:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/detecting-proxy-http-traffic-on-asa-5520/m-p/1600442#M604517</guid>
      <dc:creator>nmoore1978</dc:creator>
      <dc:date>2011-02-23T14:39:06Z</dc:date>
    </item>
  </channel>
</rss>

