<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: don't understand application inspection... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307378#M764473</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ACL indeed needs to permit the traffic, regardless of whether you do inspection or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So after you permit tcp-80 in the ACL, access to your webserver works. In what sense does the inspection not work? I.e. what do you expect it to do that it is not doing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW "match any" is a bad idea, you will send *all* traffic through the http inspection. Better use "match port tcp eq 80" or "match default-inspection" (which allows you to specify multiple inspections in the policy and each one will receive only traffic destined to its default port).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Oct 2009 20:35:30 GMT</pubDate>
    <dc:creator>Herbert Baerten</dc:creator>
    <dc:date>2009-10-28T20:35:30Z</dc:date>
    <item>
      <title>don't understand application inspection...</title>
      <link>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307377#M764472</link>
      <description>&lt;P&gt;I can't make sense of this.  Here's what I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      policy-map type inspect http test-http-inspect-map&lt;/P&gt;&lt;P&gt;        parameters&lt;/P&gt;&lt;P&gt;          protocol-violation action drop-connection&lt;/P&gt;&lt;P&gt;      class-map global-class&lt;/P&gt;&lt;P&gt;        match any&lt;/P&gt;&lt;P&gt;      policy-map global-policy&lt;/P&gt;&lt;P&gt;        class global-class&lt;/P&gt;&lt;P&gt;          inspect http test-http-inspect-map&lt;/P&gt;&lt;P&gt;      service-policy global-policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;	  &lt;/P&gt;&lt;P&gt;I'm trying to access a webserver on the "dmz" network (security-level 50) from the "outside" network (security-level 100).  I can't do so until I apply an access-list.  So, I allow traffic on dst port 80 from from the outside.  But at that point it seems the application inspection doesn't work.  To test this I telnet to port 80 from the outside host to the internal webserver and issued "post blah".  I'm able to see "post blah" in a capture on the internal webserver.  So, how do I properly apply application inspection and what is a good way to test it?  TIA.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307377#M764472</guid>
      <dc:creator>snickered</dc:creator>
      <dc:date>2019-03-11T16:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: don't understand application inspection...</title>
      <link>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307378#M764473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ACL indeed needs to permit the traffic, regardless of whether you do inspection or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So after you permit tcp-80 in the ACL, access to your webserver works. In what sense does the inspection not work? I.e. what do you expect it to do that it is not doing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW "match any" is a bad idea, you will send *all* traffic through the http inspection. Better use "match port tcp eq 80" or "match default-inspection" (which allows you to specify multiple inspections in the policy and each one will receive only traffic destined to its default port).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 20:35:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307378#M764473</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2009-10-28T20:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: don't understand application inspection...</title>
      <link>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307379#M764474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I actually got this working.  I was able to test using netcat.  It effectively dropped the tunnel I opened on port 80 trying to send cmd.exe through it.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I have another question.  When I explicitly open a port for an application there is no "inspect" for is there a way to build an "inspect"?  For instance, let's say I use all the default inspections on the default ports.  Now, let's say I open tcp 188 for an internal application.  I'd like to know that someone didn't find that port and start tunneling cmd.exe.  How do people combat against this scenario?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307379#M764474</guid>
      <dc:creator>snickered</dc:creator>
      <dc:date>2009-10-28T21:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: don't understand application inspection...</title>
      <link>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307380#M764475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What protocol is port 188 using? We cannot build inspects based on protocols we don't know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if it one of the well known protocols then you can use the pre-defined inspections. If not thee is not much of inspecting you can do on the ASA except regular tcp inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course for .exe etc files there are ips that can look into regex strings in the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 22:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307380#M764475</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2009-10-28T22:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: don't understand application inspection...</title>
      <link>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307381#M764476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was thinking more along of the lines of an internal application that uses something proprietary.  I'm confused about MPF now... I'll start a new thread.  Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 23:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/don-t-understand-application-inspection/m-p/1307381#M764476</guid>
      <dc:creator>snickered</dc:creator>
      <dc:date>2009-10-28T23:10:57Z</dc:date>
    </item>
  </channel>
</rss>

