<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block Proxy Avoidance Sites in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158206#M77074</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For tunnelling applications or web traffic? If applications, then they are most probably using the HTTP CONNECT Method, there is a signature built into the Cisco IPS for that. You can set the action to Deny for that signature. But test it out before :). Also exclude your genuine proxy servers from this signature using Event Action Filters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 May 2009 07:04:34 GMT</pubDate>
    <dc:creator>Farrukh Haroon</dc:creator>
    <dc:date>2009-05-28T07:04:34Z</dc:date>
    <item>
      <title>Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158205#M77071</link>
      <description>&lt;P&gt;ASA5520 with ASA-SSM-20. Currently using Websense product for Web filtering. Need to find a way for Firewall/SSM to track/block users using from using outside proxy servers using public IP address on port 80.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158205#M77071</guid>
      <dc:creator>smartin</dc:creator>
      <dc:date>2019-03-10T11:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158206#M77074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For tunnelling applications or web traffic? If applications, then they are most probably using the HTTP CONNECT Method, there is a signature built into the Cisco IPS for that. You can set the action to Deny for that signature. But test it out before :). Also exclude your genuine proxy servers from this signature using Event Action Filters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 May 2009 07:04:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158206#M77074</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2009-05-28T07:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158207#M77077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a legitimate way of doing this for those who are tunneling HTTP traffic to avoid Websense?  Obviously you can block the proxy sites in Websense, but there are so many new ones every day...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 May 2009 09:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158207#M77077</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2009-05-28T09:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158208#M77079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well you can use an ACL to block all outgoing traffic on port 80/443 EXCEPT when its sourced from your proxy servers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 May 2009 13:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158208#M77079</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2009-05-28T13:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158209#M77081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We arn't using proxy servers.  We need a way for the IPS sensor to report that someone is using an outside proxy... maybe some sort of long URL warning?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 May 2009 16:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158209#M77081</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2009-05-28T16:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158210#M77082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add this statement to your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow proxy-block &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 May 2009 16:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158210#M77082</guid>
      <dc:creator>smartin</dc:creator>
      <dc:date>2009-05-28T16:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158211#M77083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you really think this will block 'proxy avoidance sites'? Or just the proxies users put in their browser's?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 May 2009 13:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158211#M77083</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2009-05-29T13:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Block Proxy Avoidance Sites</title>
      <link>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158212#M77084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my case Websense was able to block these sites &amp;amp; the ASA command seems to be blocking IP address's when a user tries to bypass Websense when adding the IP address in IE.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 May 2009 13:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-proxy-avoidance-sites/m-p/1158212#M77084</guid>
      <dc:creator>smartin</dc:creator>
      <dc:date>2009-05-29T13:42:17Z</dc:date>
    </item>
  </channel>
</rss>

