<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CSC-SSM File Blocking Scenario in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366391#M823635</link>
    <description>&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";
	mso-ansi-language:#0400;
	mso-fareast-language:#0400;
	mso-bidi-language:#0400;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Got a scenario where when a I divert Http Traffic to CSC-SSM, Invalid URL error&lt;/P&gt;&lt;P class="MsoNormal"&gt;Is encountered.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Attached is the network diagram. Users from branch network gets their&lt;/P&gt;&lt;P class="MsoNormal"&gt;Internet connection via the squid proxy of the main branch. The main branch is connected to the branch network via VPN. &lt;SPAN&gt; &lt;/SPAN&gt;What we want to accomplish is block audio file using CSC-SSM. Audio/Video File was already selected under&lt;/P&gt;&lt;P class="MsoNormal"&gt;File Blocking(Trend Micro Interscan). But mp3 files can still be downloaded. Upon checking the config,&lt;/P&gt;&lt;P class="MsoNormal"&gt;I noticed that SMTP was the only traffic diverted to the CSC-SSM. So I added&lt;/P&gt;&lt;P class="MsoNormal"&gt;Http Traffic. Below is the config for reference.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_mpc_in extended permit tcp any any eq smtp&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_mpc_in extended permit tcp any any eq http&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;class-map SMTP&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;match access-list outside_mpc_in&lt;/P&gt;&lt;P class="MsoNormal"&gt;class-map inspection_default&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;match default-inspection-traffic&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map global_policy&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;class inspection_default&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect dns maximum-length 512&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect ftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect h323 h225&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect h323 ras&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect rsh&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect rtsp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect esmtp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sqlnet&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect skinny&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sunrpc&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect xdmcp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sip&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect netbios&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect tftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map outside-policy&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;class SMTP&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;csc fail-open&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;service-policy global_policy global&lt;/P&gt;&lt;P class="MsoNormal"&gt;service-policy outside-policy interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;But upon doing this, all http traffic was blocked. Invalid URL error&lt;/P&gt;&lt;P class="MsoNormal"&gt;Was encountered. If the access-list for http traffic is removed, then&lt;/P&gt;&lt;P class="MsoNormal"&gt;All internet connections are restored but audio file is not blocked.&lt;/P&gt;&lt;P class="MsoNormal"&gt;So it seems that when Http traffic is diverted to CSC-SSM, some&lt;/P&gt;&lt;P class="MsoNormal"&gt;Packet modification takes place that prevents the proxy from&lt;/P&gt;&lt;P class="MsoNormal"&gt;Seing http traffic. Am I Missing something on the configuration?&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Here is the error message from the proxy.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;The Following Error was encountered&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Invalid URL&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;Some Aspect of the requested URL is incorrect. Posible problems:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Missing or incorrect access protocol(should be &lt;A href="http:/" target="_blank"&gt;http://&lt;/A&gt; or similar)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Missing Hostname&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Illegal double-escape in the URL-Path&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG style="font-size: 12pt; Times New Roman&amp;amp;quot: ; font-family: &amp;amp;quot; "&gt;Illegal character in hostname; underscores are not allowed&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:47:14 GMT</pubDate>
    <dc:creator>oyd110380</dc:creator>
    <dc:date>2019-03-11T16:47:14Z</dc:date>
    <item>
      <title>CSC-SSM File Blocking Scenario</title>
      <link>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366391#M823635</link>
      <description>&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";
	mso-ansi-language:#0400;
	mso-fareast-language:#0400;
	mso-bidi-language:#0400;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Got a scenario where when a I divert Http Traffic to CSC-SSM, Invalid URL error&lt;/P&gt;&lt;P class="MsoNormal"&gt;Is encountered.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Attached is the network diagram. Users from branch network gets their&lt;/P&gt;&lt;P class="MsoNormal"&gt;Internet connection via the squid proxy of the main branch. The main branch is connected to the branch network via VPN. &lt;SPAN&gt; &lt;/SPAN&gt;What we want to accomplish is block audio file using CSC-SSM. Audio/Video File was already selected under&lt;/P&gt;&lt;P class="MsoNormal"&gt;File Blocking(Trend Micro Interscan). But mp3 files can still be downloaded. Upon checking the config,&lt;/P&gt;&lt;P class="MsoNormal"&gt;I noticed that SMTP was the only traffic diverted to the CSC-SSM. So I added&lt;/P&gt;&lt;P class="MsoNormal"&gt;Http Traffic. Below is the config for reference.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_mpc_in extended permit tcp any any eq smtp&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_mpc_in extended permit tcp any any eq http&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;class-map SMTP&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;match access-list outside_mpc_in&lt;/P&gt;&lt;P class="MsoNormal"&gt;class-map inspection_default&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;match default-inspection-traffic&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map global_policy&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;class inspection_default&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect dns maximum-length 512&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect ftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect h323 h225&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect h323 ras&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect rsh&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect rtsp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect esmtp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sqlnet&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect skinny&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sunrpc&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect xdmcp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sip&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect netbios&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect tftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map outside-policy&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;class SMTP&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;csc fail-open&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;service-policy global_policy global&lt;/P&gt;&lt;P class="MsoNormal"&gt;service-policy outside-policy interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;But upon doing this, all http traffic was blocked. Invalid URL error&lt;/P&gt;&lt;P class="MsoNormal"&gt;Was encountered. If the access-list for http traffic is removed, then&lt;/P&gt;&lt;P class="MsoNormal"&gt;All internet connections are restored but audio file is not blocked.&lt;/P&gt;&lt;P class="MsoNormal"&gt;So it seems that when Http traffic is diverted to CSC-SSM, some&lt;/P&gt;&lt;P class="MsoNormal"&gt;Packet modification takes place that prevents the proxy from&lt;/P&gt;&lt;P class="MsoNormal"&gt;Seing http traffic. Am I Missing something on the configuration?&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Here is the error message from the proxy.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;The Following Error was encountered&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Invalid URL&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;Some Aspect of the requested URL is incorrect. Posible problems:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Missing or incorrect access protocol(should be &lt;A href="http:/" target="_blank"&gt;http://&lt;/A&gt; or similar)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Missing Hostname&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"&gt;&lt;!--[if !supportLists]--&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN&gt;·&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Illegal double-escape in the URL-Path&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;!--[endif]--&gt;&lt;/P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG style="font-size: 12pt; Times New Roman&amp;amp;quot: ; font-family: &amp;amp;quot; "&gt;Illegal character in hostname; underscores are not allowed&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366391#M823635</guid>
      <dc:creator>oyd110380</dc:creator>
      <dc:date>2019-03-11T16:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: CSC-SSM File Blocking Scenario</title>
      <link>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366392#M823672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does the internet traffic go out from CSC module? The CSC-SSM module will use a Squid proxy to reach the Internet or it has a directly connection ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm asking you this, because there are some proxy settings that can be configured depending on your network topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 12:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366392#M823672</guid>
      <dc:creator>resoares</dc:creator>
      <dc:date>2009-12-10T12:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: CSC-SSM File Blocking Scenario</title>
      <link>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366393#M823711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply. CSC-SSM internet traffic goes through the squid proxy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Dec 2009 07:36:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366393#M823711</guid>
      <dc:creator>oyd110380</dc:creator>
      <dc:date>2009-12-11T07:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: CSC-SSM File Blocking Scenario</title>
      <link>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366394#M823735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks for your update, so configure the CSC to divert the traffic to the Squid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Dec 2009 10:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csc-ssm-file-blocking-scenario/m-p/1366394#M823735</guid>
      <dc:creator>resoares</dc:creator>
      <dc:date>2009-12-11T10:46:56Z</dc:date>
    </item>
  </channel>
</rss>

