<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FPM and Proxy Server Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fpm-and-proxy-server-access/m-p/1304500#M828219</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FPM allows customers to create their own filtering policies that can immediately detect and block new viruses and attacks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A filtering policy is defined via the following tasks: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Load a PHDF (for protocol header field matching) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Define a class map and define the protocol stack chain (traffic class) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Define a service policy (traffic policy) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Apply the service policy to an interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below URL explains about the configuration:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/security/configuration/guide/sec_flex_pack_match_ps9587_TSD_Products_Configuration_Guide_Chapter.html#wp1053784" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/security/configuration/guide/sec_flex_pack_match_ps9587_TSD_Products_Configuration_Guide_Chapter.html#wp1053784&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Aug 2009 16:31:37 GMT</pubDate>
    <dc:creator>bwilmoth</dc:creator>
    <dc:date>2009-08-19T16:31:37Z</dc:date>
    <item>
      <title>FPM and Proxy Server Access</title>
      <link>https://community.cisco.com/t5/network-security/fpm-and-proxy-server-access/m-p/1304499#M828206</link>
      <description>&lt;P&gt;Has anyone used Flexible Packet Matching (FPM) to block access to proxy servers?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpm-and-proxy-server-access/m-p/1304499#M828206</guid>
      <dc:creator>brobinson</dc:creator>
      <dc:date>2019-03-11T16:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: FPM and Proxy Server Access</title>
      <link>https://community.cisco.com/t5/network-security/fpm-and-proxy-server-access/m-p/1304500#M828219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FPM allows customers to create their own filtering policies that can immediately detect and block new viruses and attacks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A filtering policy is defined via the following tasks: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Load a PHDF (for protocol header field matching) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Define a class map and define the protocol stack chain (traffic class) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Define a service policy (traffic policy) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Apply the service policy to an interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below URL explains about the configuration:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/security/configuration/guide/sec_flex_pack_match_ps9587_TSD_Products_Configuration_Guide_Chapter.html#wp1053784" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/security/configuration/guide/sec_flex_pack_match_ps9587_TSD_Products_Configuration_Guide_Chapter.html#wp1053784&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Aug 2009 16:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpm-and-proxy-server-access/m-p/1304500#M828219</guid>
      <dc:creator>bwilmoth</dc:creator>
      <dc:date>2009-08-19T16:31:37Z</dc:date>
    </item>
  </channel>
</rss>

