<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny HTTPS &amp;quot;CONNECT&amp;quot; to ip-base url @ ASA/FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188097#M875818</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it wouldn't work if you replace "www" with "443" because the traffic is encrypted , for this very reason you will have to opt for an external URL filtering server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried it once with 443 and it didn't work. You can give it a shot though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Feb 2009 05:44:16 GMT</pubDate>
    <dc:creator>vikram_anumukonda</dc:creator>
    <dc:date>2009-02-26T05:44:16Z</dc:date>
    <item>
      <title>Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188092#M875778</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are having problem as end users have a lot of spyware/walware and have illegal proxy install in the lan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the idea is to deny HTTPS or "CONNECT" type http, at the "inside fwsm/asa" to any ip-base url destination. Since the ip-base url are random, maybe regex could help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please advice us how to do it. thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188092#M875778</guid>
      <dc:creator>hasmurizal</dc:creator>
      <dc:date>2019-03-11T14:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188093#M875780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, could you explain what do you mean by an ip-base url ( does it mean users typing in the ip addresses in the browser instead of domain-name's. )&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2009 11:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188093#M875780</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-02-25T11:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188094#M875787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vikram,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes, that's what i meant. (user's typing ip addresses instead of name addresses)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 00:01:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188094#M875787</guid>
      <dc:creator>hasmurizal</dc:creator>
      <dc:date>2009-02-26T00:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188095#M875797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can try this  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#####################################&lt;/P&gt;&lt;P&gt;regex ipurl "\.[0-255]\.[0-255]\.[0-255]\.[0-255]"&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type regex match-any domain-list&lt;/P&gt;&lt;P&gt;match regex ipurl&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map web&lt;/P&gt;&lt;P&gt;match port tcp eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect http URL&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;match request header host regex class domain-list&lt;/P&gt;&lt;P&gt;drop-connection&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class web&lt;/P&gt;&lt;P&gt;inspect http URL&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;####################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but if you are looking to filter https , you will have to go for a external url filtering server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hoping this is what you are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 05:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188095#M875797</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-02-26T05:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188096#M875808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nice...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map web &lt;/P&gt;&lt;P&gt;match port tcp eq www &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for this portion, can we replace www with 443 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 05:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188096#M875808</guid>
      <dc:creator>hasmurizal</dc:creator>
      <dc:date>2009-02-26T05:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188097#M875818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it wouldn't work if you replace "www" with "443" because the traffic is encrypted , for this very reason you will have to opt for an external URL filtering server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried it once with 443 and it didn't work. You can give it a shot though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 05:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188097#M875818</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-02-26T05:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188098#M875827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the regex in my earlier reply is horribly wrong , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will post a reply as soon as i have an accurate one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 09:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188098#M875827</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-02-26T09:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188099#M875833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the below regex will match anything but numbers in the host-header (&lt;A class="jive-link-custom" href="http://" target="_blank"&gt;http://&lt;/A&gt;&amp;lt;&lt;HOST-HEADER&gt;&amp;gt;/index.html - basically the address typed in by the user )&lt;/HOST-HEADER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the below code would drop the http connection as long as there is no a-z or A-Z in the host-header ( which is basically only numbers in the host-header )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#########################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex ipurl "[a-zA-Z]+"&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type regex match-any domain-list&lt;/P&gt;&lt;P&gt;match regex ipurl&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map web&lt;/P&gt;&lt;P&gt;match port tcp eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect http URL&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;match not request header host regex class domain-list&lt;/P&gt;&lt;P&gt;drop-connection&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class web&lt;/P&gt;&lt;P&gt;inspect http URL &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;##########################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really hope this is helpful to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 10:57:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188099#M875833</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-02-26T10:57:02Z</dc:date>
    </item>
    <item>
      <title>Re: Deny HTTPS "CONNECT" to ip-base url @ ASA/FWSM</title>
      <link>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188100#M875841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the info. appreaciate the help that i received.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyway, the real problem is due to this software which can bypass content filtering and firewall configuration. &lt;A class="jive-link-custom" href="http://www.ultrareach.net/" target="_blank"&gt;http://www.ultrareach.net/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the content filtering server, we have manage it by applying deny "connect" regex ip addresses url. so i was thinking if there is anyway we can eliminate it on fwsm in case if the lan do not have content filtering servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i will check in the near future as i dont have any spare asa for now, and i will responce for any update later. thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 12:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-https-quot-connect-quot-to-ip-base-url-asa-fwsm/m-p/1188100#M875841</guid>
      <dc:creator>hasmurizal</dc:creator>
      <dc:date>2009-02-26T12:07:18Z</dc:date>
    </item>
  </channel>
</rss>

