<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering Issues Using NBAR in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117877#M893964</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shameless bump &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 08 Nov 2008 16:20:20 GMT</pubDate>
    <dc:creator>snetherland</dc:creator>
    <dc:date>2008-11-08T16:20:20Z</dc:date>
    <item>
      <title>Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117872#M893955</link>
      <description>&lt;P&gt;We are using NBAR to match on and subsequently filter certain urls and p2p traffic at a few customer sites.  I understand that this is a substandard way to police user traffic in light of other content filtering options and if this proves unreliable then I will definitely look at those other options.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're matching urls with a very basic class map:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Class Map match-any url_list &lt;/P&gt;&lt;P&gt;   Match protocol http host "*youtube*"&lt;/P&gt;&lt;P&gt;   Match protocol http host "*myspace*"&lt;/P&gt;&lt;P&gt;   Match protocol http host "*facebook*"&lt;/P&gt;&lt;P&gt;   Match protocol http host "*video.google*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is being applied to inbound traffic on the LAN interface(s) and the traffic is being filtered fine.  The issue we are running into is that other html traffic is matching and being filtered as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are also filtering p2p applications with the following class-map:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Class Map match-any p2p_list&lt;/P&gt;&lt;P&gt;   Match protocol bittorrent&lt;/P&gt;&lt;P&gt;   Match protocol directconnect&lt;/P&gt;&lt;P&gt;   Match protocol fasttrack&lt;/P&gt;&lt;P&gt;   Match protocol edonkey&lt;/P&gt;&lt;P&gt;   Match protocol gnutella&lt;/P&gt;&lt;P&gt;   Match protocol winmx&lt;/P&gt;&lt;P&gt;   Match protocol kazaa2&lt;/P&gt;&lt;P&gt;   Match protocol socks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is applied ingress on the LAN interface and ingress on the WAN.  On one of our sites the ingress LAN application is filtering out POP3 traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreciate everyone's time and help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routers used: 3745 with 12.4(15)T7 &amp;amp; 871 with 12.4(20)T1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117872#M893955</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2019-03-11T14:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117873#M893956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;why u dont apply it outbound on the internet link interface ?&lt;/P&gt;&lt;P&gt;this way this policy will not effct LAN and LAN over WAN traffic &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Nov 2008 22:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117873#M893956</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-11-05T22:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117874#M893958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marwanshawi, I really do appreciate the advice and will take it under serious consideration.  Our issues seem to be solely affecting outbound WAN-bound traffic(i.e. improperly matched url headers and outbound POP3 requests).  As I said though, I most certainly will consider making that adjustment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Nov 2008 22:45:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117874#M893958</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2008-11-05T22:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117875#M893960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now that I have a little time, let me provide more detail.  On one site we are using an 871 as a LAN router and filtering websites with the above class-map(please see "url_list" class-map above).  This class-map is being nested in a policy that is simply dropping the packets.  At other sites we are using ToS marking and filtering in-line with the DiffServ model.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This particular site(871 matching "url_list" &amp;amp; dropping the packets) it seems that packets are being improperly dropped to legitimate websites, but it's random.  For instance, a packet attempting to GET the following URL: &lt;A class="jive-link-custom" href="http://en-us.www.mozilla.com/en-US/firefox/3.0.3/firstrun/" target="_blank"&gt;http://en-us.www.mozilla.com/en-US/firefox/3.0.3/firstrun/&lt;/A&gt; will sometimes be dropped and other times be forwarded.  Also, arin.net is another example of this behavior.  Again, the only classifying we are using at this site is the "url_list" class-map above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for everyone's help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Nov 2008 18:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117875#M893960</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2008-11-06T18:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117876#M893962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is still very much an issue at multiple sites.  All routers(3745's and 871's) have the latest Boot Rom and IOS images.  All are being tested with the basic "url_list" class-map(please see above).  Some have been nested in a policy that is marking unwanted traffic and subsequently filtering, and others are being nested in a policy that is simply dropping the packets.  At all sites we seem to be experiencing the same issue; using the "url_list" class-map above, some legitimate http traffic(in addition to the unwanted traffic) is being improperly classified and filtered.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All help is greatly appreciated.  Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Nov 2008 14:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117876#M893962</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2008-11-07T14:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117877#M893964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shameless bump &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Nov 2008 16:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117877#M893964</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2008-11-08T16:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117878#M893965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;may i know how does the interface check every packet, from my understand from your posts, do you use ingress? have you tried to use "ip nbar protocol-discovery"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;second, how do you govern the qos? police, burst, bandwidth or drop?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2009 18:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117878#M893965</guid>
      <dc:creator>hasmurizal</dc:creator>
      <dc:date>2009-01-30T18:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Issues Using NBAR</title>
      <link>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117879#M893966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hasmurizal, thank you for taking the time to respond.  I have tried packet inspection both ingress on the LAN interfaces as well as egress on the WAN ports.  Qos, however, has only ever been configured to use a "drop" policy.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if I can provide any more details that would be of use to you, and any suggestions that you might have would be most appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2009 19:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-issues-using-nbar/m-p/1117879#M893966</guid>
      <dc:creator>snetherland</dc:creator>
      <dc:date>2009-01-30T19:05:31Z</dc:date>
    </item>
  </channel>
</rss>

