<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower cant handle long HTTP request (SCEP request) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359035#M924163</link>
    <description>&lt;P&gt;Hi!&lt;BR /&gt;&lt;BR /&gt;I have a problem... We have A SCEP server behind firepower and i want to limit access to it from some networks only with specific URL (&amp;lt;server address&amp;gt;/certsrv/mscep/mscep.dll/pkiclient.exe&amp;amp;operation=). I want to do it to prevent connecting to admin part of SCEP server.&lt;BR /&gt;&lt;BR /&gt;I created an access rule for this URL and it works when client is trying to recieve CA cert but it doesnt work to send SCEP request. I think it happens because it cant reassymbly long TCP or HTTP stream and it cant see the full URL. When i capture traffic i see what firepower blocks connection before client sends full request.&lt;BR /&gt;&lt;BR /&gt;What TCP or HTTP parameters on firepower should i tune to avoid this behavior?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:35:24 GMT</pubDate>
    <dc:creator>lyutov_dv</dc:creator>
    <dc:date>2020-02-21T15:35:24Z</dc:date>
    <item>
      <title>Firepower cant handle long HTTP request (SCEP request)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359035#M924163</link>
      <description>&lt;P&gt;Hi!&lt;BR /&gt;&lt;BR /&gt;I have a problem... We have A SCEP server behind firepower and i want to limit access to it from some networks only with specific URL (&amp;lt;server address&amp;gt;/certsrv/mscep/mscep.dll/pkiclient.exe&amp;amp;operation=). I want to do it to prevent connecting to admin part of SCEP server.&lt;BR /&gt;&lt;BR /&gt;I created an access rule for this URL and it works when client is trying to recieve CA cert but it doesnt work to send SCEP request. I think it happens because it cant reassymbly long TCP or HTTP stream and it cant see the full URL. When i capture traffic i see what firepower blocks connection before client sends full request.&lt;BR /&gt;&lt;BR /&gt;What TCP or HTTP parameters on firepower should i tune to avoid this behavior?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359035#M924163</guid>
      <dc:creator>lyutov_dv</dc:creator>
      <dc:date>2020-02-21T15:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower cant handle long HTTP request (SCEP request)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359726#M924164</link>
      <description>&lt;P&gt;If you're trying to create an ACP that filters on an https URL you would need to decrypt and re-sign to fully parse the full URL (i.e. including the section following the top level domain (if using DNS) or server address).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;URLs of up to 255 characters should be supported by default.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 14:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359726#M924164</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-04-03T14:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower cant handle long HTTP request (SCEP request)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359766#M924165</link>
      <description>&lt;P&gt;It's HTTP request.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 14:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359766#M924165</guid>
      <dc:creator>lyutov_dv</dc:creator>
      <dc:date>2018-04-03T14:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower cant handle long HTTP request (SCEP request)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359783#M924166</link>
      <description>&lt;P&gt;OK.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share the access control policy details you are using?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generally an ACP will be first match rule only - so if the more specific rule isn't first it will never be hit.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 15:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359783#M924166</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-04-03T15:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower cant handle long HTTP request (SCEP request)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359788#M924167</link>
      <description>&lt;P&gt;There are no deny rules before the rule i describe&lt;/P&gt;
&lt;P&gt;The problem here what firepower cant reassymbly tcp packets and receive full http request to retrieve URL from it.&lt;BR /&gt;For exmple everything is ok if http request is not so long as SCEP request&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example:&lt;BR /&gt;SCEP CACertREQ works - http://&amp;lt;scep_server_name&amp;gt;/certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&amp;amp;message=&amp;lt;scep_server_name&amp;gt;&lt;/P&gt;
&lt;P&gt;But SCEP CAReq doesnt - http://&amp;lt;scep_server_name&amp;gt;/certsrv/mscep/mscep.dll/pkiclient.exe?operation=PKIOperation&amp;amp;message=MIIJhgYJKoZIhvcNAQcCoIIJdzCCCXMCAQExDzANBglghkgBZQMEAgEFADCCBH0G%0ACSqGSIb3DQEHAaCCBG4EggRqMIIEZgYJKoZIhvcNAQcDoIIEVzCCBFMCAQAxggFG%0AMIIBQgIBADAqMBMxETAPBgNVBAMTCExhbW9kYUNBAhNuAAAXOuA02LSTzSTdAAAA%0AABc6MA0GCSqGSIb3DQEBAQUABIIBAEWh1othOUg%2Fy3ZRqtOVk1DEx%2FqXnjlAakrE%0AzfCTDQvolIHRLu4tQ4DH%2FL0TlnBBX%2FKHVASGpIXZvcvmNnvuXrGvq%2BS9viXpsbUe%0AHZAwmx3W%2B9yrdGwXaZFMtIJNTqoBsK1F%2B2TSrBGNAjpCNE5uoP3q4sVS4OM5qf99%0AV%2FnYrJTUAJxANHl61oYYBIZBxhE7iOA3D15UP354I4hYnpcM7yQAEik18WjAN4QM%0A1YeoQ5O1mXCCE4jdFScNBs42zboCl%2BlVPv2p%2FiKieiMGfYbb9J2YKfUlDxAgS9sa%0AbczLtVL0jT3uU0eB2IHHft1zpAKnv0KFF85BvXc1lx7Vmt3leVIwggMCBgkqhkiG%0A9w0BBwEwEQYFKw4DAgcECMQ2FgcYommXgIIC4IGaAXsvM%2ByFjrtNO%2FooUwXIE68Y%0AQEVtISPn3NjL7....&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 15:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359788#M924167</guid>
      <dc:creator>lyutov_dv</dc:creator>
      <dc:date>2018-04-03T15:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower cant handle long HTTP request (SCEP request)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359813#M924168</link>
      <description>&lt;P&gt;Can you check if the Intrusion rule with GID 119 SID 15 is enabled and set to drop?&amp;nbsp;Rule should be called "&lt;SPAN&gt;(119:15) HI_CLIENT_OVERSIZE_DIR". The documentation for this rule states:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;This event is generated when the http_inspect pre-processor detects a request for a URL that is longer than a specified length. This may indicate an attack or an attempt to evade an IDS.
&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;The default length seems to be 500 characters.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 16:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3359813#M924168</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-04-03T16:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower cant handle long HTTP request (SCEP request)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3360176#M924169</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;(119:15) HI_CLIENT_OVERSIZE_DIR"&lt;/SPAN&gt; is disabled but the connection is blocked by Default access rule not IPS&lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2018 06:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-cant-handle-long-http-request-scep-request/m-p/3360176#M924169</guid>
      <dc:creator>lyutov_dv</dc:creator>
      <dc:date>2018-04-04T06:57:05Z</dc:date>
    </item>
  </channel>
</rss>

