<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Only authorize HTTP and HTTPS traffic even on non standard ports in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/only-authorize-http-and-https-traffic-even-on-non-standard-ports/m-p/3958203#M935386</link>
    <description>&lt;P&gt;Yes, you can use the Application tab in your Access Control Policy and search for "HTTP" and "HTTPS" under "Available Applications." Firepower will detect those applications without the need of TLS decryption/inspection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Nov 2019 19:23:21 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2019-11-13T19:23:21Z</dc:date>
    <item>
      <title>Only authorize HTTP and HTTPS traffic even on non standard ports</title>
      <link>https://community.cisco.com/t5/network-security/only-authorize-http-and-https-traffic-even-on-non-standard-ports/m-p/3956284#M935385</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an ASA with Cisco Firepower and I want to create a rule&amp;nbsp; to only authorize HTTP and HTTPS traffic (without decrypt HTTPS traffic) regardless of the port used (standard or not).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know ASA can inspect HTTP traffic on non standard port withtout using Firepower module, but for HTTPS it's not supported directly ASA, Firepower must be used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So this is the rule I want to create for that need:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SOURCE: Network A DESTINATION:&amp;nbsp; Network B Service: HTTP (any port) or HTTPS (any port)&amp;nbsp; Action: Allow&lt;/P&gt;&lt;P&gt;SOURCE: Any DESTINATION: Any Service: Any Action Deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know if this kind of implementation is possible on Firepower rules ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank for you help,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/only-authorize-http-and-https-traffic-even-on-non-standard-ports/m-p/3956284#M935385</guid>
      <dc:creator>Elbrabra</dc:creator>
      <dc:date>2020-02-21T17:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Only authorize HTTP and HTTPS traffic even on non standard ports</title>
      <link>https://community.cisco.com/t5/network-security/only-authorize-http-and-https-traffic-even-on-non-standard-ports/m-p/3958203#M935386</link>
      <description>&lt;P&gt;Yes, you can use the Application tab in your Access Control Policy and search for "HTTP" and "HTTPS" under "Available Applications." Firepower will detect those applications without the need of TLS decryption/inspection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 19:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/only-authorize-http-and-https-traffic-even-on-non-standard-ports/m-p/3958203#M935386</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2019-11-13T19:23:21Z</dc:date>
    </item>
  </channel>
</rss>

