<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA HTTP strict inspection -- what parameters? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996265#M939757</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Enhanced HTTP inspection verifies that HTTP messages conform to RFC 2616 &lt;A class="jive-link-custom" href="http://www.ietf.org/rfc/rfc2616.txt" target="_blank"&gt;http://www.ietf.org/rfc/rfc2616.txt&lt;/A&gt;, use RFC-defined methods or supported extension methods, and comply with various other criteria. In many cases, you can configure these criteria and the system response when the criteria are not met which are considered as HTTP protocol violation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The criteria that you can apply to HTTP messages include the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Does not include any method on a configurable list.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Specific transfer encoding method or application type.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢HTTP transaction adheres to RFC specification.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Message body size is within configurable limits.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Request and response message header size is within a configurable limit.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢URI length is within a configurable limit.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢The content-type in the message body matches the header.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢The content-type in the response message matches the accept-type field in the request message.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢The content-type in the message is included in a predefined internal list.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Message meets HTTP RFC format criteria.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Presence or absence of selected supported applications.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Presence or absence of selected encoding types.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1431359" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1431359&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"debug appfw" enables the display of detailed information about application inspection. "undebug all" commands turn off all enabled debug commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 12 Apr 2008 23:25:16 GMT</pubDate>
    <dc:creator>pengfang</dc:creator>
    <dc:date>2008-04-12T23:25:16Z</dc:date>
    <item>
      <title>ASA HTTP strict inspection -- what parameters?</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996262#M939753</link>
      <description>&lt;P&gt;I have the violation action set to log but there's no detail... neither the URL nor what's wrong with it.  I looked at show asp drop (tcp issues) and show service-policy (just a counter of total protocol violations)... is there detail somewhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't even find a list of what constitutes a protocol violation... For instance, what's the limit for "excessive URL length"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks - Al&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996262#M939753</guid>
      <dc:creator>ALAN HARKRADER</dc:creator>
      <dc:date>2019-03-11T12:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA HTTP strict inspection -- what parameters?</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996263#M939754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure that HTTP inspection policy is configured right to filter the traffic.  Refer the sample configuration ar &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html#wp1061200" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html#wp1061200&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2008 15:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996263#M939754</guid>
      <dc:creator>irisrios</dc:creator>
      <dc:date>2008-04-11T15:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA HTTP strict inspection -- what parameters?</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996264#M939756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh, it's working... but I don't know what is considered an HTTP protocol violation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2008 19:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996264#M939756</guid>
      <dc:creator>ALAN HARKRADER</dc:creator>
      <dc:date>2008-04-11T19:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA HTTP strict inspection -- what parameters?</title>
      <link>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996265#M939757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Enhanced HTTP inspection verifies that HTTP messages conform to RFC 2616 &lt;A class="jive-link-custom" href="http://www.ietf.org/rfc/rfc2616.txt" target="_blank"&gt;http://www.ietf.org/rfc/rfc2616.txt&lt;/A&gt;, use RFC-defined methods or supported extension methods, and comply with various other criteria. In many cases, you can configure these criteria and the system response when the criteria are not met which are considered as HTTP protocol violation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The criteria that you can apply to HTTP messages include the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Does not include any method on a configurable list.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Specific transfer encoding method or application type.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢HTTP transaction adheres to RFC specification.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Message body size is within configurable limits.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Request and response message header size is within a configurable limit.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢URI length is within a configurable limit.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢The content-type in the message body matches the header.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢The content-type in the response message matches the accept-type field in the request message.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢The content-type in the message is included in a predefined internal list.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Message meets HTTP RFC format criteria.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Presence or absence of selected supported applications.&lt;/P&gt;&lt;P&gt;â&amp;#128;¢Presence or absence of selected encoding types.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1431359" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1431359&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"debug appfw" enables the display of detailed information about application inspection. "undebug all" commands turn off all enabled debug commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Apr 2008 23:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-http-strict-inspection-what-parameters/m-p/996265#M939757</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-04-12T23:25:16Z</dc:date>
    </item>
  </channel>
</rss>

