<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Http inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/http-inspection/m-p/890766#M958743</link>
    <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when http inspection is activated on pix515 the clients on lan can not send email through hotmail yahooo and can not open some php sites. &lt;/P&gt;&lt;P&gt;what  can i do to have an http inspection and users can access these sites and send emails.&lt;/P&gt;&lt;P&gt;below part of configuration &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 00:50:16 GMT</pubDate>
    <dc:creator>adriatikb</dc:creator>
    <dc:date>2019-03-13T00:50:16Z</dc:date>
    <item>
      <title>Http inspection</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection/m-p/890766#M958743</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when http inspection is activated on pix515 the clients on lan can not send email through hotmail yahooo and can not open some php sites. &lt;/P&gt;&lt;P&gt;what  can i do to have an http inspection and users can access these sites and send emails.&lt;/P&gt;&lt;P&gt;below part of configuration &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection/m-p/890766#M958743</guid>
      <dc:creator>adriatikb</dc:creator>
      <dc:date>2019-03-13T00:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Http inspection</title>
      <link>https://community.cisco.com/t5/network-security/http-inspection/m-p/890767#M958745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try these steps to see if this works. Detect non-compliant HTTP traffic. Check if you want SDM to examine HTTP traffic for packets that do not comply with the HTTP protocol.  Use the permit, block, and alarm controls to specify the action that the router takes when this type of traffic is encountered.  Note that Blocking non-compliant HTTP traffic can cause the router to drop&lt;/P&gt;&lt;P&gt;traffic from popular websites that might not be blocked on the basis of content if those websites do not conform to the HTTP protocol.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Dec 2007 21:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-inspection/m-p/890767#M958745</guid>
      <dc:creator />
      <dc:date>2007-12-19T21:25:56Z</dc:date>
    </item>
  </channel>
</rss>

