<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS IDS/Firewall blocks https connections in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-ids-firewall-blocks-https-connections/m-p/577145#M98736</link>
    <description>&lt;P&gt;Starting from 12.3(5) ending with 12.3(17a) on all our 7200 and 7500 routers, applying ip audit input on internal interface or ip audit out on external interface immediately  stops all https websites. I was trying to disable all https and http signatures but situation looks similar. Due to fact that we had lots of problems with 12.3T and 12.4 upgrade is not possible (routers restarts, VIPs crashes etc.). Even if I only apply alarm for info and attack signatures, https still cannot pass through and logs are empty.&lt;/P&gt;&lt;P&gt;Is there any workaround for this problem? Thanks!&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:53:20 GMT</pubDate>
    <dc:creator>lukaszwisniowski</dc:creator>
    <dc:date>2019-03-10T09:53:20Z</dc:date>
    <item>
      <title>IOS IDS/Firewall blocks https connections</title>
      <link>https://community.cisco.com/t5/network-security/ios-ids-firewall-blocks-https-connections/m-p/577145#M98736</link>
      <description>&lt;P&gt;Starting from 12.3(5) ending with 12.3(17a) on all our 7200 and 7500 routers, applying ip audit input on internal interface or ip audit out on external interface immediately  stops all https websites. I was trying to disable all https and http signatures but situation looks similar. Due to fact that we had lots of problems with 12.3T and 12.4 upgrade is not possible (routers restarts, VIPs crashes etc.). Even if I only apply alarm for info and attack signatures, https still cannot pass through and logs are empty.&lt;/P&gt;&lt;P&gt;Is there any workaround for this problem? Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ids-firewall-blocks-https-connections/m-p/577145#M98736</guid>
      <dc:creator>lukaszwisniowski</dc:creator>
      <dc:date>2019-03-10T09:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: IOS IDS/Firewall blocks https connections</title>
      <link>https://community.cisco.com/t5/network-security/ios-ids-firewall-blocks-https-connections/m-p/577146#M98738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like you're hitting this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/cgi-bin/Support/Bugtool/onebug.pl?bugid=CSCee32778&amp;amp;Submit=Search" target="_blank"&gt;http://www.cisco.com/cgi-bin/Support/Bugtool/onebug.pl?bugid=CSCee32778&amp;amp;Submit=Search&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that this bug specifically talks about SSH/Telnet connections through the router, but this bug has numerous others linked to it that deal with pretty much all types of TCP traffic (including HTTPS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bug is fixed in 12.3(9.4) and later, so not sure why you're seeing it on 12.3(17a).  Try the workaround (apply "ip inspect" to the interface as well) to confirm if you're hitting this bug. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Feb 2006 05:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ids-firewall-blocks-https-connections/m-p/577146#M98738</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2006-02-17T05:16:22Z</dc:date>
    </item>
  </channel>
</rss>

