on it we have SSL VPN access configured. This therefore enables the ability to ‘browse’ to the outside of the firewall.
This in itself isn’t a problem, but what is a problem is that browsing to a random URL that is invalid sees the firewall redirect to an error page as opposed to returning a 404. This is causing PCI scans to fail.
For example, navigating to https://X.X.X.X/HiBtInet will see you redirected to https://X.X.X.X/+CSCOE+/message.html?mc=2
We would like to adjust the behavior of the firewall such that it doesn’t redirect but rather just 404s; this, you would perhaps think, would be default behavior given past DoS and path traversal vulnerabilities made possible by being able to browse on the outside.
I’ve attached the show tech output. We’ve tried implementing the following (we tried switching to 404) without any luck:
sh run webvpn | inc portal|keep
portal-access-rule 1 deny code 403 any
keepout "Denied"
Any questions please let me know.