cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1223
Views
0
Helpful
6
Replies

ASA HTTP inspection

Hello Everyone. 

we are testing a HTTP inspection on ASA for our corporate network in development network. after doing config of the commands 

policy-map type inspect http HTTP_Inspection_Map
 description Inspect the HTTP traffic
 parameters
  protocol-violation action drop-connection log
 match req-resp content-type mismatch
  drop-connection log

 

policy-map global_policy
 class inspection_default
  inspect http HTTP_Inspection_Map

 

 

The clinets are not going on any webpage apart from if we tell them to do a  https in web browser (https://bing.com). Kindly please suggest what could be the casue of the issue.

 

 Inspect: http HTTP_Inspection_Map, packet 11444, drop 74, reset-drop 0

 

please do not forget to rate.
6 Replies 6

johnlloyd_13
Level 9
Level 9

hi,

did you configure ACL and class-maps for both HTTP and HTTPS traffic?

did you also apply your 'service-policy' map to an interface?

a lot of times it's applied to the 'inside' interface.

Johnlloyd

I configure the policy in global policy so i beleive i do not need to configure a ACL?

please do not forget to rate.

hi,

you still need it.

what are you trying to achieve in this setup?

are you re-directing traffic to a proxy server or to an appliance (i.e. websense)?

Hi Johnlloyd

we are using a websense virtual appliance. Does HTTP inspection must have to work in conjunction with proxy server or websense.

I assumed the ASA http inspection with these above setting will do the job even without websense?

 

the aim is to ASA inspection HTTP traffic and if there is a violation of the protocol than that traffic must be drop and reset the HTTP connection. 

please do not forget to rate.

hi,

we're also doing websense redirect for a client but not using the MPF. i've checked my ASA config and it has CLI similar to below:

url-server (inside) vendor websense host <WEBSENSE IP> timeout 30 protocol TCP version 1 connections 10

filter https 443 <INSIDE LAN SUBNET> <SM> 0.0.0.0 0.0.0.0 allow

thanks Johnlloyds.

Seems I was under impression that ASA can do http inspection as standalone but seem it could not do this. thank you for your valued input.

 

Best Regards.

please do not forget to rate.
Review Cisco Networking for a $25 gift card