04-04-2008 07:49 AM - edited 03-11-2019 05:27 AM
I have the violation action set to log but there's no detail... neither the URL nor what's wrong with it. I looked at show asp drop (tcp issues) and show service-policy (just a counter of total protocol violations)... is there detail somewhere?
I can't even find a list of what constitutes a protocol violation... For instance, what's the limit for "excessive URL length"?
Thanks - Al
Solved! Go to Solution.
04-12-2008 04:25 PM
Enhanced HTTP inspection verifies that HTTP messages conform to RFC 2616 http://www.ietf.org/rfc/rfc2616.txt, use RFC-defined methods or supported extension methods, and comply with various other criteria. In many cases, you can configure these criteria and the system response when the criteria are not met which are considered as HTTP protocol violation.
The criteria that you can apply to HTTP messages include the following:
â¢Does not include any method on a configurable list.
â¢Specific transfer encoding method or application type.
â¢HTTP transaction adheres to RFC specification.
â¢Message body size is within configurable limits.
â¢Request and response message header size is within a configurable limit.
â¢URI length is within a configurable limit.
â¢The content-type in the message body matches the header.
â¢The content-type in the response message matches the accept-type field in the request message.
â¢The content-type in the message is included in a predefined internal list.
â¢Message meets HTTP RFC format criteria.
â¢Presence or absence of selected supported applications.
â¢Presence or absence of selected encoding types.
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1431359
"debug appfw" enables the display of detailed information about application inspection. "undebug all" commands turn off all enabled debug commands.
HTH
04-11-2008 08:51 AM
Make sure that HTTP inspection policy is configured right to filter the traffic. Refer the sample configuration ar http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mpc.html#wp1061200
04-11-2008 12:55 PM
Oh, it's working... but I don't know what is considered an HTTP protocol violation.
04-12-2008 04:25 PM
Enhanced HTTP inspection verifies that HTTP messages conform to RFC 2616 http://www.ietf.org/rfc/rfc2616.txt, use RFC-defined methods or supported extension methods, and comply with various other criteria. In many cases, you can configure these criteria and the system response when the criteria are not met which are considered as HTTP protocol violation.
The criteria that you can apply to HTTP messages include the following:
â¢Does not include any method on a configurable list.
â¢Specific transfer encoding method or application type.
â¢HTTP transaction adheres to RFC specification.
â¢Message body size is within configurable limits.
â¢Request and response message header size is within a configurable limit.
â¢URI length is within a configurable limit.
â¢The content-type in the message body matches the header.
â¢The content-type in the response message matches the accept-type field in the request message.
â¢The content-type in the message is included in a predefined internal list.
â¢Message meets HTTP RFC format criteria.
â¢Presence or absence of selected supported applications.
â¢Presence or absence of selected encoding types.
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1431359
"debug appfw" enables the display of detailed information about application inspection. "undebug all" commands turn off all enabled debug commands.
HTH
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide