05-26-2009 10:44 AM - edited 03-10-2019 04:38 AM
ASA5520 with ASA-SSM-20. Currently using Websense product for Web filtering. Need to find a way for Firewall/SSM to track/block users using from using outside proxy servers using public IP address on port 80.
05-28-2009 12:04 AM
For tunnelling applications or web traffic? If applications, then they are most probably using the HTTP CONNECT Method, there is a signature built into the Cisco IPS for that. You can set the action to Deny for that signature. But test it out before :). Also exclude your genuine proxy servers from this signature using Event Action Filters.
Regards
Farrukh
05-28-2009 02:57 AM
Is there a legitimate way of doing this for those who are tunneling HTTP traffic to avoid Websense? Obviously you can block the proxy sites in Websense, but there are so many new ones every day...
05-28-2009 06:10 AM
Well you can use an ACL to block all outgoing traffic on port 80/443 EXCEPT when its sourced from your proxy servers?
Regards
Farrukh
05-28-2009 09:41 AM
We arn't using proxy servers. We need a way for the IPS sensor to report that someone is using an outside proxy... maybe some sort of long URL warning?
05-28-2009 09:45 AM
Add this statement to your ASA.
filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow proxy-block
05-29-2009 06:17 AM
Do you really think this will block 'proxy avoidance sites'? Or just the proxies users put in their browser's?
Regards
Farrukh
05-29-2009 06:42 AM
In my case Websense was able to block these sites & the ASA command seems to be blocking IP address's when a user tries to bypass Websense when adding the IP address in IE.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide