11-12-2015 03:04 AM
is it possible to block specific https URL's on a standard ASA using the "regex" (regular expression) - I believe the customers ASA is running version 9.x
I had a look around the regex and looks like you can only block http and not https
Thanks
James
Solved! Go to Solution.
11-12-2015 04:00 AM
Hi James,
HTTPS filtering is not supported on ASA. ASA cannot do deep packet inspection or inspection based on regular expression for HTTPS traffic, because in HTTPS, content of packet is encrypted (SSL).
Regards,
Dinesh Moudgil
P.S. Please rate helpful posts.
11-12-2015 04:09 AM
ASA (with Sourcefire) will be able to analyze HTTPS traffic and block/allow it based on policy you configure - HTTPS decryption is coming with next major version.
You can use Cisco Web Security appliance along with Cisco ASA today to filter HTTP and HTTPS traffic.
11-12-2015 04:00 AM
Hi James,
HTTPS filtering is not supported on ASA. ASA cannot do deep packet inspection or inspection based on regular expression for HTTPS traffic, because in HTTPS, content of packet is encrypted (SSL).
Regards,
Dinesh Moudgil
P.S. Please rate helpful posts.
11-12-2015 04:03 AM
Thanks Dinesh - much appriciated.
Regards,
James
11-12-2015 04:09 AM
ASA (with Sourcefire) will be able to analyze HTTPS traffic and block/allow it based on policy you configure - HTTPS decryption is coming with next major version.
You can use Cisco Web Security appliance along with Cisco ASA today to filter HTTP and HTTPS traffic.
11-13-2015 12:01 AM
The FirePOWER release 6.0.0 which includes SSL-Inspection on the local box was released two days ago. But as with any X.0.0 version, I first would use it in a test-system.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide