Http Inspection; Http Inspection Overview; Configuring An Http Inspection Policy Map For Additional Inspection Control - Cisco 7604 Configuration Manual

Catalyst 6500 series switch and cisco 7600 series router firewall services module configuration guide using the cli
Hide thumbs Also See for 7604:
Table of Contents

Advertisement

HTTP Inspection

Total: 1
1
Concurrent Call(s) for
0
CRV: 2
HTTP Inspection
This section describes how the HTTP inspection engine works and how you can change its configuration.
This section includes the following topics:

HTTP Inspection Overview

Use the HTTP inspection engine to protect against specific attacks and other threats that may be
associated with HTTP traffic. HTTP inspection performs several functions.
The second feature is configured in conjunction with the filter command. For more information about
filtering, see
The no inspect http command also disables the filter url command.
Note
The enhanced HTTP inspection feature, which is also known as an application firewall and is available
when you configure an HTTP map (see
Inspection
security policy. It verifies the following for all HTTP messages.

Configuring an HTTP Inspection Policy Map for Additional Inspection Control

To specify actions when a message violates a parameter, create an HTTP inspection policy map. You can
then apply the inspection policy map when you enable HTTP inspection according to the
Application Inspection" section on page
When you enable HTTP inspection with an inspection policy map, strict HTTP inspection with the action
Note
reset and log is enabled by default. You can change the actions performed in response to inspection
failure, but you cannot disable strict inspection as long as the inspection policy map remains enabled.
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
22-60
Local: 10.100.100.1/12139 Foreign: 209.165.201.1/1720
Local: 10.100.100.1/12139
HTTP Inspection Overview, page 22-60
Configuring an HTTP Inspection Policy Map for Additional Inspection Control, page 22-60
Enhanced HTTP inspection
Java and ActiveX filtering
Chapter 18, "Applying Filtering Services."
Control"), can help prevent attackers from using HTTP messages for circumventing network
Conformance to RFC 2616
Use of RFC-defined methods only.
Compliance with the additional criteria.
Chapter 22
TPKT: 211
Foreign: 209.165.201.1/1720
"Configuring an HTTP Inspection Policy Map for Additional
22-6.
Applying Application Layer Protocol Inspection
TPKT: 113
"Configuring
OL-20748-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

7609-s76137606-sCatalyst 6500 series7600 series

Table of Contents