
18-3
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 18 Applying Filtering Services
Filtering Java Applets
Filtering Java Applets
This section describes how to apply filtering to remove Java applets from HTTP traffic passing through
the firewall. Java applets may pose security risks because they can contain code intended to attack hosts
and servers on a protected network. You can remove Java applets with the
filter java
command.
The
filter java
command filters out Java applets that return to the FWSM from an outbound connection.
The user still receives the HTML page, but the web page source for the applet is commented out so that
the applet cannot execute.
Note
Use the
filter activex
command to remove Java applets that are embedded in <object> tags.
To remove Java applets in HTTP traffic passing through the FWSM, enter the following command in
global configuration mode:
hostname(config)#
filter java
{port[-port] |
except
} local_ip local_mask foreign_ip
foreign_mask
To use this command, replace
port
with the TCP port to which filtering is applied. Typically, this is port
80, but other values are accepted. The
http
or
url
literal can be used for port 80. You can specify a range
of ports by using a hyphen between the starting port number and the ending port number.
To create an exception to a previous filter condition, specify the keyword
except
.
Note
The filter exception rule works only when you use the default port.
The local IP address and mask identify one or more internal hosts that are the source of the traffic to be
filtered. The foreign address and mask specify the external destination of the traffic to be filtered.
You can set either address to
0.0.0.0
(or in shortened form,
0
) to specify all hosts. You can use
0.0.0.0
for either mask (or in shortened form,
0
) to specify all hosts.
You can set either address to
0.0.0.0
(or in shortened form,
0
) to specify all hosts. You can use
0.0.0.0
for either mask (or in shortened form,
0
) to specify all hosts.
The following example specifies that Java applets are blocked on all outbound connections:
hostname(config)#
filter java 80 0 0 0 0
This command specifies that the Java applet blocking applies to web traffic on port 80 from any local
host and for connections to any foreign host.
The following example blocks downloading of Java applets to a host on a protected network:
hostname(config)#
filter java http 192.168.3.3 255.255.255.255 0 0
This command prevents host 192.168.3.3 from downloading Java applets.
To remove the configuration, use the
no
form of the command, as in the following example:
hostname(config)#
no filter java http 192.168.3.3 255.255.255.255 0 0
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......