
22-60
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 22 Applying Application Layer Protocol Inspection
HTTP Inspection
Total: 1
1 Concurrent Call(s) for
Local: 10.100.100.1/12139 Foreign: 209.165.201.1/1720
0 CRV: 2
Local: 10.100.100.1/12139 TPKT: 211 Foreign: 209.165.201.1/1720 TPKT: 113
HTTP Inspection
This section describes how the HTTP inspection engine works and how you can change its configuration.
This section includes the following topics:
•
HTTP Inspection Overview, page 22-60
•
Configuring an HTTP Inspection Policy Map for Additional Inspection Control, page 22-60
HTTP Inspection Overview
Use the HTTP inspection engine to protect against specific attacks and other threats that may be
associated with HTTP traffic. HTTP inspection performs several functions.
•
Enhanced HTTP inspection
•
Java and ActiveX filtering
The second feature is configured in conjunction with the
filter
command. For more information about
filtering, see
Chapter 18, “Applying Filtering Services.”
Note
The
no inspect http
command also disables the
filter url
command.
The enhanced HTTP inspection feature, which is also known as an application firewall and is available
when you configure an HTTP map (see
“Configuring an HTTP Inspection Policy Map for Additional
Inspection Control”
), can help prevent attackers from using HTTP messages for circumventing network
security policy. It verifies the following for all HTTP messages.
•
Conformance to RFC 2616
•
Use of RFC-defined methods only.
•
Compliance with the additional criteria.
Configuring an HTTP Inspection Policy Map for Additional Inspection Control
To specify actions when a message violates a parameter, create an HTTP inspection policy map. You can
then apply the inspection policy map when you enable HTTP inspection according to the
“Configuring
Application Inspection” section on page 22-6
.
Note
When you enable HTTP inspection with an inspection policy map, strict HTTP inspection with the action
reset and log is enabled by default. You can change the actions performed in response to inspection
failure, but you cannot disable strict inspection as long as the inspection policy map remains enabled.
Содержание 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Страница 35: ...P A R T 1 Getting Started and General Information ...
Страница 36: ......
Страница 297: ...P A R T 2 Configuring the Security Policy ...
Страница 298: ......
Страница 521: ...P A R T 3 System Administration ...
Страница 522: ......
Страница 613: ...P A R T 4 Reference ...
Страница 614: ......