47-33
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter47 Configuring Inspection of Basic Internet Protocol s
HTTP Inspection
Fields
Name—When adding an HTTP map, enter the name of the HTTP map. When editing an HTTP map,
the name of the previously configured HTTP map is shown.
Description—Enter the description of the HTTP map, up to 200 characters in length.
Security Level—Select the security level (low, medium, or high).
Low—Default.
Protocol violation action: Drop connection
Drop connections for unsafe methods: Disabled
Drop connections for requests with non-ASCII headers: Disabled
URI filtering: Not configured
Advanced inspections: Not configured
Medium
Protocol violation action: Drop connection
Drop connections for unsafe methods: Allow only GET, HEAD, and POST
Drop connections for requests with non-ASCII headers: Disabled
URI filtering: Not configured
Advanced inspections: Not configured
High
Protocol violation action: Drop connection and log
Drop connections for unsafe methods: Allow only GET and HEAD.
Drop connections for requests with non-ASCII headers: Enabled
URI filtering: Not configured
Advanced inspections: Not configured
URI Filtering—Opens the URI Filtering dialog box which lets you configure the settings for an
URI filter.
Default Level—Sets the security level back to the default.
Details—Shows the Parameters and Inspections tabs to configure additional settings.
Modes
The following table shows the modes in which this feature is available:
Add/Edit HTTP Policy Map (Details)
The Add/Edit HTTP Policy Map (Details) dialog box is accessible as follows:
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
••••