47-33
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter 47 Configuring Inspection of Basic Internet Protocols
HTTP Inspection
Fields
• Name—When adding an HTTP map, enter the name of the HTTP map. When editing an HTTP map,
the name of the previously configured HTTP map is shown.
• Description—Enter the description of the HTTP map, up to 200 characters in length.
• Security Level—Select the security level (low, medium, or high).
–
Low—Default.
Protocol violation action: Drop connection
Drop connections for unsafe methods: Disabled
Drop connections for requests with non-ASCII headers: Disabled
URI filtering: Not configured
Advanced inspections: Not configured
–
Medium
Protocol violation action: Drop connection
Drop connections for unsafe methods: Allow only GET, HEAD, and POST
Drop connections for requests with non-ASCII headers: Disabled
URI filtering: Not configured
Advanced inspections: Not configured
–
High
Protocol violation action: Drop connection and log
Drop connections for unsafe methods: Allow only GET and HEAD.
Drop connections for requests with non-ASCII headers: Enabled
URI filtering: Not configured
Advanced inspections: Not configured
–
URI Filtering—Opens the URI Filtering dialog box which lets you configure the settings for an
URI filter.
–
Default Level—Sets the security level back to the default.
• Details—Shows the Parameters and Inspections tabs to configure additional settings.
Modes
The following table shows the modes in which this feature is available:
Add/Edit HTTP Policy Map (Details)
The Add/Edit HTTP Policy Map (Details) dialog box is accessible as follows:
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
••••—