Use Cisco ASDM to edit the Cisco ASA 5505 configurations to enable Advanced HTTP Application …

CORRECT TEXT
Instructions
This item contains a simulation task. Refer to the scenario and topology before you start. When
you are ready, open the Topology window and click the required device to open the GUI window
on a virtual terminal. Scroll to view all parts of the Cisco ASDM screens.
Scenario
Click the PC icon to launch Cisco ASDM. You have access to a Cisco ASA 5505 via Cisco ASDM.
Use Cisco ASDM to edit the Cisco ASA 5505 configurations to enable Advanced HTTP
Application inspection by completing the following tasks:
1. Enable HTTP inspection globally on the Cisco ASA
2. Create a new HTTP inspect Map named: http-inspect-map to:
a. Enable the dropping of any HTTP connections that encounter HTTP protocol violations
b. Enable the dropping and logging of any HTTP connections when the content type in the HTTP
response does not match one of the MIME types in the accept filed of the HTTP request
Note: In the simulation, you will not be able to test the HTTP inspection policy after you complete
your configuration. Not all Cisco ASDM screens are fully functional.

CORRECT TEXT
Instructions
This item contains a simulation task. Refer to the scenario and topology before you start. When
you are ready, open the Topology window and click the required device to open the GUI window
on a virtual terminal. Scroll to view all parts of the Cisco ASDM screens.
Scenario
Click the PC icon to launch Cisco ASDM. You have access to a Cisco ASA 5505 via Cisco ASDM.
Use Cisco ASDM to edit the Cisco ASA 5505 configurations to enable Advanced HTTP
Application inspection by completing the following tasks:
1. Enable HTTP inspection globally on the Cisco ASA
2. Create a new HTTP inspect Map named: http-inspect-map to:
a. Enable the dropping of any HTTP connections that encounter HTTP protocol violations
b. Enable the dropping and logging of any HTTP connections when the content type in the HTTP
response does not match one of the MIME types in the accept filed of the HTTP request
Note: In the simulation, you will not be able to test the HTTP inspection policy after you complete
your configuration. Not all Cisco ASDM screens are fully functional.

Answer: See the explanation

Explanation:
Here are the step by step Solution for this:

1.>Go to Configuration>>Firewall>>Objects>>Inspect Maps>>HTTP>>Add>>Add name “httpinspect-map”>>click on detail>>
a. select “check for protocol violations”
b. Action: Drop connection
c. Log: Enable
d. Click on Inspection: Click Add
e. Select Single Match>>Match type: No Match
f. Criterion: response header field
g. Field: Predefined: Content type
h. value: Content type
i. Action: Drop connection
j. Log: Enable
h. ok>>>ok>>>Apply
Through achieve this command line:
policy-map type inspect http http-inspect-map
parameters

protocol-violation action drop-connection log
policy-map type inspect http http-inspect-map
match not response header content-type application/msword
drop-connection log



Leave a Reply 0

Your email address will not be published. Required fields are marked *