Information
Removes Java applets from the HTTP reply traffic crossing the security appliance.
Rationale:
Java applets enhance users' Web experience with more interactivity. Because the applet is a code that is downloaded and executed on the users' machines, it can be used by attackers to perform malicious activities on the systems visiting untrusted websites.
Solution
* Step 1: Acquire the TCP port <port> used for the HTTP traffic containing Java objects, the IP address <internal_users_ip> and mask <internal_users_mask> of internal users generating the HTTP traffic, and the IP address <external_servers_ip> and mask <external_servers_mask> of the external servers to which the internal users connect and that are source of Java objects.
* Step 2: Run the following command to filter Java applets.
HOSTNAME(CONFIG)# FILTER JAVA _<port>__ <internal_users_ip> __<internal_users_mask> __<external_servers_ip> <external_servers_mask>_