<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104869#M396011</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think you have looked into the complexity of this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMHO, you need the external server to do any meaningful url blocking...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;see&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftwebsen.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftwebsen.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The local firewall filtering is more for url filtering by length, java, etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also look into the newer trend micro solution that works with IOS routers. you can find out more information at &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6643/index.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6643/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Aug 2008 19:43:10 GMT</pubDate>
    <dc:creator>joe19366</dc:creator>
    <dc:date>2008-08-12T19:43:10Z</dc:date>
    <item>
      <title>URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104866#M396005</link>
      <description>&lt;P&gt;I am a little lost and have burned a lot of time on URL filtering.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Setup 1812 router, IOS 12.4(15) T3, SDM 2.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Additional Tasks I have the URL list setup. The Allow Mode is on.&lt;/P&gt;&lt;P&gt;For my zone pair (in-zone to out-zone) I have this URL filter being applied. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is I do not have external websense servers; I want to use URL lists. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now it seemst that you have to check &lt;/P&gt;&lt;P&gt;Enable URL Filtering on Application Security Tab, but that tab is not visible on my Configure--&amp;gt;Firewall and ACL screen. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that this tab comes up when you set up firewall initially using Basic Firewall Wizard. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rest of my configuration is working fine and so I do not want to muck around with it because if I run wizard again it will wipe out the current setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please tell me how to enable the URL filtering for Application Security using command line interface, or instead suggest how to make the APplication Security tab visible without rerunning Firewall setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am missing something else, please let me know. I hope CISCO fixes this section of the documentation because it does not mention why the APplication Security tab is not coming up. &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104866#M396005</guid>
      <dc:creator>ciscopotion</dc:creator>
      <dc:date>2019-03-10T23:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104867#M396007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I 2nd this question. Please could we have a response?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2008 19:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104867#M396007</guid>
      <dc:creator>IM-Design</dc:creator>
      <dc:date>2008-08-12T19:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104868#M396008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am the original poster and I have not yet received a response even though I have tried other channels. I am still stuck and have not found anything with many hours of googling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will really appreciate a response, and it seems that I am not alone facing this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2008 19:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104868#M396008</guid>
      <dc:creator>ciscopotion</dc:creator>
      <dc:date>2008-08-12T19:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104869#M396011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think you have looked into the complexity of this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMHO, you need the external server to do any meaningful url blocking...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;see&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftwebsen.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftwebsen.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The local firewall filtering is more for url filtering by length, java, etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also look into the newer trend micro solution that works with IOS routers. you can find out more information at &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6643/index.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6643/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2008 19:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104869#M396011</guid>
      <dc:creator>joe19366</dc:creator>
      <dc:date>2008-08-12T19:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104870#M396014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I actually think there is a workaround to not having a server;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you look into the sample config from the first link i sent, specifically the sample config from this section;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftwebsen.html#wp1027265" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftwebsen.html#wp1027265&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think if simply want to permit/deny specific domains you can do so with this command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip urlfilter exclusive-domain permit .weapons.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip urlfilter exclusive-domain deny .nbc.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip urlfilter exclusive-domain permit &lt;A class="jive-link-custom" href="http://www.cisco.com" target="_blank"&gt;www.cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you lab this up and post back to the group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2008 19:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104870#M396014</guid>
      <dc:creator>joe19366</dc:creator>
      <dc:date>2008-08-12T19:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104871#M396016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the barrage of replies (Can only help).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For my part, I have looked at the docs for doing this from within SDM v2.5 and from CLI. The SDM docs do specify that there should be an 'Application Security' tab, but this does not seem to exist in v 2.5 with the Zone-based firewall policy configuration that I am using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I looked at he configuration that needs to be made from IOS and have applied that to my config (still no joy).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tuned on debugs and tried to visit both URLs that should have been filtered and URLs which should not have been filtered. The debugs showed nothing and no filtering was done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config has the following sections:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;parameter-map type urlfilter BL_ProjectOffice&lt;/P&gt;&lt;P&gt; audit-trail on&lt;/P&gt;&lt;P&gt; allow-mode on&lt;/P&gt;&lt;P&gt; exclusive-domain deny .danger.com&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-protocol-http&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-invalid-src&lt;/P&gt;&lt;P&gt;  drop log&lt;/P&gt;&lt;P&gt; class type inspect sdm-protocol-imap&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt;  service-policy imap sdm-action-imap&lt;/P&gt;&lt;P&gt; class type inspect sdm-protocol-pop3&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt;  service-policy pop3 sdm-action-pop3&lt;/P&gt;&lt;P&gt; class type inspect sdm-protocol-p2p&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt;  service-policy p2p sdm-action-app-p2p&lt;/P&gt;&lt;P&gt; class type inspect sdm-protocol-im&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt;  service-policy im sdm-action-app-im&lt;/P&gt;&lt;P&gt; class type inspect sdm-insp-traffic&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt; class type inspect SDM-Voice-permit&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-protocol-http&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt;  service-policy http sdm-action-app-http&lt;/P&gt;&lt;P&gt;  urlfilter BL_ProjectOffice&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  pass&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This configuration follows the guidelines laid out in the Zone-based Firewall Design guide at (&lt;A class="jive-link-custom" href="http://www.cisco.com/application/pdf/paws/98628/zone-design-guide.pdf" target="_blank"&gt;http://www.cisco.com/application/pdf/paws/98628/zone-design-guide.pdf&lt;/A&gt;) on pages 38 &amp;amp; 39.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I am stumped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2008 20:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104871#M396016</guid>
      <dc:creator>IM-Design</dc:creator>
      <dc:date>2008-08-12T20:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104872#M396021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;first if u wanna block spesific web sites(domain name , URL) &lt;/P&gt;&lt;P&gt;u need to make a regular expretion &lt;/P&gt;&lt;P&gt;know as regex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the link u have put just read how to implimit and match against regex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;according to cisco ASA regex&lt;/P&gt;&lt;P&gt;if u wanna match website do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex domainlist1 "\.yahoo\.com"&lt;/P&gt;&lt;P&gt;regex domainlist2 "\.myspace\.com"&lt;/P&gt;&lt;P&gt;regex domainlist3 "\.youtube\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just fine out it its the same with IOS firewall&lt;/P&gt;&lt;P&gt;but the idea 100%  the same&lt;/P&gt;&lt;P&gt;so the follwoing link although for ASA firewall but the idea the same so i will inculded for u here to get the idea&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt; and just be careful with ur matching&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1  right regex&lt;/P&gt;&lt;P&gt;2 right class map matching&lt;/P&gt;&lt;P&gt;3 right inspection header rquest or respons&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if u want any more assistance just post here&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please, if helpful Rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 04:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104872#M396021</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-13T04:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104873#M396024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ur config should be somthing like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type regex url1&lt;/P&gt;&lt;P&gt;pattern [\.yahoo\.com]&lt;/P&gt;&lt;P&gt;class-map type inspect http urlclass1&lt;/P&gt;&lt;P&gt;match req-resp header regex url1&lt;/P&gt;&lt;P&gt;policy-map type inspect http policy1&lt;/P&gt;&lt;P&gt;class type inspect http urlclass1&lt;/P&gt;&lt;P&gt;reset&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then apply the policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;above only example&lt;/P&gt;&lt;P&gt;u have more flexibality and i am not sure 100% from the regex pattren avove but should be like that to some extend&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 04:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104873#M396024</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-13T04:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104874#M396027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all for the replies and your patience. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can use the SDM but do not have much proficiency with the command line policy setups. I tried the command line options and feel that it is beyond my capabilities. If there is no solution through the SDM then I would probably have to reconfigure the entire thing from scratch. The SDM is what made this router an easy choice for us. We are a small business and are using this router as an alternative to the common home office router in which URL blocking is fairly easy to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that the Application Security tab if enabled in the SDM will make all this functional. I wonder if there is someone from CISCO's product support team who can suggest if App Sec tab can be enabled inside the SDM interface once the firewall has been already configured. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest that someone(if someone at Cisco is browsing this) to make a note of this issue, because the fact that the application security tab only shows up through the wizard configuration process is something that is not mentioned anywhere and completely throws you off (as in my case where I was trying to mimic the previous router's settings to this zone policy environment and hence did not go through the wizard.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 11:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104874#M396027</guid>
      <dc:creator>ciscopotion</dc:creator>
      <dc:date>2008-08-13T11:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104875#M396030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ciscopotion,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree wholheartedly and am looking for the same guidance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Aug 2008 12:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/url-filtering/m-p/1104875#M396030</guid>
      <dc:creator>IM-Design</dc:creator>
      <dc:date>2008-08-13T12:49:49Z</dc:date>
    </item>
  </channel>
</rss>

