<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA and BASIC URL filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621151#M1036270</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any way to do this using URL's/URI's rather than IP's? with the multiple IP setup that many websites have, blocking by IP becomes rather cumbersome rather quickly. Thanks&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;Israel Brewster&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Dec 2006 19:43:21 GMT</pubDate>
    <dc:creator>ibrewster</dc:creator>
    <dc:date>2006-12-05T19:43:21Z</dc:date>
    <item>
      <title>ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621148#M1036267</link>
      <description>&lt;P&gt;I did a quick search, and found some related threads, but nothing that really definitively answered my question. My organization needs to do some BASIC URL filtering- just block a couple of websites such as myspace.com and the like-obviously, for something like this, we don't need the cost or complexity of commercial solutions such as a websense server. My question for the group is is there a way to set up an ASA 5510 for this type of basic filtering? If not, as what I have seen would appear to imply, might someone have a suggestion for some other, preferably free, solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a related note, if this is not possible with the ASA, then what exactly does the service policy and associated HTTP Inspection map section of the ASA do (not the filter, but the service policy)? The documentation I have been able to find has just left me confused- it would seem to be geared towards people who already know what the feature is/does, and just want to know how to set it up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any assistance anyone can provide&lt;/P&gt;&lt;P&gt;--------&lt;/P&gt;&lt;P&gt;Israel Brewster&lt;/P&gt;&lt;P&gt;Computer support Technician&lt;/P&gt;&lt;P&gt;Frontier Flying Service&lt;/P&gt;&lt;P&gt;Fairbanks, AK&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621148#M1036267</guid>
      <dc:creator>gpedretty</dc:creator>
      <dc:date>2019-03-11T09:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621149#M1036268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can use the shun command or a class map. The only issue is you will need to lookup the ip address for the sites and block them or block the sub-net if you can find there block on arin.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shun example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shun x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Class-map example:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080624e19.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080624e19.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 03:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621149#M1036268</guid>
      <dc:creator>mike.neilson</dc:creator>
      <dc:date>2006-11-29T03:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621150#M1036269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that worked, although it would appear that the shun command is not saved across restarts. This is easily worked around, however, by blocking the IP's in the firewall rather than with the shun command. This method does, of course, have the caveat that you need to track down all the IP's for the problem site- I take it there is no way to do this by blocking the URL without needing some commercial product? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 20:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621150#M1036269</guid>
      <dc:creator>gpedretty</dc:creator>
      <dc:date>2006-11-29T20:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621151#M1036270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any way to do this using URL's/URI's rather than IP's? with the multiple IP setup that many websites have, blocking by IP becomes rather cumbersome rather quickly. Thanks&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;Israel Brewster&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2006 19:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621151#M1036270</guid>
      <dc:creator>ibrewster</dc:creator>
      <dc:date>2006-12-05T19:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621152#M1036271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Am I to assume from the lack of response that what I want to do isn't possible? What if we were to get one of the add-on cards for the ASA- could we do this sort of thing then? I guess what this boils down to is what is the cheapest/easiest way to filter traffic based on the URL rather than the IP, preferably without having to add more hardware/software to our network. I'd appreciate any feedback on the subject. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 03:51:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621152#M1036271</guid>
      <dc:creator>ibrewster</dc:creator>
      <dc:date>2006-12-21T03:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621153#M1036272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also the same predicament. I am currently working on a ASA5520 with CSC SSM on it. Im trying to test URL blocking, but Im not sucessful. Is it absolutely necessary to have Websense or N2H2 to successfully filter or block URLs? I want to know if ASA CSC SSM can to the URL blocking by itself. Is there somebody in Cisco who can give us a definitive answer about the CSC? I tried to read the "Online HELP" but does not seem to give any help at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lorenz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 06:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621153#M1036272</guid>
      <dc:creator>l.tating</dc:creator>
      <dc:date>2006-12-21T06:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621154#M1036273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think you can so this with the ASA in solo. I would recommend an alternative- why not install a 'free' Squid-based proxy server? This will give you much more control, reporting, caching even, if needed. I wouldn't feel comfortable with having all my internal clients pointing straight at my firewall, in any case. I believe the latest version of ASA code also supports WCCP (as I believe Squid does- though I haven't tried it), so you can make this a semi-transparent proxy without setting up proxy config on the workstations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gary &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2006 11:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621154#M1036273</guid>
      <dc:creator>0r8it</dc:creator>
      <dc:date>2006-12-22T11:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621155#M1036274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two options that you can use on the CSC-SSM, both do require the use of the Plus license.&lt;/P&gt;&lt;P&gt;First if you only want to block a few sites by name, ie. myspace.com, you can use the URL Blocking portion of CSC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other method would be to use URL Filtering, this is a service on the CSC that will allow categorization of websites from TrendLabs and allow an administrator to allow or block web pages based on category, similar to Websense/N2H2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have this configured and it is not blocking, you should check first that you have URL Blocking/Filtering enabled and second that you have a security policy setup correctly to forward web traffic to the CSC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to do that you would create a class-map that matches www and then create a policy-map that enables CSC scanning and then tie the policy to either an interface or the global configuration.  A simple CLI configuration of this is below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map www-class&lt;/P&gt;&lt;P&gt; match port tcp eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map outside_policy&lt;/P&gt;&lt;P&gt;class www-class&lt;/P&gt;&lt;P&gt; csc fail-open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy outside_policy interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2006 22:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621155#M1036274</guid>
      <dc:creator>ryan_holland</dc:creator>
      <dc:date>2006-12-22T22:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621156#M1036275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I too have been looking for a "cheep" way to block just myspace utube just the basic non work sites.  funny thing is the simplist way i found (i regret to admit on cisco site) i put the one guy who can't stay away from myspace behind a $20 netgear and told it to block the keyword myspace.   he can't even search for it on google.   no why can't a pix do what a $20 netgear does?  ofcourse the $20 netgear can't do what the pix does.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just a strange senerio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2007 01:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621156#M1036275</guid>
      <dc:creator>sdesteuben</dc:creator>
      <dc:date>2007-07-05T01:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621157#M1036276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi dear&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;even you can use the DNS to resolve the IP address for the particular site after that make a access list to block the IPS.It is the very cheap and best solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shivlu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2007 03:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621157#M1036276</guid>
      <dc:creator>shivlu jain</dc:creator>
      <dc:date>2007-07-05T03:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621158#M1036277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is pretty trivial to block myspace and youtube for example. Just ping &lt;A class="jive-link-custom" href="http://www.myspace.com" target="_blank"&gt;http://www.myspace.com&lt;/A&gt; and &lt;A class="jive-link-custom" href="http://www.youtube.com" target="_blank"&gt;http://www.youtube.com&lt;/A&gt; and you will get the IP address for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for &lt;A class="jive-link-custom" href="http://www.myspace.com" target="_blank"&gt;http://www.myspace.com&lt;/A&gt; you get 216.178.38.130&lt;/P&gt;&lt;P&gt;then you go to &lt;A class="jive-link-custom" href="http://www.arin.net" target="_blank"&gt;http://www.arin.net&lt;/A&gt; and plug in that IP address and arin will spit out the CIDR for that range. 216.178.32.0/20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and just create an object group called bannedsites, stick the ip CIDRs of areas you want to block in the object group then create an ACL using the object group that blocks traffic outbound to those networks from the inside interface out (PIX by default allows all traffic from the inside out) Just do not forget to put a permit any any at the end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can even turn on logging to log who is attempting to access those sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jul 2007 02:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621158#M1036277</guid>
      <dc:creator>bhorta</dc:creator>
      <dc:date>2007-07-08T02:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621159#M1036278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which is exactly what I have ended up doing, it's just not as nice or easy as simply saying "block myspace.com" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 14:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621159#M1036278</guid>
      <dc:creator>ibrewster</dc:creator>
      <dc:date>2007-07-09T14:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621160#M1036279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How did you do it?  I tried it and was still able to nav to myspace and youtube.  If you can please let me know.  I used the ASDM to configure the rule.  Was that my mistake?  Thank you in advance for all you help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Josiah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2007 18:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621160#M1036279</guid>
      <dc:creator>scc_fwnaps</dc:creator>
      <dc:date>2007-09-07T18:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621161#M1036280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I used ASDM as well, so it should work just fine. For MySpace I ended up blocking 216.178.32.0 with a netmask of 255.255.240.0. this was determined by pinging &lt;A class="jive-link-custom" href="http://www.myspace.com," target="_blank"&gt;www.myspace.com,&lt;/A&gt; taking the ip address that gives me, and then running a whois on that IP (i.e. whois 216.178.38.104) - the value you are looking for is the CIDR or NetRange. In ASDM, i then set up a rule to deny incoming on the inside interface from all to the previously determined net range, protocol ip. This has worked for me so far with all sites I have tried to block.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2007 19:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621161#M1036280</guid>
      <dc:creator>ibrewster</dc:creator>
      <dc:date>2007-09-07T19:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621162#M1036282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sweet, worked for me from ASDM.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Dec 2007 15:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621162#M1036282</guid>
      <dc:creator>sarah.doyle</dc:creator>
      <dc:date>2007-12-20T15:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and BASIC URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621163#M1036284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes it is working sucessfuly for my asa 5505&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2008 11:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-basic-url-filtering/m-p/621163#M1036284</guid>
      <dc:creator>kamran.cisco</dc:creator>
      <dc:date>2008-01-02T11:06:06Z</dc:date>
    </item>
  </channel>
</rss>

