<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 url filter issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928016#M156932</link>
    <description>&lt;P&gt;Please help me get this URL&amp;nbsp;filter that uses class-maps work. I am connected to the firewall port e0/1 via a non-managed dlink switch. The firewall is connected to ISP router via its e0/0 port. ISP router port the firewall connects to (gateway) is 192.168.109.1. The intention is to drop all connections that match the URLs. Below is the present configuration...(I have scrambled some of the regular expressions)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 8.2(4)4&lt;BR /&gt;!&lt;BR /&gt;firewall transparent&lt;BR /&gt;hostname R&lt;/P&gt;
&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;regex domainlist1 "\.facebook\.com"&lt;BR /&gt;regex domainlist2 "\.youtube\.com"&lt;BR /&gt;regex domainlist3 "\.aaaaaaa\.com"&lt;BR /&gt;regex domainlist4 "\.jjjjjjj\.com"&lt;BR /&gt;regex domainlist5 "\.bbbbbb\.co\.ke"&lt;BR /&gt;regex domainlist6 "\.uuuuuu\.com"&lt;BR /&gt;regex domainlist7 "\.uuuuuu\.com"&lt;BR /&gt;boot system disk0:/asa824-4-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group network SUPER_USERS&lt;BR /&gt; network-object 192.168.109.128 255.255.255.192&lt;BR /&gt;access-list LIMIT_TRAFFIC extended deny tcp object-group SUPER_USERS any eq www&lt;BR /&gt;access-list LIMIT_TRAFFIC extended permit tcp any any eq www&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip address 192.168.109.6 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.109.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.109.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.109.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd option 3 ip 192.168.109.1&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.109.36-192.168.109.126 inside&lt;BR /&gt;dhcpd dns 212.22.161.2 212.22.161.3 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map block_users&lt;BR /&gt; match access-list LIMIT_TRAFFIC&lt;BR /&gt;class-map type inspect http match-any blocked_class&lt;BR /&gt; match request header host regex domainlist1&lt;BR /&gt; match request header host regex domainlist2&lt;BR /&gt; match request header host regex domainlist3&lt;BR /&gt; match request header host regex domainlist4&lt;BR /&gt; match request header host regex domainlist5&lt;BR /&gt; match request header host regex domainlist6&lt;BR /&gt; match request header host regex domainlist7&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map type inspect http block_policy&lt;BR /&gt; parameters&lt;BR /&gt; class blocked_class&lt;BR /&gt; drop-connection log&lt;BR /&gt;policy-map block_users_policy&lt;BR /&gt; class block_users&lt;BR /&gt; inspect http block_policy&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy block_users_policy interface inside&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:2aac2b3cd1cf71199ff47c9b1956ac4c&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:01:50 GMT</pubDate>
    <dc:creator>lawrencekm04</dc:creator>
    <dc:date>2019-03-12T08:01:50Z</dc:date>
    <item>
      <title>ASA 5505 url filter issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928016#M156932</link>
      <description>&lt;P&gt;Please help me get this URL&amp;nbsp;filter that uses class-maps work. I am connected to the firewall port e0/1 via a non-managed dlink switch. The firewall is connected to ISP router via its e0/0 port. ISP router port the firewall connects to (gateway) is 192.168.109.1. The intention is to drop all connections that match the URLs. Below is the present configuration...(I have scrambled some of the regular expressions)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 8.2(4)4&lt;BR /&gt;!&lt;BR /&gt;firewall transparent&lt;BR /&gt;hostname R&lt;/P&gt;
&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;regex domainlist1 "\.facebook\.com"&lt;BR /&gt;regex domainlist2 "\.youtube\.com"&lt;BR /&gt;regex domainlist3 "\.aaaaaaa\.com"&lt;BR /&gt;regex domainlist4 "\.jjjjjjj\.com"&lt;BR /&gt;regex domainlist5 "\.bbbbbb\.co\.ke"&lt;BR /&gt;regex domainlist6 "\.uuuuuu\.com"&lt;BR /&gt;regex domainlist7 "\.uuuuuu\.com"&lt;BR /&gt;boot system disk0:/asa824-4-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group network SUPER_USERS&lt;BR /&gt; network-object 192.168.109.128 255.255.255.192&lt;BR /&gt;access-list LIMIT_TRAFFIC extended deny tcp object-group SUPER_USERS any eq www&lt;BR /&gt;access-list LIMIT_TRAFFIC extended permit tcp any any eq www&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip address 192.168.109.6 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.109.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.109.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.109.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd option 3 ip 192.168.109.1&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.109.36-192.168.109.126 inside&lt;BR /&gt;dhcpd dns 212.22.161.2 212.22.161.3 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map block_users&lt;BR /&gt; match access-list LIMIT_TRAFFIC&lt;BR /&gt;class-map type inspect http match-any blocked_class&lt;BR /&gt; match request header host regex domainlist1&lt;BR /&gt; match request header host regex domainlist2&lt;BR /&gt; match request header host regex domainlist3&lt;BR /&gt; match request header host regex domainlist4&lt;BR /&gt; match request header host regex domainlist5&lt;BR /&gt; match request header host regex domainlist6&lt;BR /&gt; match request header host regex domainlist7&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map type inspect http block_policy&lt;BR /&gt; parameters&lt;BR /&gt; class blocked_class&lt;BR /&gt; drop-connection log&lt;BR /&gt;policy-map block_users_policy&lt;BR /&gt; class block_users&lt;BR /&gt; inspect http block_policy&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy block_users_policy interface inside&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:2aac2b3cd1cf71199ff47c9b1956ac4c&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928016#M156932</guid>
      <dc:creator>lawrencekm04</dc:creator>
      <dc:date>2019-03-12T08:01:50Z</dc:date>
    </item>
    <item>
      <title>I hate using that method, it</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928017#M156936</link>
      <description>&lt;P&gt;I hate using that method, it is always so painful. &amp;nbsp;I prefer to use DNS inspection instead. &amp;nbsp;Below is an example for one domain. &amp;nbsp;This blocks the actual DNS request, so works for http, https, ftp - everything. &amp;nbsp;Note that you will need to clear your DNS cache if you have already done the DNS lookup before putting this code in place.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;regex domain_logmein.com “\.logmein\.com” &lt;BR /&gt;! &lt;BR /&gt;class-map type regex match-any DomainBlockList &lt;BR /&gt;&amp;nbsp;description Blocked Domains &lt;BR /&gt;&amp;nbsp; match regex domain_logmein.com &lt;BR /&gt;! &lt;BR /&gt;policy-map type inspect dns PM-DNS-inspect &lt;BR /&gt;&amp;nbsp;parameters &lt;BR /&gt;&amp;nbsp; match domain-name regex class DomainBlockList &lt;BR /&gt;&amp;nbsp; drop-connection log &lt;BR /&gt;! &lt;BR /&gt;policy-map global_policy &lt;BR /&gt;&amp;nbsp;class inspection_default &lt;BR /&gt;&amp;nbsp; &amp;nbsp;inspect dns PM-DNS-inspect &lt;BR /&gt;! &lt;BR /&gt;service-policy global_policy global &lt;/PRE&gt;</description>
      <pubDate>Sat, 16 Jul 2016 21:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928017#M156936</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-07-16T21:21:24Z</dc:date>
    </item>
    <item>
      <title>Wow, thanks Philip for your</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928018#M156938</link>
      <description>&lt;P&gt;Wow, thanks Philip for your response. I will try this first thing tomorrow morning and let you know how it will work. I appreciate your advice!&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jul 2016 16:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928018#M156938</guid>
      <dc:creator>lawrencekm04</dc:creator>
      <dc:date>2016-07-17T16:54:23Z</dc:date>
    </item>
    <item>
      <title>Thanks Philip. It worked like</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928019#M156940</link>
      <description>&lt;P&gt;Thanks Philip. It worked like magic!&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 12:30:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928019#M156940</guid>
      <dc:creator>lawrencekm04</dc:creator>
      <dc:date>2016-07-18T12:30:15Z</dc:date>
    </item>
    <item>
      <title>It would be great if you</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928020#M156942</link>
      <description>&lt;P&gt;It would be great if you could rate and mark helpful responses.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 16:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928020#M156942</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-07-18T16:09:19Z</dc:date>
    </item>
    <item>
      <title>already did! thanks again.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928021#M156943</link>
      <description>&lt;P&gt;already did! thanks again.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 13:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-url-filter-issue/m-p/2928021#M156943</guid>
      <dc:creator>lawrencekm04</dc:creator>
      <dc:date>2016-07-20T13:58:17Z</dc:date>
    </item>
  </channel>
</rss>

