<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,if i am not wrong , I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701132#M190937</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;if i am not wrong , I think only the HTTPS Websites are working for you ?&lt;/P&gt;&lt;P&gt;Can you remove these REGEX and attached classes and see of this resolves the issue:-&lt;/P&gt;&lt;P&gt;regex contenttype "Content-Type"&lt;BR /&gt;regex applicationheader "application/.*"&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
    <pubDate>Sat, 06 Jun 2015 02:15:42 GMT</pubDate>
    <dc:creator>Vibhor Amrodia</dc:creator>
    <dc:date>2015-06-06T02:15:42Z</dc:date>
    <item>
      <title>Issue with blocking one site on ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701131#M190936</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to block a Web page, I have followed this guide. &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100513-ASARegexp.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100513-ASARegexp.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But unfortunately that blocks (almost)&amp;nbsp;all web pages. What I mean with almost all is that I´ve tried to access quite many webpages, none works except google.com for some reason.&lt;BR /&gt;I have gone through the guide many times and double-checked the settings, I have also checked that regxp is correct by running the test function.&lt;/P&gt;&lt;P&gt;For testing purposes I´ve tried to block this webpage &lt;STRONG&gt;regex domainlist1 "\.op\.se"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have tried to only set DomainBlockClass in the http_inspection_policy, just to be sure that none of the BlockURLClass or AppHeaderClass would interfere.&lt;/P&gt;&lt;P&gt;This is part of the configuration, I have bolded the MPF part.&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.0(1)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname gbgASA&lt;BR /&gt;enable password xxxxx encrypted&lt;BR /&gt;passwd xxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool anyVPNPool 10.10.10.10-10.10.10.50 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.50.3 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside-telia&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address xxxxx 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;regex urllist1 ".*\.([Ee][Xx][Ee]|[Cc][Oo][Mm]|[Bb][Aa][Tt]) HTTP/1.[01]"&lt;BR /&gt;regex urllist2 ".*\.([Pp][Ii][Ff]|[Vv][Bb][Ss]|[Ww][Ss][Hh]) HTTP/1.[01]"&lt;BR /&gt;regex urllist3 ".*\.([Dd][Oo][Cc]|[Xx][Ll][Ss]|[Pp][Pp][Tt]) HTTP/1.[01]"&lt;BR /&gt;regex urllist4 ".*\.([Zz][Ii][Pp]|[Tt][Aa][Rr]|[Tt][Gg][Zz]) HTTP/1.[01]"&lt;BR /&gt;regex domainlist1 "\.op\.se"&lt;BR /&gt;regex contenttype "Content-Type"&lt;BR /&gt;regex applicationheader "application/.*"&lt;/STRONG&gt;&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service httpgrp tcp&lt;BR /&gt;&amp;nbsp;port-object eq 8080&lt;/STRONG&gt;&lt;BR /&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_3 any4 any inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit gre any any inactive&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;access-list inside_mpc extended permit object http any any &amp;nbsp;&lt;BR /&gt;access-list inside_mpc extended permit tcp any any object-group httpgrp&lt;/STRONG&gt; &amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside-telia 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside-telia) dynamic interface&lt;BR /&gt;object network vpn_nat_outside&lt;BR /&gt;&amp;nbsp;nat (any,outside-telia) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside-telia_access_in in interface outside-telia&lt;BR /&gt;route outside-telia 0.0.0.0 0.0.0.0 194.237.1.57 128&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.50.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.42.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside-telia&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 193.228.143.12 source outside-telia prefer&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;&lt;STRONG&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map type regex match-any DomainBlockList&lt;BR /&gt;&amp;nbsp;match regex domainlist1&lt;BR /&gt;class-map type regex match-any URLBlockList&lt;BR /&gt;&amp;nbsp;match regex urllist3&lt;BR /&gt;&amp;nbsp;match regex urllist4&lt;BR /&gt;&amp;nbsp;match regex urllist1&lt;BR /&gt;&amp;nbsp;match regex urllist2&lt;BR /&gt;class-map type inspect http match-all BlockURLClass&lt;BR /&gt;&amp;nbsp;match request uri regex class URLBlockList&lt;BR /&gt;class-map type inspect http match-all asdm_medium_security_methods&lt;BR /&gt;&amp;nbsp;match not request method post&lt;BR /&gt;&amp;nbsp;match not request method get&lt;BR /&gt;&amp;nbsp;match not request method head&lt;BR /&gt;class-map type inspect http match-all BlockDomainClass&lt;BR /&gt;&amp;nbsp;match request header host regex class DomainBlockList&lt;BR /&gt;class-map type inspect http match-all AppHeaderClass&lt;BR /&gt;&amp;nbsp;match request header regex contenttype regex applicationheader&lt;BR /&gt;class-map type inspect http match-all asdm_high_security_methods&lt;BR /&gt;&amp;nbsp;match not request method get&lt;BR /&gt;&amp;nbsp;match not request method head&lt;BR /&gt;class-map httptraffic&lt;BR /&gt;&amp;nbsp;match access-list inside_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http http_inspection_policy&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt;&amp;nbsp;match request method connect&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;&amp;nbsp;class BlockURLClass&lt;BR /&gt;&amp;nbsp; reset log&lt;BR /&gt;&amp;nbsp;class AppHeaderClass&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;&amp;nbsp;class BlockDomainClass&lt;BR /&gt;&amp;nbsp; reset log&lt;/STRONG&gt;&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect pptp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect dns&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp error&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect http&amp;nbsp;&lt;BR /&gt;policy-map inside-policy&lt;BR /&gt;&amp;nbsp;class httptraffic&lt;BR /&gt;&amp;nbsp; inspect http http_inspection_policy&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;service-policy inside-policy interface inside&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Patrik&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701131#M190936</guid>
      <dc:creator>patrikandreasson</dc:creator>
      <dc:date>2019-03-12T06:03:21Z</dc:date>
    </item>
    <item>
      <title>Hi,if i am not wrong , I</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701132#M190937</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;if i am not wrong , I think only the HTTPS Websites are working for you ?&lt;/P&gt;&lt;P&gt;Can you remove these REGEX and attached classes and see of this resolves the issue:-&lt;/P&gt;&lt;P&gt;regex contenttype "Content-Type"&lt;BR /&gt;regex applicationheader "application/.*"&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jun 2015 02:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701132#M190937</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-06-06T02:15:42Z</dc:date>
    </item>
    <item>
      <title>Hi and thanks for replying</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701133#M190938</link>
      <description>&lt;P&gt;Hi and thanks for replying.&lt;/P&gt;&lt;P&gt;Yes, you were correct, it´s https that are working.&lt;BR /&gt;I tried removing these&lt;BR /&gt;regex urllist1 ".*\.([Ee][Xx][Ee]|[Cc][Oo][Mm]|[Bb][Aa][Tt]) HTTP/1.[01]"&lt;BR /&gt;regex urllist2 ".*\.([Pp][Ii][Ff]|[Vv][Bb][Ss]|[Ww][Ss][Hh]) HTTP/1.[01]"&lt;BR /&gt;regex urllist3 ".*\.([Dd][Oo][Cc]|[Xx][Ll][Ss]|[Pp][Pp][Tt]) HTTP/1.[01]"&lt;BR /&gt;regex urllist4 ".*\.([Zz][Ii][Pp]|[Tt][Aa][Rr]|[Tt][Gg][Zz]) HTTP/1.[01]"&lt;BR /&gt;regex contenttype "Content-Type"&lt;BR /&gt;regex applicationheader "application/.*"&lt;/P&gt;&lt;P&gt;But it made no difference&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2015 07:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701133#M190938</guid>
      <dc:creator>patrikandreasson</dc:creator>
      <dc:date>2015-06-08T07:37:11Z</dc:date>
    </item>
    <item>
      <title>Hi,try to remove this Policy</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701134#M190939</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;try to remove this Policy itself and see if this works:-&lt;/P&gt;&lt;P&gt;no service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2015 14:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701134#M190939</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-06-08T14:14:55Z</dc:date>
    </item>
    <item>
      <title>But if I remove that service</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701135#M190940</link>
      <description>&lt;P&gt;But if I remove that service policy rule I will at the same time remove http_inspection_policy which contains the Domain Class to block &lt;A href="https://community.cisco.com/www.op.se." target="_blank"&gt;www.op.se.&lt;/A&gt;&lt;BR /&gt;If I may ask, what do you want to achieve by removing that rule?&lt;/P&gt;&lt;P&gt;Or am I missing something &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2015 11:27:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-blocking-one-site-on-asa/m-p/2701135#M190940</guid>
      <dc:creator>patrikandreasson</dc:creator>
      <dc:date>2015-06-09T11:27:05Z</dc:date>
    </item>
  </channel>
</rss>

