<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I wasn't referring to your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498925#M236224</link>
    <description>&lt;P&gt;I wasn't referring to your post at any point in time. &amp;nbsp;I was describing my own using half baked web webfiltering using DNS and ACLs as crappy and non-scalable.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jul 2014 11:07:01 GMT</pubDate>
    <dc:creator>kevin_giusti</dc:creator>
    <dc:date>2014-07-25T11:07:01Z</dc:date>
    <item>
      <title>Blocking FB using ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498920#M236216</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to block facebook (http and https) using ASA firewall (without CSC)? I know that http can be blocked by blocking traffic going out to FB addresses, but how about https?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498920#M236216</guid>
      <dc:creator>network_user</dc:creator>
      <dc:date>2019-03-12T04:32:01Z</dc:date>
    </item>
    <item>
      <title>I know this is not the answer</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498921#M236217</link>
      <description>&lt;P&gt;I know this is not the answer that you're looking for but better to use a dedicated cheap web filtering solution. Although you can block http destinations by addresses in a firewall, it is not flexible enough. Whenever a new address for that destination comes into life, you must manually add it in your blocking list. And whenever an old address for that destination dies, you must manually remove it from your blocking list. The result is "Headache".&lt;/P&gt;&lt;P&gt;On the other hand, you only need a single check box beside the "Social Networking" category in the web filter.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My personal experience is to avoid firewalls when it comes to blocking "Web Sites" because they are headache in that matter.&lt;/P&gt;&lt;P&gt;Just my 2 cents.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 16:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498921#M236217</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-24T16:42:39Z</dc:date>
    </item>
    <item>
      <title>It's a REALLY crappy/non</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498922#M236221</link>
      <description>&lt;P&gt;It's a REALLY crappy/non-scalable solution but you could do something like this using DNS names and ACLs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;name-server 4.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;object network &lt;A href="https://community.cisco.com/www.pandora.com" target="_blank"&gt;www.pandora.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;fqdn &lt;A href="https://community.cisco.com/www.pandora.com" target="_blank"&gt;www.pandora.com&lt;/A&gt;&lt;BR /&gt;object network &lt;A href="https://community.cisco.com/www.netflix.com" target="_blank"&gt;www.netflix.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;fqdn www.netflix.com&lt;/P&gt;&lt;P&gt;object-group network Blocked-Websites&lt;BR /&gt;&amp;nbsp;network-object object &lt;A href="https://community.cisco.com/www.pandora.com" target="_blank"&gt;www.pandora.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;network-object object &lt;A href="https://community.cisco.com/www.netflix.com" target="_blank"&gt;www.netflix.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#create DHCP reservations or set static IPs for users/servers that will not be filtered.&lt;BR /&gt;&amp;nbsp;object-group network Unfiltered-Users&lt;BR /&gt;&amp;nbsp;network-object host 192.168.10.5&lt;BR /&gt;&amp;nbsp;network-object host 192.168.10.6&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip object-group Unfiltered-Users any&amp;nbsp;&lt;BR /&gt;access-list inside extended deny ip any object-group Blocked-Websites&amp;nbsp;&lt;BR /&gt;access-list inside extended permit ip any any&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 01:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498922#M236221</guid>
      <dc:creator>kevin_giusti</dc:creator>
      <dc:date>2014-07-25T01:04:13Z</dc:date>
    </item>
    <item>
      <title>Well, be my guest to MANUALLY</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498923#M236222</link>
      <description>&lt;P&gt;Well, be my guest to MANUALLY add a web site every time you want to block something in your blocked websites object group. Is this the scalability you want? .. What if there is an exception and couple of users from subnet X asks you to open Netflix and block it for the rest of subnets? Do you have the scalability in the ASA to do this? Can't you see the amount of configurations you even added to the ASA just because to block certain web sites? Can't you see that i respectfully mentioned that my answer may be not the answer that you're looking for?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Respect others' opinions or Get lost.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 01:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498923#M236222</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-25T01:55:04Z</dc:date>
    </item>
    <item>
      <title>Hi, You cannot do much to</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498924#M236223</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You cannot do much to block in asa... whatever the fqdn al will not block effectively....... it can be accessible via the leakage... in one of my client location we have identified the FB subnet range for that location and we have blocked the entire range...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;say we have blocked 173.252.110.0/24 and so on whatever we have observed as the FB Subnets....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in this case if they use extended URL's are also they wont get web page accessible at any cost....&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 10:09:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498924#M236223</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-25T10:09:08Z</dc:date>
    </item>
    <item>
      <title>I wasn't referring to your</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498925#M236224</link>
      <description>&lt;P&gt;I wasn't referring to your post at any point in time. &amp;nbsp;I was describing my own using half baked web webfiltering using DNS and ACLs as crappy and non-scalable.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 11:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498925#M236224</guid>
      <dc:creator>kevin_giusti</dc:creator>
      <dc:date>2014-07-25T11:07:01Z</dc:date>
    </item>
    <item>
      <title>OMG lol, i am so sorry kevin</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498926#M236225</link>
      <description>&lt;P&gt;OMG lol, i am so sorry kevin &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 12:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498926#M236225</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-25T12:38:25Z</dc:date>
    </item>
    <item>
      <title>Haha, no worries</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498927#M236226</link>
      <description>&lt;P&gt;Haha, no worries&lt;/P&gt;</description>
      <pubDate>Fri, 01 Aug 2014 11:21:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498927#M236226</guid>
      <dc:creator>kevin_giusti</dc:creator>
      <dc:date>2014-08-01T11:21:43Z</dc:date>
    </item>
    <item>
      <title>CX/Sourcefire is the answer</title>
      <link>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498928#M236233</link>
      <description>&lt;P&gt;CX/Sourcefire is the answer to your troubles &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Or a web filtering engine as suggested above.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2014 05:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-fb-using-asa/m-p/2498928#M236233</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-08-02T05:56:36Z</dc:date>
    </item>
  </channel>
</rss>

