<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block IP range on ASA 5510 (version 8.3) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189128#M360782</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you must use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regex with HTTP inspection or DNS inspection&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example blocking facebook via HTTP inspection &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex block_url facebook.com&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;access-list TEST extended permit tcp any any eq www (modify this to match&lt;/P&gt;&lt;P&gt;the subnet)&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any block_url&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;match regex block_url&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;class-map http-80&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;match access-list TEST&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http block_url_facebook&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;match request header host regex class block_url&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt; drop-connection log&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;class http-80&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt; inspect http block_url_facebook&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Or an ACL with FQDN...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://blog.networkbits.es/?p=507"&gt;http://blog.networkbits.es/?p=507&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That basically would be your options on this scenario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Mar 2013 03:21:54 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-03-05T03:21:54Z</dc:date>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189124#M360775</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I don't know how to config on my ip range (192.168.172.0/24).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt; background: white;"&gt;&lt;STRONG&gt;object network FULL-IP-INTERNET "&lt;SPAN style="color: #993300;"&gt;(allow full internet)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt; background: white;"&gt;&lt;STRONG&gt;range 192.168.172.1 192.168.172.20&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt; background: white;"&gt;&lt;STRONG&gt;NAT (inside,outside) ...&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt; background: white;"&gt;&lt;STRONG&gt;Access-list ....&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: white;"&gt;&lt;STRONG&gt;object network DENY-IP-INTERNET "&lt;SPAN style="color: #ff6600;"&gt;(limited internet)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: white;"&gt;&lt;STRONG&gt;range 192.168.172.21 192.168.172.254&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: white;"&gt;&lt;STRONG&gt;NAT (inside,outside) ...&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: white;"&gt;&lt;STRONG&gt;Access-list ....&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; Help me to complete configuration!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189124#M360775</guid>
      <dc:creator>jerrybu01</dc:creator>
      <dc:date>2019-03-12T01:09:48Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189125#M360777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; What do you mean by "limited internet"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have just one nat rule for the entire subnet and then just use acl to limit the resources they can access or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189125#M360777</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-05T03:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189126#M360779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nguyen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all&amp;nbsp; what would be the traffic you want to restrict from the Deny_IP_Internet group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say you will only allow TCP port 80 traffic from that group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_in permit ip object FULL-IP-INTERNET any&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list Inside_in permit tcp object DENY-IP-INTERNET any eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list Inside_in deny ip&amp;nbsp; object DENY-IP-INTERNET any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Inside_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189126#M360779</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-05T03:12:57Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189127#M360781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"limited internet" mean the ip range (&lt;STRONG style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;range 192.168.172.21 192.168.172.254) &lt;/STRONG&gt;&lt;STRONG style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;don't access full internet, they can access some website like&lt;/STRONG&gt;&lt;STRONG style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt; "&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/"&gt;https://supportforums.cisco.com&lt;/A&gt;&lt;SPAN&gt;", email&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189127#M360781</guid>
      <dc:creator>jerrybu01</dc:creator>
      <dc:date>2013-03-05T03:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189128#M360782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you must use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regex with HTTP inspection or DNS inspection&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example blocking facebook via HTTP inspection &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex block_url facebook.com&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;access-list TEST extended permit tcp any any eq www (modify this to match&lt;/P&gt;&lt;P&gt;the subnet)&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any block_url&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;match regex block_url&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;class-map http-80&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;match access-list TEST&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http block_url_facebook&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;match request header host regex class block_url&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt; drop-connection log&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;class http-80&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 17px; color: #2a2a2a; font-family: 'Segoe UI', Tahoma, Verdana, Arial, sans-serif; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt; inspect http block_url_facebook&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Or an ACL with FQDN...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://blog.networkbits.es/?p=507"&gt;http://blog.networkbits.es/?p=507&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That basically would be your options on this scenario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189128#M360782</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-05T03:21:54Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189129#M360786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; You can use only one nat statement for the whole subnet and use acls to limit the traffic the addresses in that range can send/receive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to allow/permit some websites, you can use URL filtering. The email thing can be done with just acls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189129#M360786</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-05T03:24:21Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189130#M360787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jcarvaja,&lt;/P&gt;&lt;P&gt;If i want to block many webpages i create a lot of lines, it's not ok.&lt;/P&gt;&lt;P&gt;I mean, whitelist &amp;lt;&lt;BLACKLIST&gt;&lt;/BLACKLIST&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:28:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189130#M360787</guid>
      <dc:creator>jerrybu01</dc:creator>
      <dc:date>2013-03-05T03:28:48Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189131#M360789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Get a webfilter, HTTP proxy or a CSC module for the asa.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189131#M360789</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-05T03:30:41Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189132#M360792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have many options to filter HTTP/HTTPS traffic on an ASA .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not want do do it manually as I said before then you can use the CSC module , a websense server, the scansafe services, the botnet whitelist/blacklist option &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean it's all up to you....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 03:32:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189132#M360792</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-05T03:32:04Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189133#M360793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello jcarvaja,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)# object network FULL-IP-INTERNET&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config-network-object)# range 192.168.172.1 192.168.172.20 &lt;/P&gt;&lt;P&gt;ASA5510(config-network-object)# nat (inside,outside) &lt;SPAN style="font-size: 10pt;"&gt;source dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)# access-list inside_in permit ip object FULL-IP-INTERNET any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)# object network DENY-IP-INTERNET&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ASA5510(config-network-object)# range 192.168.172.21 192.168.172.254&lt;/P&gt;&lt;P&gt;ASA5510(config-network-object)# nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)#&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;access-list Inside_in permit tcp object DENY-IP-INTERNET any eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)#a&lt;SPAN style="background-color: white; font-size: 10pt;"&gt;ccess-list inside_access_out permit tcp any any eq 25&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)#a&lt;SPAN style="background-color: white; font-size: 10pt;"&gt;ccess-list inside_access_out permit tcp any any eq 110&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)#&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;access-list Inside_in deny ip&amp;nbsp; object DENY-IP-INTERNET any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510(config)#&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;access-group Inside_in in interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this right?&lt;/P&gt;&lt;P&gt;Additional, i want IPs in&lt;SPAN style="font-size: 10pt;"&gt;"DENY-IP-INTERNET" zone&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; to open 2 webpages like: cisco.com, flpvn.com. How can i config them?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 04:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189133#M360793</guid>
      <dc:creator>jerrybu01</dc:creator>
      <dc:date>2013-03-05T04:07:22Z</dc:date>
    </item>
    <item>
      <title>Block IP range on ASA 5510 (version 8.3)</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189134#M360796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nguyen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that and to make it simple you can configure FQDN:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this scenario let's say we are going to use 4.2.2.2 as the ASA dns server..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;domain-name test.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name-server 4.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-name csc.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then&lt;/P&gt;&lt;P&gt;object network host-Cisco.com&lt;/P&gt;&lt;P&gt;fqdn cisco.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network host-flvpn.com&lt;/P&gt;&lt;P&gt;fqdn flvpn.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_in line 1 permit tcp any object host-Cisco.com&lt;/P&gt;&lt;P&gt;access-list Inside_in line 2 permit tcp any object host-flvpn.com&lt;/P&gt;&lt;P&gt;access-list Inside_in line 3 deny ip object DENY-IP-INTERNET any&lt;/P&gt;&lt;P&gt;access-list Inside_in line 4 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Inside_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hey Nguyen please check your inbox here on the CSC, I have sent you a message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 04:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-range-on-asa-5510-version-8-3/m-p/2189134#M360796</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-05T04:59:40Z</dc:date>
    </item>
  </channel>
</rss>

