<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic URLs  filtering  problemes ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026686#M403156</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here we go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex domainFacebook "\.facebook\.com"&lt;/P&gt;&lt;P&gt;regex domainMyspace "\.myspace\.com"&lt;/P&gt;&lt;P&gt;regex domainTwitter "\.twitter\.com"&lt;/P&gt;&lt;P&gt;regex domainYoutube "\.youtube\.com"&lt;/P&gt;&lt;P&gt;regex domainDailymotion "\.dailymotion\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any block-for-80-to-89&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainFacebook&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainMyspace&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainTwitter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any block-for-90-to-99&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainFacebook&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainMyspace&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainTwitter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainYoutube&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainDailymotion&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all block-80-89-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; match request header host regex class block-for-80-to-89&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all block-90-99-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; match request header host regex class block-for-90-to-99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list match-80-89-acl permit tcp 192.168.2.80 255.255.255.248 any eq 80&lt;/P&gt;&lt;P&gt;access-list match-80-89-acl permit tcp 192.168.2.88 255.255.255.254 any eq 80&lt;/P&gt;&lt;P&gt;access-list match-90-99-acl permit tcp 192.168.2.90 255.255.255.254 any eq 80&lt;/P&gt;&lt;P&gt;access-list match-90-99-acl permit tcp 192.168.2.92 255.255.255.252 any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list match-90-99-acl permit tcp 192.168.2.96 255.255.255.252 any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic80-89&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-list match-80-89-acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic90-99&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-list match-90-99-acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy_80-89&lt;/P&gt;&lt;P&gt; class block-80-89-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy_90-99&lt;/P&gt;&lt;P&gt; class block-90-99-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map inside-policy&lt;/P&gt;&lt;P&gt; class httptraffic80-89&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http_inspection_policy_80-89&lt;/P&gt;&lt;P&gt; class httptraffic90-99&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http_inspection_policy_90-99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please kindly be advised that this is only for HTTP (not for HTTPS, as HTTPS is encrypted so it won't see the URL, therefore it can't be blocked).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the inside ACL that is applied to the inside interface, you would also need to add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.70 255.255.255.254 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.72 255.255.255.248 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.80 255.255.255.240 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.96 255.255.255.252 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.100 255.255.255.252 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.104 255.255.255.248 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.112 255.255.255.240 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.128 255.255.255.192 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.192 255.255.255.248 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit ip any any&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Oct 2012 01:32:32 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-10-22T01:32:32Z</dc:date>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026683#M403153</link>
      <description>&lt;P&gt;hi everybody &lt;/P&gt;&lt;P&gt;i use ASA 5510 and i want to block some urls :&lt;/P&gt;&lt;P&gt;192.168.2.70 to 79 allow every thing &lt;/P&gt;&lt;P&gt;192.168.2.80&amp;nbsp; to 89 : block facebook , myspace, twiter, &lt;/P&gt;&lt;P&gt;192.168.2.90&amp;nbsp; to 99 : block facebook , myspace, twiter,&amp;nbsp; youtube , dailymotion &lt;/P&gt;&lt;P&gt;192.168.2.100 to 199 deny everting &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:12:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026683#M403153</guid>
      <dc:creator>iliass joudat</dc:creator>
      <dc:date>2019-03-12T00:12:12Z</dc:date>
    </item>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026684#M403154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Duplicate post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the same answer from the other post:&lt;/P&gt;&lt;P&gt;Here is a sample configuration that you can follow to block URLs using regular expressions:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2012 00:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026684#M403154</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-22T00:20:44Z</dc:date>
    </item>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026685#M403155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer&lt;/P&gt;&lt;P&gt;thank you for your reply, however, I have already seen this aricle and I have followed the steps, but I want to block all IP address of my networks, can you give me more specific&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2012 00:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026685#M403155</guid>
      <dc:creator>iliass joudat</dc:creator>
      <dc:date>2012-10-22T00:43:28Z</dc:date>
    </item>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026686#M403156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here we go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex domainFacebook "\.facebook\.com"&lt;/P&gt;&lt;P&gt;regex domainMyspace "\.myspace\.com"&lt;/P&gt;&lt;P&gt;regex domainTwitter "\.twitter\.com"&lt;/P&gt;&lt;P&gt;regex domainYoutube "\.youtube\.com"&lt;/P&gt;&lt;P&gt;regex domainDailymotion "\.dailymotion\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any block-for-80-to-89&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainFacebook&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainMyspace&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainTwitter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any block-for-90-to-99&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainFacebook&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainMyspace&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainTwitter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainYoutube&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match regex domainDailymotion&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all block-80-89-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; match request header host regex class block-for-80-to-89&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all block-90-99-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; match request header host regex class block-for-90-to-99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list match-80-89-acl permit tcp 192.168.2.80 255.255.255.248 any eq 80&lt;/P&gt;&lt;P&gt;access-list match-80-89-acl permit tcp 192.168.2.88 255.255.255.254 any eq 80&lt;/P&gt;&lt;P&gt;access-list match-90-99-acl permit tcp 192.168.2.90 255.255.255.254 any eq 80&lt;/P&gt;&lt;P&gt;access-list match-90-99-acl permit tcp 192.168.2.92 255.255.255.252 any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list match-90-99-acl permit tcp 192.168.2.96 255.255.255.252 any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic80-89&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-list match-80-89-acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic90-99&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-list match-90-99-acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy_80-89&lt;/P&gt;&lt;P&gt; class block-80-89-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy_90-99&lt;/P&gt;&lt;P&gt; class block-90-99-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map inside-policy&lt;/P&gt;&lt;P&gt; class httptraffic80-89&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http_inspection_policy_80-89&lt;/P&gt;&lt;P&gt; class httptraffic90-99&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http_inspection_policy_90-99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please kindly be advised that this is only for HTTP (not for HTTPS, as HTTPS is encrypted so it won't see the URL, therefore it can't be blocked).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the inside ACL that is applied to the inside interface, you would also need to add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.70 255.255.255.254 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.72 255.255.255.248 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.80 255.255.255.240 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit tcp 192.168.2.96 255.255.255.252 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.100 255.255.255.252 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.104 255.255.255.248 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.112 255.255.255.240 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.128 255.255.255.192 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; deny tcp 192.168.2.192 255.255.255.248 any eq 80&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;INSIDE-ACL-NAME&gt; permit ip any any&lt;/INSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2012 01:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026686#M403156</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-22T01:32:32Z</dc:date>
    </item>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026687#M403157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;am not front of my asa right now , am gona to use your config&amp;nbsp; tomorrow&amp;nbsp; and am go back to you &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thinks a lot for your help &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2012 01:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026687#M403157</guid>
      <dc:creator>iliass joudat</dc:creator>
      <dc:date>2012-10-22T01:38:05Z</dc:date>
    </item>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026688#M403158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, let us know how it goes tomorrow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2012 01:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026688#M403158</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-22T01:39:42Z</dc:date>
    </item>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026689#M403159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi jennifer ;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thinks a lot for your support&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 13:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026689#M403159</guid>
      <dc:creator>iliass joudat</dc:creator>
      <dc:date>2012-10-26T13:35:34Z</dc:date>
    </item>
    <item>
      <title>URLs  filtering  problemes ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026690#M403160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem... &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 13:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urls-filtering-problemes-asa-5510/m-p/2026690#M403160</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-26T13:41:41Z</dc:date>
    </item>
  </channel>
</rss>

