<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011271#M440636</link>
    <description>&lt;P&gt;I am new for configuring asa I want that my inside user only do browsing on internet and stop downloading any thing&lt;/P&gt;&lt;P&gt;pls give me step by step configuration for this task I am using asa 5505 and a 1800 series router for internet connectivity and 2960 switch for lan and I install asa between them&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:21:18 GMT</pubDate>
    <dc:creator>mohsin.lko</dc:creator>
    <dc:date>2019-03-11T23:21:18Z</dc:date>
    <item>
      <title>ASA 5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011271#M440636</link>
      <description>&lt;P&gt;I am new for configuring asa I want that my inside user only do browsing on internet and stop downloading any thing&lt;/P&gt;&lt;P&gt;pls give me step by step configuration for this task I am using asa 5505 and a 1800 series router for internet connectivity and 2960 switch for lan and I install asa between them&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011271#M440636</guid>
      <dc:creator>mohsin.lko</dc:creator>
      <dc:date>2019-03-11T23:21:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011272#M440637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Please paste in here your network diagram, that has IP Addresses/Subnetmasks as well? By the way, are you hosting any Web Servers on the LAN, whereby users from the Internet would need to access it? or is this setup similar to a typical Cybercafe, where by all access are from LAN to the Internet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2012 07:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011272#M440637</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-16T07:52:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011273#M440638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my first time doing this (url filtering and attempt to block user from downloading) for learning sake and for my future work with firewalls. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No one is an expert in using a product the first time, instead of asking for answers research it yourself first then post a question when you encounter problem in this way you will learn faster and remember quicker. Anyway...here's my configuration which is not perfect but should work......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First if you have no idea how to start read my blog: &lt;A href="http://cyruslab.wordpress.com/2012/08/11/asa5505-8-439-quick-start-to-connect-to-your-internet/"&gt;http://cyruslab.wordpress.com/2012/08/11/asa5505-8-439-quick-start-to-connect-to-your-internet/&lt;/A&gt; to get your internet running first.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I use regular expression to group the file type exe, zip, tar, pdf, as long as in the url it contains this extension no matter which website the connection will be reset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Create regex by searching for extension that ends with the ones stated above&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;regex ext-type1 ".*\.([Ee][Xx][Ee]|[Zz][Ii][Pp]|[Tt][Aa][Rr]|[Pp][Dd][Ff])"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Create regex that matches http headers with content-type application/(everything)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;regex content-type "Content-Type"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!There are a lot of application such as application/pdf blah blah blah...the * is a wildcard that matches all.&lt;/P&gt;&lt;P&gt;regex app-header "application/.*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Create class-map to group ext-types&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any block-ext&lt;/P&gt;&lt;P&gt; match regex ext-type1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually you do not need to create a class-map for this, but using nested class-maps make your configuration more scalable (I say nested because this class-map will be used again within another class-map), next time if you need to add more extensions simply create another regex and match it within block-ext class-maps and your changes would take effect immediately with your new sets of extensions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Create class-map to group http headers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all app-header-class&lt;/P&gt;&lt;P&gt; match response header regex content-type regex app-header&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When inside host surf the web and request for to download app that matches application/* the response will be captured by the ASA. This configuration captures and groups the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Create class-map to group http request&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all block-ext-class&lt;/P&gt;&lt;P&gt; match request uri regex class block-ext&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now this is the nested class-map, remember that i created another class-map known as block-ext? This configuration captures your inside host request and group them if it matches block-ext.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Create access-list and class-map to group http traffic only so that policy can be applied to these traffic.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list http-group extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list http-group extended permit tcp any any eq 8080&lt;/P&gt;&lt;P&gt;class-map http-only&lt;/P&gt;&lt;P&gt; match access-list http-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the interesting traffic which the policy be applied to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Define http inspection policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http-inspection-policy&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol-violation action drop-connection log&lt;/P&gt;&lt;P&gt; class app-header-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt; class block-ext-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These configurations are for policy creation, if http packet is malformed it will be drop and log, if matches the response app-header-class connection is dropped, if matches the request block-ext-class the connection is reset (i.e. user immediate sees page not found on his/her web browser)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Attached the policy into the interesting traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map inside-http-policy&lt;/P&gt;&lt;P&gt; class http-only&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http-inspection-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the above policy creation will be applied to the interesting traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Apply the policy into the inside interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-http-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above policy is not taken into effect until you applied to an interface.&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;﻿&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 20:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011273#M440638</guid>
      <dc:creator>rakyomin78</dc:creator>
      <dc:date>2012-08-20T20:52:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011274#M440639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wrote a blog last night about this...&lt;A href="http://cyruslab.wordpress.com/2012/08/21/asa5505-allow-web-surfing-but-disallow-download-with-websense/"&gt;http://cyruslab.wordpress.com/2012/08/21/asa5505-allow-web-surfing-but-disallow-download-with-websense/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 16:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration/m-p/2011274#M440639</guid>
      <dc:creator>rakyomin78</dc:creator>
      <dc:date>2012-08-21T16:33:18Z</dc:date>
    </item>
  </channel>
</rss>

