<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Block country range of IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-country-range-of-ip/m-p/1855333#M489335</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I concur with Ajay. Also, incase if the resources (or server) you are trying to protect by blocking range of IPs allows internet access from 'any' - talk to your systems admin to make sure the server gets up to date patches. To mitigate attacks from ASA end, refer to the below doc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/products/ps6120/products_tech_note09186a00809763ea.shtml"&gt;http://www.cisco.com/en/US/partner/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Jan 2012 19:10:23 GMT</pubDate>
    <dc:creator>mvsheik123</dc:creator>
    <dc:date>2012-01-05T19:10:23Z</dc:date>
    <item>
      <title>Block country range of IP</title>
      <link>https://community.cisco.com/t5/network-security/block-country-range-of-ip/m-p/1855331#M489331</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5510 device. I have been asked to block Ip range for India from accessing set of servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" width="196"&gt;&lt;COL width="196" /&gt; &lt;TBODY&gt;&lt;TR&gt;&lt;TD height="20" style="height: 15pt; width: 147pt;" width="196"&gt;Total&amp;nbsp;&amp;nbsp; Subnets:&amp;nbsp; 34,675,968&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really don't want to create a two mile long access list with all these subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a easier way of configuring this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you all. Ths forum is really awesome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-country-range-of-ip/m-p/1855331#M489331</guid>
      <dc:creator>sangram palande</dc:creator>
      <dc:date>2019-03-11T22:10:32Z</dc:date>
    </item>
    <item>
      <title>Block country range of IP</title>
      <link>https://community.cisco.com/t5/network-security/block-country-range-of-ip/m-p/1855332#M489334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I don't think if there is any automated way to do it however under object group will have to call all the subnets if the ACL is too long and some kind of DoS attack is there will also impact performance. Hence instead of blocking should focus on what application/ports are getting expose to outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 16:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-country-range-of-ip/m-p/1855332#M489334</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-05T16:59:14Z</dc:date>
    </item>
    <item>
      <title>Block country range of IP</title>
      <link>https://community.cisco.com/t5/network-security/block-country-range-of-ip/m-p/1855333#M489335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I concur with Ajay. Also, incase if the resources (or server) you are trying to protect by blocking range of IPs allows internet access from 'any' - talk to your systems admin to make sure the server gets up to date patches. To mitigate attacks from ASA end, refer to the below doc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/products/ps6120/products_tech_note09186a00809763ea.shtml"&gt;http://www.cisco.com/en/US/partner/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 19:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-country-range-of-ip/m-p/1855333#M489335</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-01-05T19:10:23Z</dc:date>
    </item>
  </channel>
</rss>

