<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking websites with ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788225#M532106</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great, and the config looked okay?&amp;nbsp; also rather than individual IPs, can I specify a subnet in the urlfilter list?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 31 Aug 2011 18:51:20 GMT</pubDate>
    <dc:creator>networker99</dc:creator>
    <dc:date>2011-08-31T18:51:20Z</dc:date>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788219#M532099</link>
      <description>&lt;P&gt;I understand the ASA has limited functionality with website blocking, and that you have to create regular expressions.&amp;nbsp; If you do this is it possible to create groups for the regular expressions? for example certain MAC addresses can get to all websites but others are restricted from some.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788219#M532099</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2019-03-11T21:19:05Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788220#M532100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not really with mac-address but with IPs. You will match the hosts using ACLS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788220#M532100</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-08-31T18:11:27Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788221#M532101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply, please could you post an example?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:16:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788221#M532101</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2011-08-31T18:16:34Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788222#M532102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here it goes: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list urlfilter permit tcp host x.x.x.x any eq 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map httptraffic &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; match access-list urlfilter&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex domainlist3 "\.facebook\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any DomainBlockList&lt;/P&gt;&lt;P&gt; match regex domainlist3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all BlockDomainsClass&lt;/P&gt;&lt;P&gt; match request header host regex class DomainBlockList&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; class BlockDomainsClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map inside-policy&lt;/P&gt;&lt;P&gt; class httptraffic&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you denote, it is the same configuration posted here &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, the only thing you need to modify is the class map called http traffic, which has the host that are going to match this policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788222#M532102</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-08-31T18:23:18Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788223#M532103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;okay great, so 2 questions.. would the following work? and am I correct in assuming that only those IP addresses listed in "urlfilter' will be subject to the filtering? and all others will be permitted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list urlfilter permit tcp host 192.168.1.50 any eq 80&lt;/P&gt;&lt;P&gt;access-list urlfilter permit tcp host 192.168.1.51 any eq 80&lt;/P&gt;&lt;P&gt;access-list urlfilter permit tcp host 192.168.1.52 any eq 80&lt;/P&gt;&lt;P&gt;access-list urlfilter permit tcp host 192.168.1.53 any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic&lt;/P&gt;&lt;P&gt;match access-list urlfilter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex domainlist1 "\.facebook\.com"&lt;/P&gt;&lt;P&gt;regex domainlist2 "\.twitter\.com"&lt;/P&gt;&lt;P&gt;regex domainlist3 "\.myspace\.com"&lt;/P&gt;&lt;P&gt;regex domainlist4 "\.youtube\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any DomainBlockList&lt;/P&gt;&lt;P&gt;match regex domainlist1&lt;/P&gt;&lt;P&gt;match regex domainlist2&lt;/P&gt;&lt;P&gt;match regex domainlist3&lt;/P&gt;&lt;P&gt;match regex domainlist4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all BlockDomainsClass&lt;/P&gt;&lt;P&gt;match request header host regex class DomainBlockList&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; class BlockDomainsClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map inside-policy&lt;/P&gt;&lt;P&gt;class httptraffic&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788223#M532103</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2011-08-31T18:37:11Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788224#M532105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct! Only the IP addresses under urlfilter will be hitting this policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas&lt;/P&gt;&lt;P&gt;Security Technical Lead&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788224#M532105</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-08-31T18:49:52Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788225#M532106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great, and the config looked okay?&amp;nbsp; also rather than individual IPs, can I specify a subnet in the urlfilter list?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788225#M532106</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2011-08-31T18:51:20Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788226#M532107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, it does look ok, you can specify subnets there too. In case you need to allow just one host on a subnet, you can also include a deny statement on that same access list so that one single host is not affected but the rest of the subnet is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 19:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788226#M532107</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-08-31T19:15:28Z</dc:date>
    </item>
    <item>
      <title>Blocking websites with ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788227#M532109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great, thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 19:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-websites-with-asa/m-p/1788227#M532109</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2011-08-31T19:25:34Z</dc:date>
    </item>
  </channel>
</rss>

