<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5505 URL Filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737691#M534334</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm under the impression this will only work if it's http traffic, correct?&amp;nbsp; You cannot apply this level of filtering to https traffic due to the encryption?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Jan 2014 15:21:17 GMT</pubDate>
    <dc:creator>jeremy whittaker</dc:creator>
    <dc:date>2014-01-23T15:21:17Z</dc:date>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737678#M534275</link>
      <description>&lt;P&gt;How can I filter my local lan's URL requests?&amp;nbsp; Is it possible to have some sort of list like...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default_User_Group&lt;/P&gt;&lt;P&gt;*.microsoft.com/*&lt;/P&gt;&lt;P&gt;*.mydomain.com&lt;/P&gt;&lt;P&gt;*.google.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then only allow certain ip's access to the entire internet like this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet_User_Group&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be nice to possibly be able to add the rules to users in my domain, then associate the domain account with an IP OR have them login to view webpages.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:07:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737678#M534275</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2019-03-11T21:07:15Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737679#M534277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;8.4.2 comes with the new User-Identity FW function.&lt;/P&gt;&lt;P&gt;Try looking it up on cisco.&lt;/P&gt;&lt;P&gt;Basically it's about fetching Groups and Users from an AD over an AD-Agent and apply ACE rules to them.&lt;/P&gt;&lt;P&gt;For exampe you can create a rule like "User Mark is allowed to access the company's network, but not the internet" and&amp;nbsp; regardless from where Mark is connected to the network this rule will be applied by help of AD and IP-mapping through the AD Agent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 09:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737679#M534277</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-08-04T09:24:43Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737680#M534279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So it can do what I want tho?&amp;nbsp; I don't just want to block users from the internet, I want to control what sites they visit...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's my main objective...&amp;nbsp; Ident by AD would come later &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 17:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737680#M534279</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-04T17:12:32Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737681#M534283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can block them by using Regex along with HTTP inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 08:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737681#M534283</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-08-05T08:06:56Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737682#M534284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's EXACTLY what page I read over and EXACTLY what I tried and got to work...&amp;nbsp; But the problem I had with that was that artical was made to block CERTIN sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to block ALL sites and ALLOW certin sites.&amp;nbsp; I kinda want to do the reverse.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 16:24:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737682#M534284</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-05T16:24:35Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737683#M534288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Approach it like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Define which websites (that you want to allow access to) to be inspected with a Inspection Policy.&lt;/P&gt;&lt;P&gt;Instead of "match" you can use "match not", so any website you have NOT specified with regex will be blocked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 07:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737683#M534288</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-08-08T07:47:48Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737684#M534291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response Tim!&amp;nbsp; Yea that's the first thing I tried doing too hehe.&amp;nbsp; I never could get it to work though.&amp;nbsp; At what step in that article do I need to set the "Do not match" flag instead of the "Match" one?&amp;nbsp; (BTW I'm trying to learn more about the ASDM so I'm trying to do all the config on it as opposed to the CLI)&amp;nbsp; So witch step or (STEPS?) do I need to change that on from the article?&amp;nbsp; There are quite a few places that get you to set it to "Match" (Example Step 5a "HTTP Traffic" - sub step c).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 12:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737684#M534291</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-08T12:30:32Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737685#M534298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In Step 2 you defined the regex.&lt;/P&gt;&lt;P&gt;In Step 3c&amp;nbsp; you define if your inspection should "trigger" if the Regex matches or does not match.&lt;/P&gt;&lt;P&gt;Step 5 defines the ACL, meaning if Source to Destination via Protocol matches (or does not match, in your case it should match), inspect the traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 13:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737685#M534298</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-08-08T13:50:16Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737686#M534304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to just work with blocking or allowing domin names in general so I'm not doing steps like steps 3c (see note below).&amp;nbsp; I'm doing steps like step 3b.&amp;nbsp; That's where I would choose "Match Type" = "No Match" correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note:&lt;/P&gt;&lt;P&gt;Steps I skip our are as follows...&lt;/P&gt;&lt;P&gt;1.b&lt;/P&gt;&lt;P&gt;1.c&lt;/P&gt;&lt;P&gt;1.d&lt;/P&gt;&lt;P&gt;1.e&lt;/P&gt;&lt;P&gt;1.f&lt;/P&gt;&lt;P&gt;1.g&lt;/P&gt;&lt;P&gt;2.b&lt;/P&gt;&lt;P&gt;3.c&lt;/P&gt;&lt;P&gt;4.e&lt;/P&gt;&lt;P&gt;5.b.*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 15:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737686#M534304</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-11T15:13:10Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737687#M534309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually this is working perfectly!!!&amp;nbsp; Thanks Tim!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two more small things though...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) In step 1.a my "domainlist1" contains the following...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;\.google\.com|google\.com&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;So the ONLY sites I can go to are &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://google.com"&gt;http://google.com&lt;/A&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.google.com"&gt;http://www.google.com&lt;/A&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://maps.google.com"&gt;http://maps.google.com&lt;/A&gt;&lt;SPAN&gt;, etc..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;BUT...&amp;nbsp; I can also get to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://"&gt;http://&lt;/A&gt;&lt;STRONG&gt;my&lt;/STRONG&gt;google.com &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; Is there anyway for me to make it to when that will not happen but still allow access to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://google.com"&gt;http://google.com&lt;/A&gt;&lt;SPAN&gt; ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Is there a way to have this work per user on my domain?&lt;/P&gt;&lt;P&gt;&amp;nbsp; For example I want MYDOMAIN\User.One to be able to go to ANY sites and MYDOMAIN\User.Two and MYDOMAIN\User.Three to be restricted to go to the google.com list only (as listed above).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 15:57:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737687#M534309</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-11T15:57:41Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737688#M534315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try using a single regex to filter this by using [my]google.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="tab1"&gt;&lt;/A&gt; &lt;/P&gt;&lt;TABLE bgcolor="#FFFFFF" border="1" cellpadding="3" cellspacing="1" width="60%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;[abc]&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Character class&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Matches any character in the brackets. For example, &lt;STRONG&gt;[abc]&lt;/STRONG&gt; matches a, b, or c.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Aug 2011 09:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737688#M534315</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-08-12T09:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737689#M534323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So maybe something like [a-zA-Z0-9]google.com ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which would end up with 3 rules per domain &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yea that worked fine... I had to make 2 regex lists...&amp;nbsp; Below is everything I did to make it work.&amp;nbsp; When using the method below you can only go to sites that match the following criteria... &lt;STRONG&gt;&lt;A class="jive-link-external-small" href="http://google.com*"&gt;http://google.com*&lt;/A&gt;&lt;/STRONG&gt; or &lt;STRONG&gt;&lt;A class="jive-link-external-small" href="http://*.google.com*"&gt;http://*.google.com*&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Configuration-&amp;gt;Global Objects-&amp;gt;Regular Expressions-&amp;gt;Regular Expressions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - allowed_http_domains = \.google\.com|google\.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Configuration-&amp;gt;Global Objects-&amp;gt;Regular Expressions-&amp;gt;Regular Expressions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - denied_http_domains = [(0-9A-Za-z)*]google\.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Configuration-&amp;gt;Global Objects-&amp;gt;Regular Expressions-&amp;gt;Regular Expression Classes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - DomainAllowList = allowed_http_domains&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Configuration-&amp;gt;Global Objects-&amp;gt;Regular Expressions-&amp;gt;Regular Expression Classes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - DomainDenyList = denied_http_domains&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Configuration-&amp;gt;Global Objects-&amp;gt;Class Maps-&amp;gt;HTTP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - AllowDomainClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match Type = No Match&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Criterion = Request Header Field&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Value-&amp;gt;Field-&amp;gt;Predefined = host&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Value-&amp;gt;Value-&amp;gt;Regular Expression Class = DomainAllowList&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) Configuration-&amp;gt;Global Objects-&amp;gt;Class Maps-&amp;gt;HTTP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - DenyDomainClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match Type = Match&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Criterion = Request Header Field&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Value-&amp;gt;Field-&amp;gt;Predefined = host&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Value-&amp;gt;Value-&amp;gt;Regular Expression Class = DomainDenyList&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7) Configuration-&amp;gt;Global Objects-&amp;gt;Inspect Maps-&amp;gt;HTTP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - http_inspection_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; Configuration-&amp;gt;Global Objects-&amp;gt;Inspect Maps-&amp;gt;HTTP-&amp;gt;http_inspection_policy-&amp;gt;Inspections&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - DenyDomainClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match Criteria-&amp;gt;Multiple matches-&amp;gt;HTTP Traffic Class = DenyDomainClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Actions-&amp;gt;Action = Reset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Actions-&amp;gt;Log = Enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9) Configuration-&amp;gt;Global Objects-&amp;gt;Inspect Maps-&amp;gt;HTTP-&amp;gt;http_inspection_policy-&amp;gt;Inspections&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD - AllowDomainClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match Criteria-&amp;gt;Multiple matches-&amp;gt;HTTP Traffic Class = AllowDomainClass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Actions-&amp;gt;Action = Reset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Actions-&amp;gt;Log = Enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10) Configuration-&amp;gt;Security Policy-&amp;gt;Service Policy Rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADD Service Policy Rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Screen 1:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface = inside - inside-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Screen 2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Create a new traffic class = httptraffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Traffic match criteria = only check Source and Destination IP Address (uses ACL)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Screen 3:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action = Match&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source = any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination = any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service = tcp-udp/http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Screen 4:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Inspection = only check HTTP (then click Configure)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Select a HTTP inspect map for fine control over inspection = http_inspection_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * CLICK OK then Finished&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats it!&amp;nbsp; I hope this helps someone else out.&amp;nbsp; &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Aug 2011 15:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737689#M534323</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-12T15:33:46Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737690#M534329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tim, I started a new discussion on setting up my ASA to use my AD to authenticate users.&amp;nbsp; Any input you have there would be very helpful!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3427040"&gt;https://supportforums.cisco.com/message/3427040&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Aug 2011 18:49:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737690#M534329</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-24T18:49:38Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737691#M534334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm under the impression this will only work if it's http traffic, correct?&amp;nbsp; You cannot apply this level of filtering to https traffic due to the encryption?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 15:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737691#M534334</guid>
      <dc:creator>jeremy whittaker</dc:creator>
      <dc:date>2014-01-23T15:21:17Z</dc:date>
    </item>
    <item>
      <title>ASA5505 URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737692#M534338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not 100% positive but that would make sense...&amp;nbsp; If it would work then whats the point of encryption.&amp;nbsp; &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 16:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-url-filtering/m-p/1737692#M534338</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2014-01-23T16:55:47Z</dc:date>
    </item>
  </channel>
</rss>

