<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it possible to apply a security policy based on domain na in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727908#M535403</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The two approaches really do different things. If your goal is to control what URLs and servers certain users can access, then a more robust solution using an external URL server might be a better solution:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_filter.html#wp1045692"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_filter.html#wp1045692&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, if you're only looking to control access for a specific host, then configuring HTTP application inspection on the ASA and applying it just to traffic sourced from that server should work ok. You can limit the specific URLs that the client can send traffic to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More examples can be found here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1268"&gt;https://supportforums.cisco.com/docs/DOC-1268&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Aug 2011 17:06:07 GMT</pubDate>
    <dc:creator>Jay Johnston</dc:creator>
    <dc:date>2011-08-04T17:06:07Z</dc:date>
    <item>
      <title>Is it possible to apply a security policy based on domain names as apposed to IP address/ranges on an ASA5505/ASA5510. I have been told this is impossible, but just incase anyone has found anything new?</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727905#M535400</link>
      <description>&lt;P&gt;We have a requirement for a WSUS server to receive updates which sits behind a ASA5505/ and in some cases ASA5510.&amp;nbsp; I understand to enable this to happen the WSUS &lt;A href="http://www.experts-exchange.com/Security/Software_Firewalls/Enterprise_Firewalls/Cisco_PIX_Firewall/Q_25841682.html" target="_blank"&gt;server&lt;/A&gt; needs to communicate with many DNS names and therefore there are many potential IP addresses/ranges that the ASA needs to apply the appropriate &lt;A href="http://www.experts-exchange.com/Security/Software_Firewalls/Enterprise_Firewalls/Cisco_PIX_Firewall/Q_25841682.html" target="_blank"&gt;security&lt;/A&gt; policy too. An example of just a few of the DNS names we need to apply a security policy to are &lt;A href="http://windowsupdate.microsoft.com" target="_blank"&gt;http://windowsupdate.microsoft.com&lt;/A&gt;, &lt;A href="http://*.windowsupdate.microsoft.com" target="_blank"&gt;http://*.windowsupdate.microsoft.com&lt;/A&gt;, &lt;A href="https://*.windowsupdate.microsoft.com" target="_blank"&gt;https://*.windowsupdate.microsoft.com&lt;/A&gt; etc etc...&lt;BR /&gt;Is it possible to apply a security policy based on &lt;A href="http://www.experts-exchange.com/Security/Software_Firewalls/Enterprise_Firewalls/Cisco_PIX_Firewall/Q_25841682.html" target="_blank"&gt;domain names&lt;/A&gt; as apposed to IP address/ranges on an ASA5505/ASA5510. I have been told this is impossible, but just incase anyone has found anything new.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;The reason why I " don't you just exclude the WSUS server from the policy?", is because the question is not just about WSUS the reason i ask Is it possible to apply a security policy based on domain names as apposed to IP address/ranges on an ASA5505/ASA5510, is so that i can close every thing off on my network, and still have access to WSUS, NIST Time Service, Google Earth, &amp;amp; Symantec Live Update, and a few other sites, services with out opening up my network and machiens to everyone, and every thing. I would like to shut down all internet access, in and out, but to these services, sites, etc. While at the same time keeping up all of my site to site ipsec vpn tunnels I have to my remote offices. &lt;BR /&gt;Thanks Jason&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW: Anyone interested in Starting up / Co Founding a Los Banos, CA Cisco FAN Club?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;Jason Browne&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727905#M535400</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2019-03-11T21:01:46Z</dc:date>
    </item>
    <item>
      <title>Is it possible to apply a security policy based on domain names</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727906#M535401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;This is possible but with some caveats. Check a doc on this here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17014"&gt;https://supportforums.cisco.com/docs/DOC-17014&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 17:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727906#M535401</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2011-07-28T17:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to apply a security policy based on domain na</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727907#M535402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jay is your solution preferable to the following method provide by Chris C?&lt;/P&gt;&lt;P&gt;Please see the link below.&amp;nbsp; It describes how to filter out certain websites but if you use No Match when creating the HTTP Class Maps you get the opposite effect, all websites are filtered except the ones you list.&amp;nbsp; You should be able to look at your production ASA if you need to see how it’s setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To undo filtering and set everything open temporarly just&lt;/P&gt;&lt;P&gt;go to Configuration -&amp;gt; Firewall -&amp;gt; Service Policy Rules,&amp;nbsp; just uncheck the Enabled boxes for the httptraffic rule.&amp;nbsp; That will open it wide again.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, this is just filtering ports 80 and 8080, so any other ports are still open.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Your method, and this one are the only two I hvae been able to get?&lt;/SPAN&gt; I need to start imppamenting a solution soon. I am hoping to block out all traffic but that allowed through. This second solution only filters via ports 80 and 8080 it does not look at other ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: jason browne&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 16:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727907#M535402</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2011-08-04T16:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to apply a security policy based on domain na</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727908#M535403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The two approaches really do different things. If your goal is to control what URLs and servers certain users can access, then a more robust solution using an external URL server might be a better solution:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_filter.html#wp1045692"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_filter.html#wp1045692&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, if you're only looking to control access for a specific host, then configuring HTTP application inspection on the ASA and applying it just to traffic sourced from that server should work ok. You can limit the specific URLs that the client can send traffic to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More examples can be found here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1268"&gt;https://supportforums.cisco.com/docs/DOC-1268&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 17:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727908#M535403</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2011-08-04T17:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to apply a security policy based on domain na</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727909#M535404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many people keep asking me why I do not just " Why don't you just exclude the WSUS server from the policy?", the question is not just about WSUS&amp;nbsp; the reason i ask &lt;A _jive_internal="true" href="https://community.cisco.com/message/3407599#3407599"&gt;Is it possible to apply a security policy based on domain names as apposed to IP address/ranges on an ASA5505/ASA5510&lt;/A&gt;, is so that i can close every thing off on my network, nad still have access to WSUS, NIST Time Service, Google Docs, Google Earth, &amp;amp; Symantec Live Update with out opening my machiens up to every, and every thing. I would like to shut down all internet access but to these services, sites, etc. &lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727909#M535404</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2011-08-08T16:49:14Z</dc:date>
    </item>
    <item>
      <title>Is it possible to apply a security policy based on domain names</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727910#M535405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not a Cisco ASA expert but.. I'm thinking you could either &lt;BR /&gt;a) allow all outbound traffic over a certain port (443) so that such communication can be started (the WSUS should be starting the SSL channel outbound anyway with windows update) OR &lt;BR /&gt;b) allow all traffic on port 443 to the WSUS Server IP? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This just might be simpler. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another way as Randy suggested is to move the WSUS out of policy or into a DMZ, allowing it to communicate more freely while maintaining protection within your network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need more help, let me know. &lt;/P&gt;&lt;DIV&gt;&lt;P&gt;Messages from Chirag Desai (1):&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 20:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727910#M535405</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2011-08-08T20:41:09Z</dc:date>
    </item>
    <item>
      <title>Is it possible to apply a security policy based on domain names</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727911#M535406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason why I " don't you just exclude the WSUS server from the policy?", is because the question is not just about WSUS the reason i ask Is it possible to apply a security policy based on domain names as apposed to IP address/ranges on an ASA5505/ASA5510, is so that i can close every thing off on my network, and still have access to WSUS, NIST Time Service, Google Earth, &amp;amp; Symantec Live Update, and a few other sites, services with out opening up my network and machiens to everyone, and every thing. I would like to shut down all internet access, in and out, but to these services, sites, etc. While at the same time keeping up all of my site to site ipsec vpn tunnels I have to my remote offices. &lt;BR /&gt;Thanks Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Aug 2011 17:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727911#M535406</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2011-08-09T17:29:36Z</dc:date>
    </item>
    <item>
      <title>Is it possible to apply a security policy based on domain names</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727912#M535407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think you understand how NAT and TCP/UDP/ICMP work. Nothing (NOTHING!) can open an inbound connection to a server without an active NAT policy, regardless of whether or not a security policy exist. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been configuring routers and firewall for 25 years, CISSP certified, and other stuff I won't bore you with. Users shouldn't be on you servers, so it doesn't matter what policies apply to them. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps I don't understand your enviroment - but if all the other security is right, you are spending energy on nothing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Randy &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Aug 2011 17:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727912#M535407</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2011-08-09T17:31:01Z</dc:date>
    </item>
    <item>
      <title>Is it possible to apply a security policy based on domain names</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727913#M535408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; i was just checking to see if you had any more suggestions, after examining the other suggestions, that people have gave me, and I have posted?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 20:01:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727913#M535408</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2011-08-11T20:01:15Z</dc:date>
    </item>
    <item>
      <title>Is it possible to apply a security policy based on domain names</title>
      <link>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727914#M535409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/people/jajohnst" id="jive-22747165928763051925" onmouseout="" onmouseover=""&gt;Jay Johnston&lt;/A&gt; &lt;/P&gt;&lt;P&gt;I have included the answers and communication i have received from linked in. Do you have any further suggestions or answers on how i can secure my new work allowing only my workstations and servers acces to outside recources such as nist etc based on domain names as apposed to ip address/ranges.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 18:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-possible-to-apply-a-security-policy-based-on-domain-names/m-p/1727914#M535409</guid>
      <dc:creator>jasonadambrowne</dc:creator>
      <dc:date>2011-08-15T18:54:30Z</dc:date>
    </item>
  </channel>
</rss>

