<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL filtering on 5505? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641097#M567477</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Paul, I am trying your config but where you have:&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http pm-block-url&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not see an "inspect" command to issue "inspect http"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Feb 2011 16:45:10 GMT</pubDate>
    <dc:creator>slug420</dc:creator>
    <dc:date>2011-02-09T16:45:10Z</dc:date>
    <item>
      <title>URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641093#M567473</link>
      <description>&lt;P&gt;Can someone help me with a basic config to filter like cisco.com (or any of its pages) using a 5505?&amp;nbsp; I am trying to *block* this site.&amp;nbsp; Here is what I had from the URL filtering howto:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map type inspect http match-any block-url-class&lt;BR /&gt; match request header host regex block1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http block-url-policy&lt;BR /&gt; parameters&lt;BR /&gt; class block-url-class&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect http block-url-policy&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got an error initially about there being no inspection_default class so im not sure if I recreated it correctly/completely...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641093#M567473</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2019-03-11T19:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641094#M567474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you paste the show run regex, show run class-map and show run policy-map?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 19:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641094#M567474</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T19:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641095#M567475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this link provides a good explanation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 19:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641095#M567475</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T19:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641096#M567476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this is a configuration I have tested:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex block-url ".\myspace.\com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any cm-block-url&lt;/P&gt;&lt;P&gt; match regex block-url&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http pm-block-url&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; match request header host regex class cm-block-url&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http pm-block-url&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 19:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641096#M567476</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T19:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641097#M567477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Paul, I am trying your config but where you have:&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http pm-block-url&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not see an "inspect" command to issue "inspect http"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 16:45:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641097#M567477</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2011-02-09T16:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641098#M567478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;clas inspectio_default comes by default on the ASA. In case you don't have it then you could add it manually. Here are the missing lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;then make sure you add the rest of the commands I suggested.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 16:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641098#M567478</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-09T16:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641099#M567479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex block-url ".\myspace.\com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any cm-block-url&lt;/P&gt;&lt;P&gt;match regex block-url&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http pm-block-url&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;match request header host regex class cm-block-url&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http pm-block-url&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;me (testing with pandora):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex block1 ".\pandora.\com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map type regex match-any block-url-class&lt;BR /&gt; match regex block1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http block-url-policy&lt;BR /&gt; parameters&lt;BR /&gt; match request header host regex class block-url-class&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect http block-url-policy&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;don't the !s indicate incomplete configurations?&amp;nbsp; Do you have those in your config?&amp;nbsp; If this looks good to you (looks good to me) I guess I am going to have to verify the user is testing from the right location..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 20:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641099#M567479</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2011-02-09T20:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641100#M567480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it doesn't mean incomplete. &lt;/P&gt;&lt;P&gt;Go ahead and test. It looks good your config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 21:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641100#M567480</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-09T21:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641101#M567481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;tried it on an ASA here and it worked like a charm, client finally got back to me and said he was testing from another site &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Thanks for your help!&amp;nbsp; On a side note...if they ping the URL (and resolve the IP) and use the IP in their web browser they get around this...is there a way to do DNS filtering so that requests or responses for a given string are blocked?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 20:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641101#M567481</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2011-02-10T20:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering on 5505?</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641102#M567482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am glad to hear that it worked. You can always block the IP for the unwanted websites but IPs usually change. If you want a better URL filtering mechanism you should consider the CSC-SSM for the ASA but in this case it will not work on you ASA 5505.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 21:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-5505/m-p/1641102#M567482</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-10T21:09:49Z</dc:date>
    </item>
  </channel>
</rss>

