<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block Certain Websites (URLs) Using Regular Expressions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601554#M568220</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes these are the results, and thanks for the reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;show run regex&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;regex urllist1 ".*\.([Ff][Ll][Vv])HTTP/1.[01]"&lt;BR /&gt;regex domainlist1 "\.youtube\.com"&lt;BR /&gt;regex ares "[ares]"&lt;BR /&gt;regex contenttype "Content-Type"&lt;BR /&gt;regex applicationheader "application/.*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;show run class-map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inside-unres-band-in&lt;BR /&gt; description Assign 16MB&amp;nbsp; unrestricted IPs outgoing request&lt;BR /&gt; match access-list inside_mpc&lt;BR /&gt;class-map inside-class-unrestricted-in&lt;BR /&gt; description Prioritize unrestricted IPs outgoing request&lt;BR /&gt; match access-list inside_mpc_2&lt;BR /&gt;class-map type regex match-any DomainBlocklist&lt;BR /&gt; match regex domainlist1&lt;BR /&gt;class-map type inspect http match-all BlockDomainClass&lt;BR /&gt; match request header host regex class DomainBlocklist&lt;BR /&gt;class-map type regex match-any block&lt;BR /&gt; match regex _default_x-kazaa-network&lt;BR /&gt; match regex _default_aim-messenger&lt;BR /&gt; match regex _default_gator&lt;BR /&gt;class-map inside-unres-band-out&lt;BR /&gt; description Assign 16MB unrestricted IPs return traffic&lt;BR /&gt; match access-list inside_mpc_1&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map inside-class-unrestricted-out&lt;BR /&gt; description Prioritize unrestricted IPs return traffic&lt;BR /&gt; match access-list inside_mpc_3&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;show run policy-map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the policy-map i have some rules for badwidth restrictions. and i have the &lt;SPAN style="color: #00ff00;"&gt;httpaccess rule (site blocking)&lt;/SPAN&gt;. on top of the &lt;SPAN style="color: #ff0000;"&gt;default class map rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;policy-map type inspect http http_inspec_allow&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request method connect&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt; class BlockDomainClass&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;policy-map type inspect http Ares&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request uri regex ares&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map type inspect http block&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request uri regex class block&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map type inspect http http_inspec_pol&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request method connect&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt; class BlockDomainClass&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt;policy-map type inspect im IM-Inspect-map&lt;BR /&gt; parameters&lt;BR /&gt; match protocol msn-im yahoo-im &lt;BR /&gt;&amp;nbsp; drop-connection&lt;BR /&gt;policy-map inside-policy-res-bandwidth&lt;BR /&gt; class inside-unres-band-in&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt; class inside-class-unrestricted-in&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt; class inside-unres-band-out&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt; class inside-class-unrestricted-out&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt; &lt;SPAN style="color: #00ff00;"&gt;class httpaccess&lt;BR /&gt;&amp;nbsp; inspect http http_inspec_pol &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt; class class-default&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; police input 4500000 2700&lt;BR /&gt;&amp;nbsp; police output 4500000 2700&lt;BR /&gt;policy-map type inspect im imallow&lt;BR /&gt; parameters&lt;BR /&gt; match protocol msn-im yahoo-im &lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Feb 2011 15:05:13 GMT</pubDate>
    <dc:creator>jibinkg</dc:creator>
    <dc:date>2011-02-08T15:05:13Z</dc:date>
    <item>
      <title>Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601550#M568216</link>
      <description>&lt;P&gt;hello everyone i am kinda new to cisco product, i have cisco asa 5510 as firewall, i was trying to block some site using the link provided below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml#tshoot" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml#tshoot&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and its working fine, but the problem i am having, when i go to download attachment from hotmail its not downloading, from gmail and other mails its&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;working any one could help me on this&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601550#M568216</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2019-03-11T19:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601551#M568217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please post your configuration here (both regular expression statements and class-map/policy-map statements)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 23:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601551#M568217</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2011-02-01T23:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601552#M568218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for reply, and sorry for the late reply from i was away for some time from the work&amp;nbsp; iam attaching the screen shots of regular expression, classmap and inspect map also policy which i created&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 18:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601552#M568218</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2011-02-07T18:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601553#M568219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;from CLI can you paste the show run regex, show run class-map and show run policy-map?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 19:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601553#M568219</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T19:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601554#M568220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes these are the results, and thanks for the reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;show run regex&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;regex urllist1 ".*\.([Ff][Ll][Vv])HTTP/1.[01]"&lt;BR /&gt;regex domainlist1 "\.youtube\.com"&lt;BR /&gt;regex ares "[ares]"&lt;BR /&gt;regex contenttype "Content-Type"&lt;BR /&gt;regex applicationheader "application/.*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;show run class-map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inside-unres-band-in&lt;BR /&gt; description Assign 16MB&amp;nbsp; unrestricted IPs outgoing request&lt;BR /&gt; match access-list inside_mpc&lt;BR /&gt;class-map inside-class-unrestricted-in&lt;BR /&gt; description Prioritize unrestricted IPs outgoing request&lt;BR /&gt; match access-list inside_mpc_2&lt;BR /&gt;class-map type regex match-any DomainBlocklist&lt;BR /&gt; match regex domainlist1&lt;BR /&gt;class-map type inspect http match-all BlockDomainClass&lt;BR /&gt; match request header host regex class DomainBlocklist&lt;BR /&gt;class-map type regex match-any block&lt;BR /&gt; match regex _default_x-kazaa-network&lt;BR /&gt; match regex _default_aim-messenger&lt;BR /&gt; match regex _default_gator&lt;BR /&gt;class-map inside-unres-band-out&lt;BR /&gt; description Assign 16MB unrestricted IPs return traffic&lt;BR /&gt; match access-list inside_mpc_1&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map inside-class-unrestricted-out&lt;BR /&gt; description Prioritize unrestricted IPs return traffic&lt;BR /&gt; match access-list inside_mpc_3&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;show run policy-map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the policy-map i have some rules for badwidth restrictions. and i have the &lt;SPAN style="color: #00ff00;"&gt;httpaccess rule (site blocking)&lt;/SPAN&gt;. on top of the &lt;SPAN style="color: #ff0000;"&gt;default class map rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;policy-map type inspect http http_inspec_allow&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request method connect&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt; class BlockDomainClass&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;policy-map type inspect http Ares&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request uri regex ares&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map type inspect http block&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request uri regex class block&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map type inspect http http_inspec_pol&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request method connect&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt; class BlockDomainClass&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt;policy-map type inspect im IM-Inspect-map&lt;BR /&gt; parameters&lt;BR /&gt; match protocol msn-im yahoo-im &lt;BR /&gt;&amp;nbsp; drop-connection&lt;BR /&gt;policy-map inside-policy-res-bandwidth&lt;BR /&gt; class inside-unres-band-in&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt; class inside-class-unrestricted-in&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt; class inside-unres-band-out&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt; class inside-class-unrestricted-out&lt;BR /&gt;&amp;nbsp; police input 16000000 8000&lt;BR /&gt;&amp;nbsp; police output 16000000 8000&lt;BR /&gt; &lt;SPAN style="color: #00ff00;"&gt;class httpaccess&lt;BR /&gt;&amp;nbsp; inspect http http_inspec_pol &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt; class class-default&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; police input 4500000 2700&lt;BR /&gt;&amp;nbsp; police output 4500000 2700&lt;BR /&gt;policy-map type inspect im imallow&lt;BR /&gt; parameters&lt;BR /&gt; match protocol msn-im yahoo-im &lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 15:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601554#M568220</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2011-02-08T15:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601555#M568221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Hi &lt;SPAN&gt;Jibin&lt;/SPAN&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does the ASA log any &lt;SPAN&gt;syslogs&lt;/SPAN&gt; when the connection is blocked?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also,&amp;nbsp; could you get a packet capture on the client for a connection that is&amp;nbsp; blocked? I don't have a Hotmail account to test with, but I'm wondering&amp;nbsp; if this &lt;SPAN&gt;regex&lt;/SPAN&gt; might be matching something in the request:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;regex&lt;/SPAN&gt; &lt;SPAN&gt;ares&lt;/SPAN&gt; "[&lt;SPAN&gt;ares&lt;/SPAN&gt;]"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 20:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601555#M568221</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-02-08T20:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601556#M568222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes syslog is ther, and also i have another problem one i put this rule in policy after sometime syslog will loose connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i dont know i have can i capture packet from asa can you help me on this.&lt;/P&gt;&lt;P&gt;i have the syslog reports if you want below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;attaching as txt file&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 20:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601556#M568222</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2011-02-09T20:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601557#M568223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;and the regex ares wasnt really using i was using that for testing i removed all that and tried its same problem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 20:31:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601557#M568223</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2011-02-09T20:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601558#M568224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you include the show run service-policy?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 21:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601558#M568224</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-09T21:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601559#M568225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes this is the result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run service-policy"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;BR /&gt;service-policy inside-policy-res-bandwidth interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 12:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601559#M568225</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2011-02-10T12:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601560#M568226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;have you tried applying the inspect http inside the global policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TITLE&gt;&lt;/TITLE&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;policy-map global_policy&lt;/P&gt;&lt;P class="p3"&gt;class httpaccess&lt;/P&gt;&lt;P class="p3"&gt;&amp;nbsp; inspect http http_inspec_pol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 14:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601560#M568226</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-10T14:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601561#M568227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i havent tried in global policy i will try that i let you know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 16:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601561#M568227</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2011-02-10T16:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601562#M568228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes i tried in the global policy still same problem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 20:11:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601562#M568228</guid>
      <dc:creator>jibinkg</dc:creator>
      <dc:date>2011-02-10T20:11:45Z</dc:date>
    </item>
    <item>
      <title>Block Certain Websites (URLs) Using Regular Expressions</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601563#M568229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jibbin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know it's been awhile, but wonder if you got solutions to your issues? I tried to do the same, want to block some cloud video service and internet radio like netflix, hulu, pandora...it seemed working great as for blocking those sites but at the same time it block certain web forms and active-X apps from other business sites (not on the url block lists) as well.&amp;nbsp; I can log on to hotmail, gmail and check &lt;/P&gt;&lt;P&gt;email no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 May 2012 16:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601563#M568229</guid>
      <dc:creator>vinlata2007</dc:creator>
      <dc:date>2012-05-03T16:05:54Z</dc:date>
    </item>
    <item>
      <title>Hey folks,i have also used</title>
      <link>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601564#M568230</link>
      <description>&lt;P&gt;Hey folks,&lt;/P&gt;&lt;P&gt;i have also used the same method and it just work fine additionally i have placed a small policy map on internet edge router which deprecate the required traffic which is identified by NBAR to dscp 1 and a url list which says nothing comins in with .torrent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;after this i have seen a huge difference in my network traffic which is aprox 289 Gigs IN and 345 Out the difference is from last 15 days.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2015 15:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-certain-websites-urls-using-regular-expressions/m-p/1601564#M568230</guid>
      <dc:creator>usman ali dar</dc:creator>
      <dc:date>2015-04-08T15:45:22Z</dc:date>
    </item>
  </channel>
</rss>

