<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Web filtering for IP ranges in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633225#M581080</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ive gotten the configuration you gave me into the router except for one portion of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect in-out &lt;BR /&gt;class&amp;nbsp; http-filter&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; urlfilter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to load&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; policy-map type inspect in-out &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class&amp;nbsp; http-filter&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;but when i try to add the command urlfilter the console gives me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; % Incomplete command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing this is where the actual filtering is done because the firewall is not filtering at this point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I also wanted to check that like other cisco services there is an implicit deny for things unspecified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if i configure the firewall as such :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parameter-map type urlfilter http-filter &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; allow-mode on&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow google.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow hotmail.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow gmail.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then all the other sites should be blocked right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or do I have to use a wildcard and actually block along the lines of&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain deny *&lt;/P&gt;&lt;P&gt;after my allowances?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elliott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Mar 2011 09:31:36 GMT</pubDate>
    <dc:creator>elliott callaway</dc:creator>
    <dc:date>2011-03-07T09:31:36Z</dc:date>
    <item>
      <title>Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633218#M581073</link>
      <description>&lt;P&gt;Alright, well I have a Cisco 891w router and have just about everything up and ready to deploy. I'm primarily using Cisco CP 2.4 to provision the router with minor tweaks being done in the CLI. I want to set up a filter to allow access to roughly 20 websites for the majority of my network which is all on the same VLAN. The ip ranges are x.x.x.10 - x.x.x.169 which I have set into a Network Object group called limitac. The second group ranges at x.x.x.170 - x.x.x.199 and is called allowac. I have set up DHCP bindings for all the devices that will connect to the network but I want to set up a web filter for only the first group. I cannot seem to find anything in the Cisco CP manual or the IOS manual for setting up filtering for a range of IPs only.&lt;/P&gt;&lt;P&gt;Is there a way that I can set this up?&lt;/P&gt;&lt;P&gt;Primarily there are a few computers that need full access to the web while the others should only have access to the sites I set up in the filter.&lt;/P&gt;&lt;P&gt;Need some help here to figure this out&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elliott&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633218#M581073</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2019-03-11T19:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633219#M581074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well do you have any kind of firewall configured at this point? If so, please paste the configuration. This can only be accomplished with Zone based firewall (As far as I know) where you define a class which will match an ACL with the desired hosts. Then a class map and then the action would be inspect http and separetly you will need to create a parameter map including the websites you want to permit/deny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Feb 2011 05:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633219#M581074</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-02-26T05:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633220#M581075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow thanks for the timely response usually I have to wait a bit to get responses on the boards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, I do have a zone based firewall configured, I will post my running config here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have inserted a &amp;lt;&amp;gt; to remove non important info in order to help isolate the problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 14685 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.4&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;!&lt;BR /&gt;hostname Xior&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-1848013357&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-1848013357&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-1848013357&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-1848013357&lt;BR /&gt; certificate self-signed 01&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;no ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool ccp-pool1&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; client-identifier 0184.2b2b.4946.cb&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ip bootp server&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;parameter-map type protocol-info yahoo-servers&lt;BR /&gt; server name scs.msg.yahoo.com&lt;BR /&gt; server name scsa.msg.yahoo.com&lt;BR /&gt; server name scsb.msg.yahoo.com&lt;BR /&gt; server name scsc.msg.yahoo.com&lt;BR /&gt; server name scsd.msg.yahoo.com&lt;BR /&gt; server name cs16.msg.dcn.yahoo.com&lt;BR /&gt; server name cs19.msg.dcn.yahoo.com&lt;BR /&gt; server name cs42.msg.dcn.yahoo.com&lt;BR /&gt; server name cs53.msg.dcn.yahoo.com&lt;BR /&gt; server name cs54.msg.dcn.yahoo.com&lt;BR /&gt; server name ads1.vip.scd.yahoo.com&lt;BR /&gt; server name radio1.launch.vip.dal.yahoo.com&lt;BR /&gt; server name in1.msg.vip.re2.yahoo.com&lt;BR /&gt; server name data1.my.vip.sc5.yahoo.com&lt;BR /&gt; server name address1.pim.vip.mud.yahoo.com&lt;BR /&gt; server name edit.messenger.yahoo.com&lt;BR /&gt; server name messenger.yahoo.com&lt;BR /&gt; server name http.pager.yahoo.com&lt;BR /&gt; server name privacy.yahoo.com&lt;BR /&gt; server name csa.yahoo.com&lt;BR /&gt; server name csb.yahoo.com&lt;BR /&gt; server name csc.yahoo.com&lt;/P&gt;&lt;P&gt;parameter-map type protocol-info aol-servers&lt;BR /&gt; server name login.oscar.aol.com&lt;BR /&gt; server name toc.oscar.aol.com&lt;BR /&gt; server name oam-d09a.blue.aol.com&lt;/P&gt;&lt;P&gt;parameter-map type protocol-info msn-servers&lt;BR /&gt; server name messenger.hotmail.com&lt;BR /&gt; server name gateway.messenger.hotmail.com&lt;BR /&gt; server name webmessenger.msn.com&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;object-group network allow &lt;BR /&gt; range 10.10.10.170 10.10.10.200&lt;BR /&gt;!&lt;BR /&gt;object-group network limitnet &lt;BR /&gt; range 10.10.10.10 10.10.10.169&lt;BR /&gt;!&lt;BR /&gt;username elliott privilege 15 secret 5 $1$yqTr$PzTwtiSFYqaGaKziUxOsA0&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh authentication-retries 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any ccp-skinny-inspect&lt;BR /&gt; match protocol skinny&lt;BR /&gt;class-map type inspect match-any CCP-Voice-permit&lt;BR /&gt; match protocol h323&lt;BR /&gt; match protocol skinny&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt; match protocol cuseeme&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol netshow&lt;BR /&gt; match protocol shell&lt;BR /&gt; match protocol realmedia&lt;BR /&gt; match protocol rtsp&lt;BR /&gt; match protocol smtp extended&lt;BR /&gt; match protocol sql-net&lt;BR /&gt; match protocol streamworks&lt;BR /&gt; match protocol tftp&lt;BR /&gt; match protocol vdolive&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt; match class-map ccp-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-any ccp-h323nxg-inspect&lt;BR /&gt; match protocol h323-nxg&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-any ccp-cls-protocol-im&lt;BR /&gt; match protocol ymsgr yahoo-servers&lt;BR /&gt; match protocol msnmsgr msn-servers&lt;BR /&gt; match protocol aol aol-servers&lt;BR /&gt;class-map type inspect match-any ccp-h225ras-inspect&lt;BR /&gt; match protocol h225ras&lt;BR /&gt;class-map type inspect match-any ccp-h323annexe-inspect&lt;BR /&gt; match protocol h323-annexe&lt;BR /&gt;class-map type inspect match-any denyweb&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt;class-map type inspect match-all ccp-cls-ccp-permit-1&lt;BR /&gt; match class-map denyweb&lt;BR /&gt; match access-group name limit&lt;BR /&gt;class-map type inspect match-any ccp-h323-inspect&lt;BR /&gt; match protocol h323&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt; match class-map ccp-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all ccp-invalid-src&lt;BR /&gt; match access-group 100&lt;BR /&gt;class-map type inspect match-any ccp-sip-inspect&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-all ccp-protocol-http&lt;BR /&gt; match protocol http&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt; class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt; class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt; class type inspect ccp-protocol-http&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-sip-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h323-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h323annexe-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h225ras-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h323nxg-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-skinny-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet5&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet6&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet7&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet8&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;interface wlan-ap0&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;interface Wlan-GigabitEthernet0&lt;BR /&gt; description Internal switch interface connecting to the embedded AP&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt; ip tcp adjust-mss 1412&lt;BR /&gt;!&lt;BR /&gt;interface Async1&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt; zone-member security out-zone&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 23&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;ip flow-top-talkers&lt;BR /&gt; top 30&lt;BR /&gt; sort-by bytes&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface Dialer0 overload&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended limit&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip object-group limitnet any&lt;BR /&gt;!&lt;BR /&gt;logging trap debugging&lt;BR /&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit x.x.x.0 0.0.0.255&lt;BR /&gt;access-list 100 remark CCP_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 remark denyweb&lt;BR /&gt;access-list 101 remark CCP_ACL Category=1&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; login local&lt;BR /&gt; transport output telnet&lt;BR /&gt;line 1&lt;BR /&gt; modem InOut&lt;BR /&gt; stopbits 1&lt;BR /&gt; speed 115200&lt;BR /&gt; flowcontrol hardware&lt;BR /&gt;line 2&lt;BR /&gt; no activation-character&lt;BR /&gt; no exec&lt;BR /&gt; transport preferred none&lt;BR /&gt; transport input all&lt;BR /&gt; transport output pad telnet rlogin udptn ssh&lt;BR /&gt;line aux 0&lt;BR /&gt; login local&lt;BR /&gt; transport output telnet&lt;BR /&gt;line vty 0 4&lt;BR /&gt; privilege level 15&lt;BR /&gt; login local&lt;BR /&gt; transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt; privilege level 15&lt;BR /&gt; login local&lt;BR /&gt; transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler max-task-time 5000&lt;BR /&gt;scheduler allocate 4000 1000&lt;BR /&gt;scheduler interval 500&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall is pretty simple and some help getting it configured would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elliott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Feb 2011 05:41:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633220#M581075</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2011-02-26T05:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633221#M581076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cannot seem to find a parameter map setting in the Cisco CP software. So how do I go about doing this through the IOS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 03:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633221#M581076</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2011-02-28T03:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633222#M581077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elliot, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type urlfilter http-filter &lt;/P&gt;&lt;P&gt; allow-mode on&lt;/P&gt;&lt;P&gt;&amp;nbsp; exclusive-domain deny google.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp host 192.168.10.2 any eq 80&lt;/P&gt;&lt;P&gt;access-list 102 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http-filter&lt;/P&gt;&lt;P&gt; match access-group 101 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect internet-access&lt;/P&gt;&lt;P&gt; match access-group 102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect in-out &lt;/P&gt;&lt;P&gt; class&amp;nbsp; http-filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; urlfilter &lt;/P&gt;&lt;P&gt; class internet-access&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security source in-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect in-out &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this configuration, the host 192.168.80.2 should not be able to access google.com, however, the rest of the people should be able to access it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry that I did not answer this faster, it has been a very rough week.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 02:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633222#M581077</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-05T02:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633223#M581078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;beautiful thank you so much, im going to throw this into my configuration into a couple of hours, I just needed to see the format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you so much. im going to mark this thread as answered later tonight after my testing is complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;its ok that you didnt answer sooner, i had many other things i had to take care of so its not a big deal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elliott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 03:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633223#M581078</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2011-03-05T03:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633224#M581079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elliot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anything happens just let me know, will be more than glad to help you out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 06:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633224#M581079</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-05T06:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633225#M581080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ive gotten the configuration you gave me into the router except for one portion of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect in-out &lt;BR /&gt;class&amp;nbsp; http-filter&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; urlfilter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to load&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; policy-map type inspect in-out &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class&amp;nbsp; http-filter&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;but when i try to add the command urlfilter the console gives me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; % Incomplete command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing this is where the actual filtering is done because the firewall is not filtering at this point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I also wanted to check that like other cisco services there is an implicit deny for things unspecified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if i configure the firewall as such :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parameter-map type urlfilter http-filter &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; allow-mode on&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow google.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow hotmail.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow gmail.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then all the other sites should be blocked right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or do I have to use a wildcard and actually block along the lines of&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain deny *&lt;/P&gt;&lt;P&gt;after my allowances?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elliott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Mar 2011 09:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633225#M581080</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2011-03-07T09:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633226#M581081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, sorry &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; forgot one command there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect in-out &lt;BR /&gt;class&amp;nbsp; http-filter&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; urlfilter http-filter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to allow those sites:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow hotmail.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exclusive-domain allow gmail.com&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt; On the parameter-map, instead of allow-mode on, put allow-mode off, that would block the rest of the sites that you are not specifying in the exclusive domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 04:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633226#M581081</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-08T04:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633227#M581082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I changed allow mode to off&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when I get into Router 9config-pmap-c) #&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i tried&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; urlf http-filter&lt;/P&gt;&lt;P&gt;%Protocol "http" not found in class-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So should I change the name of the class-map filter?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess I'll try that and see how it goes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again for your time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elliott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edit*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this did not work either, I guess I am missing something somewhere else to get the %Protocol "http" not found in class-map&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 05:12:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633227#M581082</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2011-03-08T05:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633228#M581083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I know what went wrong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp host 192.168.10.2 any eq 80&lt;/P&gt;&lt;P&gt;access-list 102 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all http-filter&lt;/P&gt;&lt;P&gt;match access-group 101&lt;/P&gt;&lt;P&gt;match protocol http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect internet-access&lt;/P&gt;&lt;P&gt;match access-group 102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect in-out&lt;/P&gt;&lt;P&gt;class&amp;nbsp; http-filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; urlfilter http-filter&lt;/P&gt;&lt;P&gt;class internet-access&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 05:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633228#M581083</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-08T05:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633229#M581084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Commands are in, but there is no filtering being done the specified IP&lt;/P&gt;&lt;P&gt;I'll post my updated sh ru with non-essential info being pulled out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type urlfilter http-filter&lt;BR /&gt; exclusive-domain permit &amp;lt;***&amp;gt;&lt;BR /&gt; exclusive-domain permit 218.21.97.231&lt;BR /&gt; exclusive-domain permit 126.com&lt;BR /&gt; exclusive-domain permit &amp;lt;***&amp;gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;parameter-map type urlfilter allowesites&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;object-group network allowac&lt;BR /&gt; range 10.10.10.170 10.10.10.200&lt;BR /&gt;!&lt;BR /&gt;object-group network limitnet&lt;BR /&gt; range 10.10.10.15 10.10.10.169&lt;BR /&gt;!&lt;BR /&gt;username &amp;lt;***&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any ccp-skinny-inspect&lt;BR /&gt; match protocol skinny&lt;BR /&gt;class-map type inspect match-any CCP-Voice-permit&lt;BR /&gt; match protocol h323&lt;BR /&gt; match protocol skinny&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt; match protocol cuseeme&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol netshow&lt;BR /&gt; match protocol shell&lt;BR /&gt; match protocol realmedia&lt;BR /&gt; match protocol rtsp&lt;BR /&gt; match protocol smtp extended&lt;BR /&gt; match protocol sql-net&lt;BR /&gt; match protocol streamworks&lt;BR /&gt; match protocol tftp&lt;BR /&gt; match protocol vdolive&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt; match class-map ccp-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-any ccp-h323nxg-inspect&lt;BR /&gt; match protocol h323-nxg&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all internet-access&lt;BR /&gt; match access-group 102&lt;BR /&gt;class-map type inspect match-all http-filter&lt;BR /&gt; match access-group 101&lt;BR /&gt; match protocol http&lt;BR /&gt;class-map type inspect match-any ccp-h225ras-inspect&lt;BR /&gt; match protocol h225ras&lt;BR /&gt;class-map type inspect match-any ccp-h323annexe-inspect&lt;BR /&gt; match protocol h323-annexe&lt;BR /&gt;class-map type inspect match-any denyweb&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt;class-map type inspect match-all ccp-cls-ccp-permit-1&lt;BR /&gt; match class-map denyweb&lt;BR /&gt; match access-group name limit&lt;BR /&gt;class-map type inspect match-any ccp-h323-inspect&lt;BR /&gt; match protocol h323&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt; match class-map ccp-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all ccp-invalid-src&lt;BR /&gt; match access-group 100&lt;BR /&gt;class-map type inspect match-any ccp-sip-inspect&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-all ccp-protocol-http&lt;BR /&gt; match protocol http&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt; class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt; class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt; class type inspect ccp-protocol-http&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-sip-inspect&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-h323-inspect&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-h323annexe-inspect&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-h225ras-inspect&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-h323nxg-inspect&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-skinny-inspect&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect in-out&lt;BR /&gt; class type inspect http-filter&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp; urlfilter http-filter&lt;BR /&gt; class type inspect internet-access&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;lt;***&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet8&lt;BR /&gt; description $ES_WAN$$FW_OUTSIDE$&lt;BR /&gt; no ip address&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; pppoe enable group global&lt;BR /&gt; pppoe-client dial-pool-number 1&lt;BR /&gt;!&lt;BR /&gt;interface wlan-ap0&lt;BR /&gt; description Service module interface to manage the embedded AP&lt;BR /&gt; ip unnumbered Vlan1&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; arp timeout 0&lt;BR /&gt;!&lt;BR /&gt;interface Wlan-GigabitEthernet0&lt;BR /&gt; description Internal switch interface connecting to the embedded AP&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description $ETH-SW-LAUNCH$$INTF-INFO-FE 1$$ES_LAN$$FW_INSIDE$&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt; ip tcp adjust-mss 1412&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;***&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt; description $FW_OUTSIDE$&lt;BR /&gt; ip address negotiated&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip mtu 1452&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security out-zone&lt;BR /&gt; encapsulation ppp&lt;BR /&gt; dialer pool 1&lt;BR /&gt; dialer-group 1&lt;BR /&gt; no cdp enable&lt;BR /&gt; ppp authentication chap pap callin&lt;BR /&gt; ppp ***&lt;BR /&gt; ppp ***&lt;BR /&gt; ppp ***&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 23&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;ip flow-top-talkers&lt;BR /&gt; top 30&lt;BR /&gt; sort-by bytes&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface Dialer0 overload&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended limit&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip object-group limitnet any&lt;BR /&gt;!&lt;BR /&gt;logging trap debugging&lt;BR /&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit 10.10.10.0 0.0.0.255&lt;BR /&gt;access-list 100 remark CCP_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 permit tcp host 10.10.10.15 0.0.0.169 255.255.255.0 eq www&lt;BR /&gt;access-list 101 permit tcp host 10.10.10.150 any eq www&lt;BR /&gt;access-list 102 permit ip any any&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; login local&lt;BR /&gt; transport output telnet&lt;BR /&gt;line 1&lt;BR /&gt; modem InOut&lt;BR /&gt; stopbits 1&lt;BR /&gt; speed 115200&lt;BR /&gt; flowcontrol hardware&lt;BR /&gt;line 2&lt;BR /&gt; no activation-character&lt;BR /&gt; no exec&lt;BR /&gt; transport preferred none&lt;BR /&gt; transport input all&lt;BR /&gt; transport output pad telnet rlogin udptn ssh&lt;BR /&gt;line aux 0&lt;BR /&gt; login local&lt;BR /&gt; transport output telnet&lt;BR /&gt;line vty 0 4&lt;BR /&gt; privilege level 15&lt;BR /&gt; login local&lt;BR /&gt; transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt; privilege level 15&lt;BR /&gt; login local&lt;BR /&gt; transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler max-task-time 5000&lt;BR /&gt;scheduler allocate 4000 1000&lt;BR /&gt;scheduler interval 500&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really feels like we almost got it here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again for all your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;elliott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 05:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633229#M581084</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2011-03-08T05:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633230#M581085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have an issue, you did managed to put it on the configuration, however, it is not applied, if you take a look at the configuration that you have right now, the Policy that is applied from inside to outside is the ccp-inspect and not the in-out that we created. You can do one of two things...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the policy map ccp-inspect&amp;nbsp; add the class maps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class type inspect http-filter&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp; urlfilter http-filter&lt;BR /&gt; class type inspect internet-access&lt;BR /&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only problem with this is that you need to make sure that they are on the top (I guess you can easily move them around using CCP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other one would be using the whole policy that we created on the service policy, in that case you would need to do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt;&amp;nbsp; no service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy type inspect in-out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 06:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633230#M581085</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-08T06:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633231#M581086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;GENIUS!!!!!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marking this topic as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You sir are a life saver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cured my 1 month headache&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 06:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633231#M581086</guid>
      <dc:creator>elliott callaway</dc:creator>
      <dc:date>2011-03-08T06:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: Web filtering for IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633232#M581087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hehehehe, &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; I am glad I was able to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 17:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-for-ip-ranges/m-p/1633232#M581087</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-08T17:20:13Z</dc:date>
    </item>
  </channel>
</rss>

