<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering - Command Line Issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648871#M604555</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the very last section in that link. I didn't have a problem when I copied and pasted the line that gave you trouble.&lt;/P&gt;&lt;P&gt;Anyway the below is what you need. You can pretty much copy and paste the below lines. Let me know if this works to block facebook except for this IP add 10.10.2.100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list user-acl extended deny tcp host 10.10.2.100 any eq www&lt;/P&gt;&lt;P&gt;access-list user-acl extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex block-fb ".*facebook\.com"&lt;BR /&gt;class-map type regex &lt;STRONG style="color: #ff0000;"&gt;match-any&lt;/STRONG&gt; block-fb &lt;BR /&gt;&amp;nbsp;&amp;nbsp; match regex block-fb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http-inspect-pol &lt;BR /&gt;&amp;nbsp;&amp;nbsp; parameters &lt;BR /&gt; match request header host regex class block-fb &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; reset log &lt;BR /&gt; &lt;BR /&gt;class-map http-class &lt;BR /&gt;&amp;nbsp;&amp;nbsp; match access-list user-acl&lt;BR /&gt; &lt;BR /&gt;policy-map http-traffic &lt;BR /&gt;&amp;nbsp;&amp;nbsp; class http-class &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect http http-inspect-pol &lt;BR /&gt;! &lt;BR /&gt;service-policy http-traffic interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 27 Dec 2010 18:50:43 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-12-27T18:50:43Z</dc:date>
    <item>
      <title>URL Filtering - Command Line Issues</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648867#M604551</link>
      <description>&lt;P&gt;Hello - I'm a complete novice when it comes to configuring via the command line, but I am trying my best to learn.&amp;nbsp; We have a Cisco ASA 5505 and would like to configure it using a Cisco provided solution for URL filtering.&amp;nbsp; At this moment we only have one URL that we need to filter, but access needs to be permitted for certain computers and disallowed for the rest. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The commands that were give are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex blockex1 "facebook\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list user-acl extended deny tcp host 10.10.2.100 any eq www&lt;/P&gt;&lt;P&gt;access-list user-acl extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-any block-url-class&lt;/P&gt;&lt;P&gt; match request header host regex blockfb&lt;/P&gt;&lt;P&gt;class-map block-user-class&lt;/P&gt;&lt;P&gt; match access-list user-acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http block-url-policy&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; class block-url-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop-connection&lt;/P&gt;&lt;P&gt;policy-map block-user-url-policy&lt;/P&gt;&lt;P&gt; class block-user-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http block-url-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy block-user-url-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First - I don't understand why they would put the IP that should be allowed to access the restricted URL in a access list labeled as 'deny'.&amp;nbsp; Secondly, when I try to run the second set of commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-any block-url-class&lt;/P&gt;&lt;P&gt; match request header host regex blockfb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They will not run via command line or via the CLI in ASDM.&amp;nbsp; It gives me unrecognized or invalid input detected error.&amp;nbsp; The second class-map command ran perfectly fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose a problem of mine may be that I do not understand how to handle the indentation of commands.&amp;nbsp; For example, we have&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-any block-url-class&lt;/P&gt;&lt;P&gt; match request header host regex blockfb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to enter each line individually or is the 'match...' line supposed to be immediately following the first line on the same command line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are able to help in any way it would be greatly appreciated.&amp;nbsp; Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648867#M604551</guid>
      <dc:creator>jrennard3</dc:creator>
      <dc:date>2019-03-11T19:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering - Command Line Issues</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648868#M604552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First - I don't understand why they would put the IP that should be&amp;nbsp; allowed to access the restricted URL in a access list labeled as&amp;nbsp; 'deny'.&amp;nbsp; Secondly, when I try to run the second set of commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;You need a "deny" because only then that traffic will be "denied" from being inspected and then blocked when going to facebook.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect http match-any block-url-class&lt;/P&gt;&lt;P&gt;match request header host regex blockfb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Where does it give you the invalid input detected?&amp;nbsp; You would see a ^ where do you see that? Pls. get on CLI and do a conf t and copy and paste these lines and copy and paste the output that you are seeing. I added a sample in this document a while ago. See if this helps you. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1268"&gt;https://supportforums.cisco.com/docs/DOC-1268#Same_domain_allowdeny&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Dec 2010 18:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648868#M604552</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-27T18:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering - Command Line Issues</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648869#M604553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response - the document you attached is the exact one that I am using.&amp;nbsp; When I am connected via CLI, I am running under the enabled configuration.&amp;nbsp; Is this correct?&amp;nbsp; Also, I am using Putty and SSH.&amp;nbsp; Should I be connecting a different way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the response I receive:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ciscoasa(config)# class-map type inspect http match-any block-url-class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ERROR: % Invalid input detected at '^' marker.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Dec 2010 18:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648869#M604553</guid>
      <dc:creator>jrennard3</dc:creator>
      <dc:date>2010-12-27T18:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering - Command Line Issues</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648870#M604554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems that the forum formatted my error incorrectly - the '^' is actually right under the 'b' in 'block-ur&lt;/P&gt;&lt;P&gt;l-class'.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Dec 2010 18:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648870#M604554</guid>
      <dc:creator>jrennard3</dc:creator>
      <dc:date>2010-12-27T18:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering - Command Line Issues</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648871#M604555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the very last section in that link. I didn't have a problem when I copied and pasted the line that gave you trouble.&lt;/P&gt;&lt;P&gt;Anyway the below is what you need. You can pretty much copy and paste the below lines. Let me know if this works to block facebook except for this IP add 10.10.2.100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list user-acl extended deny tcp host 10.10.2.100 any eq www&lt;/P&gt;&lt;P&gt;access-list user-acl extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex block-fb ".*facebook\.com"&lt;BR /&gt;class-map type regex &lt;STRONG style="color: #ff0000;"&gt;match-any&lt;/STRONG&gt; block-fb &lt;BR /&gt;&amp;nbsp;&amp;nbsp; match regex block-fb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http-inspect-pol &lt;BR /&gt;&amp;nbsp;&amp;nbsp; parameters &lt;BR /&gt; match request header host regex class block-fb &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; reset log &lt;BR /&gt; &lt;BR /&gt;class-map http-class &lt;BR /&gt;&amp;nbsp;&amp;nbsp; match access-list user-acl&lt;BR /&gt; &lt;BR /&gt;policy-map http-traffic &lt;BR /&gt;&amp;nbsp;&amp;nbsp; class http-class &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect http http-inspect-pol &lt;BR /&gt;! &lt;BR /&gt;service-policy http-traffic interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Dec 2010 18:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-command-line-issues/m-p/1648871#M604555</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-27T18:50:43Z</dc:date>
    </item>
  </channel>
</rss>

