<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow a URL through ASA using MPF in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521476#M611687</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;The difference in my case is the TCP port, it's not 80 but 533. Do I just replace eq www with eq 533 in the user-acl?&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;regex domainlist1 "\.google\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp host 192.168.233.119 any eq 533&lt;BR /&gt;access-list inside_url_filter extended permit tcp host 192.168.233.119 any eq 533&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any DomainAllowList&lt;BR /&gt;match regex domainlist1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map type inspect http match-all AllowDomainsClass&lt;BR /&gt;match not request header host regex class DomainAllowList&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic&lt;BR /&gt;match access-list inside_url_filter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy&lt;BR /&gt;&amp;nbsp; class AllowDomainsClass&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map inside-policy&lt;BR /&gt;class httptraffic&lt;BR /&gt;&amp;nbsp; inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This config only allow users using port 533 to browse to google.com only. If that is what you want to do, this is config will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate the answer if it solves your issue, so that future users can benefit from this thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kalo xeimwna...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 Sep 2010 18:29:42 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-09-13T18:29:42Z</dc:date>
    <item>
      <title>Allow a URL through ASA using MPF</title>
      <link>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521473#M611684</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to be able to allow access from a host in my internal network, 192.168.116.33 to gmail.com on TCP port 533.&lt;/P&gt;&lt;P&gt;The traffic is actually http but different port is used.&lt;/P&gt;&lt;P&gt;Is it possible to do this using MPF?&lt;/P&gt;&lt;P&gt;All other traffic should remain unaffected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521473#M611684</guid>
      <dc:creator>ahassiotis1</dc:creator>
      <dc:date>2019-03-11T18:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a URL through ASA using MPF</title>
      <link>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521474#M611685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it can be done.&lt;/P&gt;&lt;P&gt;But do you want to block all other http traffic on that port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://community.cisco.com/docs/DOC-1268"&gt;https://supportforums.cisco.com/docs/DOC-1268&lt;/A&gt; has all the possible scenarios you might need to implement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 15:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521474#M611685</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-09-13T15:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a URL through ASA using MPF</title>
      <link>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521475#M611686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pano,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've come accross your post.&lt;/P&gt;&lt;P&gt;The difference in my case is the TCP port, it's not 80 but 533. Do I just replace eq www with eq 533 in the user-acl?&lt;/P&gt;&lt;P&gt;I guess I also need a 'match not'.&lt;/P&gt;&lt;P&gt;Finally, do I need to configure my inside_access_in access-list to allow traffic as shown below? Or is this not necessary? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how I am thinking it should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regex domainlist1 "\.google\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp host 192.168.233.119 any eq 533&lt;BR /&gt;access-list inside_url_filter extended permit tcp host 192.168.233.119 any eq 533&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any DomainAllowList&lt;BR /&gt; match regex domainlist1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map type inspect http match-all AllowDomainsClass&lt;BR /&gt; match not request header host regex class DomainAllowList&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic&lt;BR /&gt; match access-list inside_url_filter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy&lt;BR /&gt;&amp;nbsp; class AllowDomainsClass&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map inside-policy&lt;BR /&gt; class httptraffic&lt;BR /&gt;&amp;nbsp; inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 16:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521475#M611686</guid>
      <dc:creator>ahassiotis1</dc:creator>
      <dc:date>2010-09-13T16:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a URL through ASA using MPF</title>
      <link>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521476#M611687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;The difference in my case is the TCP port, it's not 80 but 533. Do I just replace eq www with eq 533 in the user-acl?&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;regex domainlist1 "\.google\.com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp host 192.168.233.119 any eq 533&lt;BR /&gt;access-list inside_url_filter extended permit tcp host 192.168.233.119 any eq 533&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type regex match-any DomainAllowList&lt;BR /&gt;match regex domainlist1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map type inspect http match-all AllowDomainsClass&lt;BR /&gt;match not request header host regex class DomainAllowList&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map httptraffic&lt;BR /&gt;match access-list inside_url_filter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy&lt;BR /&gt;&amp;nbsp; class AllowDomainsClass&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop-connection log&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map inside-policy&lt;BR /&gt;class httptraffic&lt;BR /&gt;&amp;nbsp; inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This config only allow users using port 533 to browse to google.com only. If that is what you want to do, this is config will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate the answer if it solves your issue, so that future users can benefit from this thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kalo xeimwna...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 18:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521476#M611687</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-09-13T18:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a URL through ASA using MPF</title>
      <link>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521477#M611688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doesn't this config act on source IP 192.168.233.119 and destination port 533 only?&lt;/P&gt;&lt;P&gt;I would have thought all other souce users don't get inspected from this MFP config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I guess I still need the inside_access_in access list, right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 10:10:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521477#M611688</guid>
      <dc:creator>ahassiotis1</dc:creator>
      <dc:date>2010-09-14T10:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a URL through ASA using MPF</title>
      <link>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521478#M611689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;You are right. My tongue slipped when I said it is for all port 533. It is for source that ip to that port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interface ACL is still needed to allow what you need to allow in general on a per packet basis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it makes sense.&lt;/P&gt;&lt;P&gt;If it solves the issue please mark the question as answered so that other can benefit in the future from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 12:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-a-url-through-asa-using-mpf/m-p/1521478#M611689</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-09-14T12:56:40Z</dc:date>
    </item>
  </channel>
</rss>

