<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how to configure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494386#M856582</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: ZurichBT-Bold; "&gt;how to configure the below mentioned ports for the mentioned IPs of webroot proxy on the PIX firewall, so that &lt;SPAN style="font-size: 11pt; color: #1f497d; font-family: &amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"&gt;all inside host should have their browser to use the proxy server, and get to browse the internet after authentication. They will not be able to browse the internet without going through the proxy server. Any other traffic will be denied.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: ZurichBT-Bold; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Open TCP ports: 80, 443, 3128,8080 to the following range 208.87.137.0 - 208.87.137.255 and 208.87.136.0 - 208.87.136.255&amp;nbsp; and &lt;/SPAN&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN style="font-family: ZurichBT-Bold;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;Open TCP ports: 3128 and 8080 to the following IP’s and IP Ranges 194.116.198.0 - 194.116.198.255&amp;nbsp; and 79.125.8.156.&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P align="left"&gt;Thanks in advance for your help.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:59:02 GMT</pubDate>
    <dc:creator>tuhinbhowmick</dc:creator>
    <dc:date>2019-03-11T17:59:02Z</dc:date>
    <item>
      <title>how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494386#M856582</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: ZurichBT-Bold; "&gt;how to configure the below mentioned ports for the mentioned IPs of webroot proxy on the PIX firewall, so that &lt;SPAN style="font-size: 11pt; color: #1f497d; font-family: &amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"&gt;all inside host should have their browser to use the proxy server, and get to browse the internet after authentication. They will not be able to browse the internet without going through the proxy server. Any other traffic will be denied.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: ZurichBT-Bold; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Open TCP ports: 80, 443, 3128,8080 to the following range 208.87.137.0 - 208.87.137.255 and 208.87.136.0 - 208.87.136.255&amp;nbsp; and &lt;/SPAN&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN style="font-family: ZurichBT-Bold;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;Open TCP ports: 3128 and 8080 to the following IP’s and IP Ranges 194.116.198.0 - 194.116.198.255&amp;nbsp; and 79.125.8.156.&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P align="left"&gt;Thanks in advance for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494386#M856582</guid>
      <dc:creator>tuhinbhowmick</dc:creator>
      <dc:date>2019-03-11T17:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494387#M856583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tuhin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl-inside permit ip host &amp;lt;&lt;PROXY server="" ip="" address=""&gt;&amp;gt; any&lt;/PROXY&gt;&lt;/P&gt;&lt;P&gt;access-list acl-inside deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl-inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above allows ALL traffic from the Proxy Server ONLY to go to the internet. All other hosts will be dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 12:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494387#M856583</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2010-06-14T12:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494388#M856584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find below the configuratin that we have made(all the IPs and ports as requested).....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any 194.116.198.0 255.255.255.0 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any 194.116.198.0 255.255.255.0 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any 203.100.58.0 255.255.255.0 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any 203.100.58.0 255.255.255.0 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.136.0 255.255.255.0 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.136.0 255.255.255.0 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.136.0 255.255.255.0 eq https&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.136.0 255.255.255.0 eq www&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.137.0 255.255.255.0 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.137.0 255.255.255.0 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.137.0 255.255.255.0 eq https&lt;BR /&gt;access-list 102 extended permit tcp any 208.87.137.0 255.255.255.0 eq www&lt;BR /&gt;access-list 102 extended permit tcp any host 175.41.133.17 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 175.41.133.17 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.8.156 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.8.156 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.75 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.75 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.76 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.76 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.78 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.78 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.79 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 79.125.21.79 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.28.79 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.28.79 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.209.130 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.209.130 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.209.149 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.209.149 eq 8080&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.243.180 eq 3128&lt;BR /&gt;access-list 102 extended permit tcp any host 174.129.243.180 eq 8080&lt;/P&gt;&lt;P&gt;access-group 102 in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we havn't applied any deny rule......bcoz PIX ACL has an implicit "deny all" at the end of the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so waiting for your suggestion......&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 13:26:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494388#M856584</guid>
      <dc:creator>tuhinbhowmick</dc:creator>
      <dc:date>2010-06-14T13:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494389#M856585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You configured ACL will allow ALL inside hosts access to the IP address using the TCP port numbers.&amp;nbsp; You stated in the description of this question:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"All inside host should have their browser to use the proxy server, and get to browse the internet after authentication"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;And&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"They will not be able to browse the internet without going through the proxy server. Any other traffic will be denied"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your access list does not do any of the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are your actual requirements?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 13:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494389#M856585</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2010-06-14T13:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494390#M856586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;All inside host should have their browser to use the proxy server, and get to browse the internet after authentication"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;And&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"They will not be able to browse the internet without going through the proxy server. Any other traffic will be denied"......&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Yes this is my exact requirement...........&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;so what i suppoed to do then......please suggest..........&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 14:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494390#M856586</guid>
      <dc:creator>tuhinbhowmick</dc:creator>
      <dc:date>2010-06-14T14:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494391#M856587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you need to do is:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Allow the Proxy Server IP address access to the internet&lt;/P&gt;&lt;P&gt;2) Deny inside hosts access to the internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lets say you proxy server IP address is 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list acl-inside permit ip host 192.168.1.1 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list acl-inside deny ip any any log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group acl-inside in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will allow Proxy server 192.168.1.1 UNLIMITED access to the internet&lt;/P&gt;&lt;P&gt;and DENY ALL OTHER IP addresses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 14:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494391#M856587</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2010-06-14T14:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494392#M856588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your guidance Andrew.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have received the below requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1a00cd; font-size: 12pt; font-family: Chalet-NewYorkNineteenSixty-Ide; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;SPAN style="font-size: 8pt; font-family: ZurichBT-Light; "&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Configured your network to use the Managed Web Filtering Service, you should lock down&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 10pt;"&gt;your firewall to prevent your users from bypassing the Web Filtering Service and connecting directly to the internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1a00cd; font-family: Chalet-LondonNineteenSixty-Iden;"&gt;&lt;SPAN style="color: #1a00cd; font-family: Chalet-LondonNineteenSixty-Iden;"&gt;&lt;SPAN style="color: #1a00cd; font-family: Chalet-LondonNineteenSixty-Iden;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;SPAN style=": ; font-family: Chalet-LondonNineteenSixty-Iden; font-color: #1a00cd; "&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style=": ; font-family: Chalet-LondonNineteenSixty-Iden; font-color: #1a00cd; "&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="font-color: #1a00cd; font-family: Chalet-LondonNineteenSixty-Iden; "&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;STRONG style="font-family: ZurichBT-Bold; "&gt;&lt;SPAN style="font-family: ZurichBT-Bold;"&gt;Open TCP ports: 80, 443, 3128,&lt;STRONG style=": ; font-family: ZurichBT-Bold; "&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left"&gt;8080 to the following range&lt;/P&gt;&lt;P align="left"&gt;[and 389 if you intend to use&lt;/P&gt;&lt;P align="left"&gt;LDAP lookups]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG style=": ; font-family: ZurichBT-Bold; "&gt;&lt;P&gt;&lt;/P&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H;"&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H; "&gt;&lt;P&gt;208.87.136.0 - 208.87.136.255 and 208.87.137.0 - 208.87.137.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style=": ; font-family: ZurichBT-Light-Identity-H; "&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: ZurichBT-Light-Identity-H; "&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; font-size: 8pt; font-family: ZurichBT-Bold; "&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Open TCP ports:&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 10pt;"&gt;3128 and 8080 to the following&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 10pt;"&gt;IP’s and IP Ranges&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;194.116.198.0 - 194.116.198.255 , 203.100.58.0 - 203.100.58.255 , 174.129.243.180 , 79.125.21.75 , 79.125.8.156&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, please let us know whether our understanding is correct or not ? If yes... then we are going to apply the ACL you have just mentioned....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 14:35:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494392#M856588</guid>
      <dc:creator>tuhinbhowmick</dc:creator>
      <dc:date>2010-06-14T14:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494393#M856589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahh OK - now I understand I was under the impression the proxy server was on the LAN.&amp;nbsp; Now I understand the proxy server is WEB based&lt;/P&gt;&lt;P&gt; and on the internet.&amp;nbsp; OK - I would configure the below, it's cleaner for me at least.:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network WebProxyServers&lt;BR /&gt; network-object 194.116.198.0 255.255.255.0&lt;BR /&gt; network-object 203.100.58.0 255.255.255.0&lt;BR /&gt; network-object 208.87.136.0 255.255.255.0&lt;BR /&gt; network-object 208.87.137.0 255.255.255.0&lt;BR /&gt; network-object host 174.129.143.180&lt;/P&gt;&lt;P&gt; network-object host 79.125.21.75&lt;BR /&gt; network-object host 79.125.8.156&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service WebProxy tcp&lt;BR /&gt; port-object eq 80&lt;BR /&gt; port-object eq 389&lt;BR /&gt; port-object eq 443&lt;BR /&gt; port-object eq 3128&lt;BR /&gt; port-object eq 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Web_Proxy extended permit tcp any object-group WebProxyServers object-group WebProxy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Web_Proxy in interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 14:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494393#M856589</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2010-06-14T14:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: how to configure</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494394#M856590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it is good for me as well that atlast i am able to give you the exact scenarion infront of you......thanks for your support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 15:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure/m-p/1494394#M856590</guid>
      <dc:creator>tuhinbhowmick</dc:creator>
      <dc:date>2010-06-14T15:09:58Z</dc:date>
    </item>
  </channel>
</rss>

