cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5389
Views
35
Helpful
26
Replies

Cisco ASA 5520 Blocking Specific URL

Cash2106
Level 1
Level 1

Hi there, Dear Members,

i am using Cisco ASA 5520 firewall in my company, i am using the ACL to block some specific traffic for some clients, which is working fine,

 

now i want to block specific websites through ASDm, can anyone help me how can i do that in Cisco ASDM, i will be really great full to all of you..

26 Replies 26

 

 

I tested ths in my lab.
!
 dns server-group TESTING
 name-server 8.8.8.8
 domain-name TESTING
!
ping facebook.com
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 157.240.29.35, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 180/186/200 ms

 

 

@Cash2106 here this link will help you to understand the blocking the ASA objects with fqdn

please do not forget to rate.

i did these steps, added dns group and all other required things but getting the invalid hostname error while pinging.

 

ciscoasa(config)# dns server-group DNS
ciscoasa(config-dns-server-group)# name-server 8.8.8.8
ciscoasa(config-dns-server-group)# domain-name DNS
ciscoasa(config-dns-server-group)# exit
ciscoasa# ping facebook.com
^
ERROR: % Invalid Hostname
ciscoasa#

you missing

domain-name TESTING
please do not forget to rate.

domain-name facebook.com

this is your company Local domain what ever,

 

on the ASA Make sure you have allowed rules to access google DNS  8.8.8.8

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

ASA traditional URL blocking is not robust. why dont you use ASA with firepower module and take the advantage of Layer7 traffic inspection and URL filtering. however having said that you need to buy the firepower subscription. by doing this you will have more control on your network.

please do not forget to rate.

@Sheraz.Salimthanks for your concern, currently i am using the Cisco 5520 which is end of life firewall and this also shows the budgeting condition of my company, they would never spend more for this thing, so this is the reason i am looking for this URL blocking solution. 

@Cash2106 yes i was blind not noticed that you using 5520 my bad. oh yes I can understand the budget at managment level.

please do not forget to rate.

Cash2106
Level 1
Level 1

both concern is really appreciated.

 

but your both instructions are confusing me and mixed up everything first it was about dns setup and now it comes to the acl. which making me really confused.

 

i will leave this thing because i am not getting it what exactly i am doing and what is the proper way to do .thanks to both of you ....

The concept is simple, try to understand and make it easy ( different people or engineers are having different views) - so they share their views and experience.

 

1. for ASA to work for FQDN

2. you need your DNS to work.

3. So make sure from ASA you able to resolve the DNS entries for the domain you looking to block.

4. So ASA should able to ping facebook.com before you make any ACL

 

here is the steps :

 

https://www.petenetlive.com/KB/Article/0000969

 

Hope until this clear,

 

5. Once DNS can resolve the facebook.com they start to apply the FQDN ACL to work.

 

As suggested this is not the best way for that model and ASA code, but that is nearby what you looking.

 

hope this make sense ?

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

@balaji.bandiyes everyone have different views, and i am not saying anyone wrong actually i am appreciating your both concern and your time you are spending here to make me understand.

yes the thing you mentioned is cleared now. and i will look into this. but what about the ACL you are talking about (ASA Make sure you have allowed rules to access google DNS 8.8.8.8), i have already created a ACL which blocks the traffic for specific users hitting the facebook, but i dont have such ACL you mentioned.

 

can you tell me how i can do that as well ..

@balaji.bandiyayyyyyy man .... you did it

 

ciscoasa# ping www.google.com
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 74.125.21.105, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 250/250/250 ms
ciscoasa# ping www.facebook.com
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 157.240.1.35, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 240/246/250 ms
ciscoasa# wr
Building configuration...

 

its working now...

 

at first i was doing dns-lookup command on inside interface and it didnt work. but this time i have done it with outside, and now its working..

 

but now my concern is ask about the ACL ((ASA Make sure you have allowed rules to access google DNS 8.8.8.8)) you mentioned earlier .. do i have to create the ACL ? how can i do that ? what will be the resource, destination, service and interface :$ !!! Please...

but now my concern is ask about the ACL ((ASA Make sure you have allowed rules to access google DNS 8.8.8.8)) you mentioned earlier .. do i have to create the ACL ? how can i do that ? what will be the resource, destination, service and interface :$ !!! Please...

since you are not able to resolve the DNS for 8.8.8.8 i have advised, now you able to resolve the DNS,.

 

so focus on your ACL for the FQDN you want to block - many examples provide all the post from the beginning,  spend 5min understand that ACL and apply.

 

Still not working post the complete show run. ( you can also use Packet tracer to check is this blocking or not, if you using ASDM)

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Review Cisco Networking for a $25 gift card