09-15-2014 11:35 AM - edited 03-11-2019 09:45 PM
I have a asa 55000 and have a server in dmz public with service running in http://xxxx.xxxx.xxxx:8080/mmcp/c but have problema becouse the user access to http://xxxx.xxxx.xxxx:80808 it is a appache server i am needed block this, only use full address
Solved! Go to Solution.
09-16-2014 01:08 AM
You could try using an ACL that matches on the FQDN of the web server. Something like the following:
name-server <dns server IP-1> <dns server IP-2>
object network WEB-SERVER
fqdn xxxx.xxxx.xxxx
access-list LAN-to-WEB deny tcp any object WEB-SERVER eq 80808
access-list LAN-to-WEB permit ip any any
access-group LAN-to-WEB in interface inside
If this is not what you are looking for then you can use regex to match on the URL string. But we can get into that later if we need to.
--
Please remember to select a correct answer and rate helpful posts
09-15-2014 12:53 PM
09-15-2014 01:25 PM
thank you
br
Marcelo
09-16-2014 01:08 AM
You could try using an ACL that matches on the FQDN of the web server. Something like the following:
name-server <dns server IP-1> <dns server IP-2>
object network WEB-SERVER
fqdn xxxx.xxxx.xxxx
access-list LAN-to-WEB deny tcp any object WEB-SERVER eq 80808
access-list LAN-to-WEB permit ip any any
access-group LAN-to-WEB in interface inside
If this is not what you are looking for then you can use regex to match on the URL string. But we can get into that later if we need to.
--
Please remember to select a correct answer and rate helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide