02-16-2009 05:25 AM - edited 03-11-2019 07:51 AM
I am having trouble blocking HTTP/HTTPS access to just certain subnets within my network. The following is what I have tried and it doesn't seem to work.
access-list acl_insideint permit tcp object-group Servers object-group WebProtocols any
access-list acl_insideint deny tcp any object-group WebProtocols any
access-list acl_insideint permit ip any any
The Servers group contains the following:
object-group network Servers
description All subnets that contain servers
network-object 172.20.1.0 255.255.255.0
network-object 172.24.0.0 255.255.0.0
network-object 172.22.0.0 255.255.0.0
network-object 172.23.7.0 255.255.255.0
network-object 172.27.1.0 255.255.255.0
network-object 172.26.0.0 255.255.0.0
network-object 172.20.40.0 255.255.255.0
The Web Ports group contains just HTTP and HTTPS.
I put these rules in and then try to browse with 172.20.45.60 and browsing still works....
02-16-2009 06:10 AM
The 'WebProtocols' group is your service group? If so, you have specified it in the destination address portion of the ACE instead of the destination services portion. I believe the ACL's should read:
access-list acl_insideint permit tcp object-group Servers any object-group WebProtocols
access-list acl_insideint deny tcp any any object-group WebProtocols
I would also strongly recommend removal/revision of the permit ip any any statement at the bottom of the ACL.
Hope this helps.
02-16-2009 06:36 AM
Thanks for the help!
That did it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide