[c-nsp] Cisco asa5550 url filter
Bunny Singh
jump2fly82 at yahoo.com
Sat Mar 20 13:13:39 EDT 2010
Hi, n
Thanks for the information and example, It works after changing few things.
Thanks once again for the help.
Regards
Bunny Singh
--- On Fri, 3/19/10, Ramcharan, Vijay A <vijay.ramcharan at verizonbusiness.com> wrote:
From: Ramcharan, Vijay A <vijay.ramcharan at verizonbusiness.com>
Subject: Re: [c-nsp] Cisco asa5550 url filter
To: cisco-nsp at puck.nether.net
Date: Friday, March 19, 2010, 2:41 PM
I suggest running the scenario through Dynamips and PEMU for test
purposes so you don't affect production traffic.
AFAIK, the configuration unfortunately doesn't really get simpler than
what the URL provided.
Out of the box URL filtering requires RegEx and an MPF configuration.
Regarding a question on possible action only being "block/reset/ log".
That is true. However, you can use a negative condition to "permit" what
you want with "match not" in your http inspection class-map.
While I have not specifically used MPF for http blocking, I have used it
for FTP. The example below is an example of only permitting a certain
filename to be retrieved via FTP while denying everything else.
Yes I'm aware that it's an FTP example, but the same basic logic
should/would apply for any other type of traffic which can be inspected.
regex SymPtrn2 "minitri\.flg"
class-map type regex match-any cls-symantec-files
match regex SymPtrn2
class-map type inspect ftp match-all cls-deny-ftp
match not filename regex class cls-symantec-files
class-map ftp-traffic
match port tcp eq ftp
policy-map type inspect ftp checkftp
parameters
class cls-deny-ftp
reset log
policy-map mondmz-policy
class ftp-traffic
inspect ftp strict checkftp
service-policy mondmz-policy interface mondmz
Vijay Ramcharan
From: Bunny Singh [mailto:jump2fly82 at yahoo.com]
Sent: Friday, March 19, 2010 9:55 AM
To: cisco-nsp at puck.nether.net; Ramcharan, Vijay A
Subject: Re: [c-nsp] Cisco asa5550 url filter
Hi Vijay,
Thanks for the reply,
I have checked and try to do but facing issue as the example given is
too complicated and its difficult to do the test on the production
Environment,
Can you share a example to allowing the access for a single site.
I am very thankfull to you.
Regards
Bunny
--- On Fri, 3/19/10, Ramcharan, Vijay A
<vijay.ramcharan at verizonbusiness.com> wrote:
From: Ramcharan, Vijay A <vijay.ramcharan at verizonbusiness.com>
Subject: Re: [c-nsp] Cisco asa5550 url filter
To: cisco-nsp at puck.nether.net
Date: Friday, March 19, 2010, 1:24 PM
Try Google or Bing with search string "asa inspect http regex"
The example given below is for blocking certain websites but you
should be able to come up with a configuration that only allows certain
sites and block everything else.
http://www.cisco.com/en/US/products/ps6120/products_configuration_exampl
e09186a0080940e04.shtml
Vijay Ramcharan
-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net
<http://us.mc450.mail.yahoo.com/mc/compose?to=cisco-nsp-bounces@puck.net
her.net> [mailto:cisco-nsp-bounces at puck.nether.net
<http://us.mc450.mail.yahoo.com/mc/compose?to=cisco-nsp-bounces@puck.net
her.net> ] On Behalf Of Bunny Singh
Sent: Friday, March 19, 2010 7:39 AM
To: cisco-nsp at puck.nether.net
<http://us.mc450.mail.yahoo.com/mc/compose?to=cisco-nsp@puck.nether.net>
Subject: [c-nsp] Cisco asa5550 url filter
Hi,
We are using Cisco asa5550, and i want to put a url based
acl/filteration for the particular client.
We have one client on inside interface who needs the access of
www.youtube.com only(outside interface) and to restrict the same we are
not able to restrict through IP acl's as Youtube ip's are changing
periodically.
So is it any way to put a http url filter to open only a single
desired site and else will be denied.
Regards
DJ Singh
_______________________________________________
cisco-nsp mailing list cisco-nsp at puck.nether.net
<http://us.mc450.mail.yahoo.com/mc/compose?to=cisco-nsp@puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
_______________________________________________
cisco-nsp mailing list cisco-nsp at puck.nether.net
<http://us.mc450.mail.yahoo.com/mc/compose?to=cisco-nsp@puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
______________________________________________________________________
This e-mail has been scanned by Verizon Managed Email Content Service,
using Skeptic(tm) technology powered by MessageLabs. For more
information on Verizon Managed Email Content Service, visit
http://www.verizonbusiness.com.
______________________________________________________________________
_______________________________________________
cisco-nsp mailing list cisco-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
More information about the cisco-nsp
mailing list