Hi everyone,
I have a range ip 192.168.100.0/24 with Cisco ASA5510 full access internet now.
anh I configured:
Range 1: Ip from 192.168.100.1 to 192.168.100.25 : full internet access
Range 2: IP from 192.168.100.26 to 192.168.100.254
ermit some webpages, email, https
After I configured the ASA block all traffic, i don't understand why? pleased help me to solve this problem.
object network FullAccess
range 192.168.100.1 192.168.100.25
nat (inside,outside) dynamic interface
object network DenyAccess
range 192.168.100.26 192.168.100.254
nat (inside,outside) dynamic interface
access-list inside_in permit tcp any any eq 25
access-list inside_in permit tcp any any eq 110
access-list inside_in permit tcp any any eq 80
access-list Inside_in permit ip object FullAccess any
access-list Inside_in deny ip object DenyAccess any
access-group inside_in in interface inside
regex url1 vdict\.com
regex url2 translate\.google\.com\.vn
regex url3 "lienhoagroup\.com"
regex url4 "forevergreenresort\.com"
class-map type inspect http match-any block-url-class
match request header host regex url1
match request header host regex url2
match request header host regex url3
match request header host regex url4
policy-map type inspect http block-url-policy
parameters
class block-url-class
drop-connection log
policy-map global_policy
class inspection_default
inspect http block-url-policy
I have a range ip 192.168.100.0/24 with Cisco ASA5510 full access internet now.
anh I configured:
Range 1: Ip from 192.168.100.1 to 192.168.100.25 : full internet access
Range 2: IP from 192.168.100.26 to 192.168.100.254
After I configured the ASA block all traffic, i don't understand why? pleased help me to solve this problem.
object network FullAccess
range 192.168.100.1 192.168.100.25
nat (inside,outside) dynamic interface
object network DenyAccess
range 192.168.100.26 192.168.100.254
nat (inside,outside) dynamic interface
access-list inside_in permit tcp any any eq 25
access-list inside_in permit tcp any any eq 110
access-list inside_in permit tcp any any eq 80
access-list Inside_in permit ip object FullAccess any
access-list Inside_in deny ip object DenyAccess any
access-group inside_in in interface inside
regex url1 vdict\.com
regex url2 translate\.google\.com\.vn
regex url3 "lienhoagroup\.com"
regex url4 "forevergreenresort\.com"
class-map type inspect http match-any block-url-class
match request header host regex url1
match request header host regex url2
match request header host regex url3
match request header host regex url4
policy-map type inspect http block-url-policy
parameters
class block-url-class
drop-connection log
policy-map global_policy
class inspection_default
inspect http block-url-policy