Hello
Can anyone see why I am still able to surf to facebook from inside the ASA
with this config?
time-range STUDY-TIME
absolute start 07:05 08 February 2010 end 07:59 08 February 2010
!
access-list acl-MAKE-JIMMY-WORK extended permit tcp any any eq www
time-range STUDY-TIME
class-map class-NOSURF
match access-list acl-MAKE-JIMMY-WORK
regex gmail ".*mail\.google\.com.*"
regex googlereader "*.google\.com\/reader.*"
regex twitter "*.twitter\.com.*"
regex facebook "*.facebook\.com.*"
class-map type regex match-any class-map-JIMMYS-BANNED-SITES
match regex twitter
match regex facebook
match regex googlereader
match regex gmail
class-map type inspect http match-all class-FIND-BANNED-URLS
match request uri regex class class-map-JIMMYS-BANNED-SITES
policy-map type inspect http policy-INSPECT-HTTP
parameters
class class-FIND-BANNED-URLS
reset log
policy-map policy-inside
# Other classes
class class-NOSURF
inspect http policy-INSPECT-HTTP
Time-range is active:
Home-ASA(config-pmap)# sh time-range
time-range entry: STUDY-TIME (active)
periodic weekdays 7:00 to 7:59
used in: IP ACL entry
my acl gets hitcounts:
Home-ASA(config-pmap)# sh access-list acl-MAKE-JIMMY-WORK
access-list acl-MAKE-JIMMY-WORK; 1 elements; name hash: 0x947ef6ed
access-list acl-MAKE-JIMMY-WORK line 1 extended permit tcp any any eq www
time-range STUDY-TIME (hitcnt=1) 0xbe60f654
My service-policy looks good:
Home-ASA(config-pmap)# sh service-policy inspect http
Global policy:
Service-policy: global_policy
Class-map: inspection_default
Inspect: http test_pmap, packet 6895252, drop 68, reset-drop 0
protocol violations
log, packet 68
Interface inside:
Service-policy: policy-inside
Class-map: class-NOSURF
Inspect: http policy-INSPECT-HTTP, packet 1495, drop 0, reset-drop 0
protocol violations
packet 0
class class-FIND-BANNED-URLS
reset log, packet 0
Home-ASA(config-pmap)#
And the service-policy looks good:
Home-ASA(config-pmap)# sh service-policy inspect http
Global policy:
Service-policy: global_policy
Class-map: inspection_default
Inspect: http test_pmap, packet 6, drop 0, reset-drop 0
protocol violations
log, packet 0
Interface inside:
Service-policy: policy-inside
Class-map: class-NOSURF
Inspect: http policy-INSPECT-HTTP, packet 327, drop 0, reset-drop 0
protocol violations
packet 0
class class-FIND-BANNED-URLS
reset log, packet 0
Home-ASA(config-pmap)#
Anyone?
--
-------
Jimmy Larsson
Ryavagen 173
s-26030 Vallakra
Sweden
http://blogg.kvistofta.nu
-------
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com