Nope. But i lack a good way of debugging whats really happening inside
of MPF. I can use the show-commands to look at counters for acl and
service-policies. But more than that? Is there a way for me to see if
the class-maps are really in use?

Br Jimmy


On 2/8/10, Brandon Carroll <[email protected]> wrote:
> Do you see anything in your logs when you browse to facebook?
>
>
> Regards,
>
> Brandon Carroll - CCIE #23837
> Senior Technical Instructor - IPexpert
> Mailto: [email protected]
> Telephone: +1.810.326.1444
> Live Assistance, Please visit: www.ipexpert.com/chat
> eFax: +1.810.454.0130
>
> ::Message Sent from iPhone::
>
> IPexpert is a premier provider of Classroom and Self-Study Cisco CCNA
> (R&S, Voice & Security), CCNP, CCVP, CCSP and CCIE (R&S, Voice,
> Security & Service Provider) Certification Training with locations
> throughout the United States, Europe and Australia. Be sure to check
> out our online communities at www.ipexpert.com/communities and our
> public website at www.ipexpert.com.
>
> On Feb 8, 2010, at 12:41 AM, Jimmy Larsson <[email protected]> wrote:
>
>> But still I can browse to facebook. The exact url is copied from my
>> browser:
>>
>> Home-ASA# test regex "http://www.facebook.com/"; ".*\.facebook\.com"
>> INFO: Regular expression match succeeded.
>>
>> Home-ASA# sh access-list  acl-MAKE-JIMMY-WORK
>> access-list acl-MAKE-JIMMY-WORK; 1 elements; name hash: 0x947ef6ed
>> access-list acl-MAKE-JIMMY-WORK line 1 extended permit tcp any any
>> eq www time-range STUDY-TIME (hitcnt=23) 0xbe60f654
>> Home-ASA#
>>
>>
>> Home-ASA# sh time-range
>>
>> time-range entry: STUDY-TIME (active)
>>    periodic weekdays 7:00 to 7:59
>>    periodic weekdays 8:00 to 10:00
>>    used in: IP ACL entry
>>
>> Home-ASA# sh service-policy inspect http
>>
>> Global policy:
>>   Service-policy: global_policy
>>     Class-map: inspection_default
>>       Inspect: http test_pmap, packet 83, drop 0, reset-drop 0
>>         protocol violations
>>           log, packet 0
>>
>> Interface inside:
>>   Service-policy: policy-inside
>>     Class-map: class-NOSURF
>>       Inspect: http policy-INSPECT-HTTP, packet 1608, drop 0, reset-
>> drop 0
>>         protocol violations
>>           packet 0
>>         class class-FIND-BANNED-URLS
>>           reset log, packet 0
>> Home-ASA#
>>
>> Just to verify that it had nothing to do with my time-range I
>> removed that option in the acl. Now its just "permit tcp any any eq
>> 80" but the "problem" remains.
>>
>> Br Jimmy
>>
>> 2010/2/8 Brandon Carroll <[email protected]>
>> Jimmy,
>>
>> I think its your regular expression.  Look at what I did on the ASA:
>>
>> First I tested yours:
>>
>> ASA1# test regex www.facebook.com "*.facebook\.com.*"
>> INFO: Regular expression match failed.
>>
>>
>> Then mine:
>>
>> ASA1# test regex www.facebook.com ".+\.facebook\.com*"
>> INFO: Regular expression match succeeded.
>>
>> Then a few others to test the path to other apps:
>>
>> ASA1# test regex www.facebook.com/reader ".+\.facebook\.com*"
>> INFO: Regular expression match succeeded.
>>
>> ASA1# test regex www.facebook.com/farmville_app ".+\.facebook\.com*"
>> INFO: Regular expression match succeeded.
>>
>> Finally I tested agains another site:
>>
>> ASA1# test regex www.cisco.com/ ".+\.facebook\.com*"
>> INFO: Regular expression match failed.
>>
>> and
>>
>> ASA1# test regex www.google.com/ ".+\.facebook\.com*"
>> INFO: Regular expression match failed.
>>
>> give that a try and see where you get.
>>
>> Regards,
>>
>> Brandon Carroll - CCIE #23837
>> Senior Technical Instructor - IPexpert
>> Mailto: [email protected]
>> Telephone: +1.810.326.1444
>> Live Assistance, Please visit: www.ipexpert.com/chat
>> eFax: +1.810.454.0130
>>
>> IPexpert is a premier provider of Classroom and Self-Study Cisco
>> CCNA (R&S, Voice & Security), CCNP, CCVP, CCSP and CCIE (R&S, Voice,
>> Security & Service Provider) Certification Training with locations
>> throughout the United States, Europe and Australia. Be sure to check
>> out our online communities at www.ipexpert.com/communities and our
>> public website at www.ipexpert.com.
>>
>>
>>
>> On Sun, Feb 7, 2010 at 10:50 PM, Jimmy Larsson <[email protected]>
>> wrote:
>> Hello
>>
>> Can anyone see why I am still able to surf to facebook from inside
>> the ASA with this config?
>>
>> time-range STUDY-TIME
>>  absolute start 07:05 08 February 2010 end 07:59 08 February 2010
>> !
>> access-list acl-MAKE-JIMMY-WORK extended permit tcp any any eq www
>> time-range STUDY-TIME
>>
>> class-map class-NOSURF
>>  match access-list acl-MAKE-JIMMY-WORK
>>
>>
>> regex gmail ".*mail\.google\.com.*"
>> regex googlereader "*.google\.com\/reader.*"
>> regex twitter "*.twitter\.com.*"
>> regex facebook "*.facebook\.com.*"
>>
>>
>> class-map type regex match-any class-map-JIMMYS-BANNED-SITES
>>  match regex twitter
>>  match regex facebook
>>  match regex googlereader
>>  match regex gmail
>>
>> class-map type inspect http match-all class-FIND-BANNED-URLS
>>  match request uri regex class class-map-JIMMYS-BANNED-SITES
>>
>> policy-map type inspect http policy-INSPECT-HTTP
>>  parameters
>>  class class-FIND-BANNED-URLS
>>   reset log
>>
>> policy-map policy-inside
>> # Other classes
>>  class class-NOSURF
>>   inspect http policy-INSPECT-HTTP
>>
>> Time-range is active:
>> Home-ASA(config-pmap)# sh time-range
>>
>> time-range entry: STUDY-TIME (active)
>>    periodic weekdays 7:00 to 7:59
>>    used in: IP ACL entry
>>
>> my acl gets hitcounts:
>> Home-ASA(config-pmap)# sh access-list acl-MAKE-JIMMY-WORK
>> access-list acl-MAKE-JIMMY-WORK; 1 elements; name hash: 0x947ef6ed
>> access-list acl-MAKE-JIMMY-WORK line 1 extended permit tcp any any
>> eq www time-range STUDY-TIME (hitcnt=1) 0xbe60f654
>>
>> My service-policy looks good:
>>
>> Home-ASA(config-pmap)# sh service-policy inspect http
>>
>> Global policy:
>>   Service-policy: global_policy
>>     Class-map: inspection_default
>>       Inspect: http test_pmap, packet 6895252, drop 68, reset-drop 0
>>         protocol violations
>>           log, packet 68
>>
>> Interface inside:
>>   Service-policy: policy-inside
>>     Class-map: class-NOSURF
>>       Inspect: http policy-INSPECT-HTTP, packet 1495, drop 0, reset-
>> drop 0
>>         protocol violations
>>           packet 0
>>         class class-FIND-BANNED-URLS
>>           reset log, packet 0
>> Home-ASA(config-pmap)#
>>
>> And the service-policy looks good:
>>
>> Home-ASA(config-pmap)# sh service-policy inspect http
>>
>> Global policy:
>>   Service-policy: global_policy
>>     Class-map: inspection_default
>>       Inspect: http test_pmap, packet 6, drop 0, reset-drop 0
>>         protocol violations
>>           log, packet 0
>>
>> Interface inside:
>>   Service-policy: policy-inside
>>     Class-map: class-NOSURF
>>       Inspect: http policy-INSPECT-HTTP, packet 327, drop 0, reset-
>> drop 0
>>         protocol violations
>>           packet 0
>>         class class-FIND-BANNED-URLS
>>           reset log, packet 0
>> Home-ASA(config-pmap)#
>>
>> Anyone?
>>
>> --
>> -------
>> Jimmy Larsson
>> Ryavagen 173
>> s-26030 Vallakra
>> Sweden
>> http://blogg.kvistofta.nu
>> -------
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training,
>> please visit www.ipexpert.com
>>
>>
>>
>>
>>
>> --
>> -------
>> Jimmy Larsson
>> Ryavagen 173
>> s-26030 Vallakra
>> Sweden
>> http://blogg.kvistofta.nu
>> -------
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training,
>> please visit www.ipexpert.com
>


-- 
-------
Jimmy Larsson
Ryavagen 173
s-26030 Vallakra
Sweden
http://blogg.kvistofta.nu
-------
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to