xactly! I have been troubleshooting this a couple of hour just because I
didnt know what an "uri" was. .-)

/J

2010/2/8 Jimmy Larsson <[email protected]>

> I´ve got it!
>
> If I add this regex to the class-map I will successfully prevent
> myself from browsing to my word-press-adminpage
> (http://blogg.kvistofta.nu/wp-admin):
>
>  regex blogadmin ".*\/wp-admin.*"
>
> However, if I use this regex it doesnt work:
>
> regex blogadmin ".*blogg\.kvistofta\.nu\/wp-admin.*"
>
> I´ve found out why. Anyone, a quick guess?
>
> Br Jimmy
>
> On 2/8/10, Jimmy Larsson <[email protected]> wrote:
> > Nope. But i lack a good way of debugging whats really happening inside
> > of MPF. I can use the show-commands to look at counters for acl and
> > service-policies. But more than that? Is there a way for me to see if
> > the class-maps are really in use?
> >
> > Br Jimmy
> >
> >
> > On 2/8/10, Brandon Carroll <[email protected]> wrote:
> >> Do you see anything in your logs when you browse to facebook?
> >>
> >>
> >> Regards,
> >>
> >> Brandon Carroll - CCIE #23837
> >> Senior Technical Instructor - IPexpert
> >> Mailto: [email protected]
> >> Telephone: +1.810.326.1444
> >> Live Assistance, Please visit: www.ipexpert.com/chat
> >> eFax: +1.810.454.0130
> >>
> >> ::Message Sent from iPhone::
> >>
> >> IPexpert is a premier provider of Classroom and Self-Study Cisco CCNA
> >> (R&S, Voice & Security), CCNP, CCVP, CCSP and CCIE (R&S, Voice,
> >> Security & Service Provider) Certification Training with locations
> >> throughout the United States, Europe and Australia. Be sure to check
> >> out our online communities at www.ipexpert.com/communities and our
> >> public website at www.ipexpert.com.
> >>
> >> On Feb 8, 2010, at 12:41 AM, Jimmy Larsson <[email protected]> wrote:
> >>
> >>> But still I can browse to facebook. The exact url is copied from my
> >>> browser:
> >>>
> >>> Home-ASA# test regex "http://www.facebook.com/"; ".*\.facebook\.com"
> >>> INFO: Regular expression match succeeded.
> >>>
> >>> Home-ASA# sh access-list  acl-MAKE-JIMMY-WORK
> >>> access-list acl-MAKE-JIMMY-WORK; 1 elements; name hash: 0x947ef6ed
> >>> access-list acl-MAKE-JIMMY-WORK line 1 extended permit tcp any any
> >>> eq www time-range STUDY-TIME (hitcnt=23) 0xbe60f654
> >>> Home-ASA#
> >>>
> >>>
> >>> Home-ASA# sh time-range
> >>>
> >>> time-range entry: STUDY-TIME (active)
> >>>    periodic weekdays 7:00 to 7:59
> >>>    periodic weekdays 8:00 to 10:00
> >>>    used in: IP ACL entry
> >>>
> >>> Home-ASA# sh service-policy inspect http
> >>>
> >>> Global policy:
> >>>   Service-policy: global_policy
> >>>     Class-map: inspection_default
> >>>       Inspect: http test_pmap, packet 83, drop 0, reset-drop 0
> >>>         protocol violations
> >>>           log, packet 0
> >>>
> >>> Interface inside:
> >>>   Service-policy: policy-inside
> >>>     Class-map: class-NOSURF
> >>>       Inspect: http policy-INSPECT-HTTP, packet 1608, drop 0, reset-
> >>> drop 0
> >>>         protocol violations
> >>>           packet 0
> >>>         class class-FIND-BANNED-URLS
> >>>           reset log, packet 0
> >>> Home-ASA#
> >>>
> >>> Just to verify that it had nothing to do with my time-range I
> >>> removed that option in the acl. Now its just "permit tcp any any eq
> >>> 80" but the "problem" remains.
> >>>
> >>> Br Jimmy
> >>>
> >>> 2010/2/8 Brandon Carroll <[email protected]>
> >>> Jimmy,
> >>>
> >>> I think its your regular expression.  Look at what I did on the ASA:
> >>>
> >>> First I tested yours:
> >>>
> >>> ASA1# test regex www.facebook.com "*.facebook\.com.*"
> >>> INFO: Regular expression match failed.
> >>>
> >>>
> >>> Then mine:
> >>>
> >>> ASA1# test regex www.facebook.com ".+\.facebook\.com*"
> >>> INFO: Regular expression match succeeded.
> >>>
> >>> Then a few others to test the path to other apps:
> >>>
> >>> ASA1# test regex www.facebook.com/reader ".+\.facebook\.com*"
> >>> INFO: Regular expression match succeeded.
> >>>
> >>> ASA1# test regex www.facebook.com/farmville_app ".+\.facebook\.com*"
> >>> INFO: Regular expression match succeeded.
> >>>
> >>> Finally I tested agains another site:
> >>>
> >>> ASA1# test regex www.cisco.com/ ".+\.facebook\.com*"
> >>> INFO: Regular expression match failed.
> >>>
> >>> and
> >>>
> >>> ASA1# test regex www.google.com/ ".+\.facebook\.com*"
> >>> INFO: Regular expression match failed.
> >>>
> >>> give that a try and see where you get.
> >>>
> >>> Regards,
> >>>
> >>> Brandon Carroll - CCIE #23837
> >>> Senior Technical Instructor - IPexpert
> >>> Mailto: [email protected]
> >>> Telephone: +1.810.326.1444
> >>> Live Assistance, Please visit: www.ipexpert.com/chat
> >>> eFax: +1.810.454.0130
> >>>
> >>> IPexpert is a premier provider of Classroom and Self-Study Cisco
> >>> CCNA (R&S, Voice & Security), CCNP, CCVP, CCSP and CCIE (R&S, Voice,
> >>> Security & Service Provider) Certification Training with locations
> >>> throughout the United States, Europe and Australia. Be sure to check
> >>> out our online communities at www.ipexpert.com/communities and our
> >>> public website at www.ipexpert.com.
> >>>
> >>>
> >>>
> >>> On Sun, Feb 7, 2010 at 10:50 PM, Jimmy Larsson <[email protected]>
> >>> wrote:
> >>> Hello
> >>>
> >>> Can anyone see why I am still able to surf to facebook from inside
> >>> the ASA with this config?
> >>>
> >>> time-range STUDY-TIME
> >>>  absolute start 07:05 08 February 2010 end 07:59 08 February 2010
> >>> !
> >>> access-list acl-MAKE-JIMMY-WORK extended permit tcp any any eq www
> >>> time-range STUDY-TIME
> >>>
> >>> class-map class-NOSURF
> >>>  match access-list acl-MAKE-JIMMY-WORK
> >>>
> >>>
> >>> regex gmail ".*mail\.google\.com.*"
> >>> regex googlereader "*.google\.com\/reader.*"
> >>> regex twitter "*.twitter\.com.*"
> >>> regex facebook "*.facebook\.com.*"
> >>>
> >>>
> >>> class-map type regex match-any class-map-JIMMYS-BANNED-SITES
> >>>  match regex twitter
> >>>  match regex facebook
> >>>  match regex googlereader
> >>>  match regex gmail
> >>>
> >>> class-map type inspect http match-all class-FIND-BANNED-URLS
> >>>  match request uri regex class class-map-JIMMYS-BANNED-SITES
> >>>
> >>> policy-map type inspect http policy-INSPECT-HTTP
> >>>  parameters
> >>>  class class-FIND-BANNED-URLS
> >>>   reset log
> >>>
> >>> policy-map policy-inside
> >>> # Other classes
> >>>  class class-NOSURF
> >>>   inspect http policy-INSPECT-HTTP
> >>>
> >>> Time-range is active:
> >>> Home-ASA(config-pmap)# sh time-range
> >>>
> >>> time-range entry: STUDY-TIME (active)
> >>>    periodic weekdays 7:00 to 7:59
> >>>    used in: IP ACL entry
> >>>
> >>> my acl gets hitcounts:
> >>> Home-ASA(config-pmap)# sh access-list acl-MAKE-JIMMY-WORK
> >>> access-list acl-MAKE-JIMMY-WORK; 1 elements; name hash: 0x947ef6ed
> >>> access-list acl-MAKE-JIMMY-WORK line 1 extended permit tcp any any
> >>> eq www time-range STUDY-TIME (hitcnt=1) 0xbe60f654
> >>>
> >>> My service-policy looks good:
> >>>
> >>> Home-ASA(config-pmap)# sh service-policy inspect http
> >>>
> >>> Global policy:
> >>>   Service-policy: global_policy
> >>>     Class-map: inspection_default
> >>>       Inspect: http test_pmap, packet 6895252, drop 68, reset-drop 0
> >>>         protocol violations
> >>>           log, packet 68
> >>>
> >>> Interface inside:
> >>>   Service-policy: policy-inside
> >>>     Class-map: class-NOSURF
> >>>       Inspect: http policy-INSPECT-HTTP, packet 1495, drop 0, reset-
> >>> drop 0
> >>>         protocol violations
> >>>           packet 0
> >>>         class class-FIND-BANNED-URLS
> >>>           reset log, packet 0
> >>> Home-ASA(config-pmap)#
> >>>
> >>> And the service-policy looks good:
> >>>
> >>> Home-ASA(config-pmap)# sh service-policy inspect http
> >>>
> >>> Global policy:
> >>>   Service-policy: global_policy
> >>>     Class-map: inspection_default
> >>>       Inspect: http test_pmap, packet 6, drop 0, reset-drop 0
> >>>         protocol violations
> >>>           log, packet 0
> >>>
> >>> Interface inside:
> >>>   Service-policy: policy-inside
> >>>     Class-map: class-NOSURF
> >>>       Inspect: http policy-INSPECT-HTTP, packet 327, drop 0, reset-
> >>> drop 0
> >>>         protocol violations
> >>>           packet 0
> >>>         class class-FIND-BANNED-URLS
> >>>           reset log, packet 0
> >>> Home-ASA(config-pmap)#
> >>>
> >>> Anyone?
> >>>
> >>> --
> >>> -------
> >>> Jimmy Larsson
> >>> Ryavagen 173
> >>> s-26030 Vallakra
> >>> Sweden
> >>> http://blogg.kvistofta.nu
> >>> -------
> >>>
> >>> _______________________________________________
> >>> For more information regarding industry leading CCIE Lab training,
> >>> please visit www.ipexpert.com
> >>>
> >>>
> >>>
> >>>
> >>>
> >>> --
> >>> -------
> >>> Jimmy Larsson
> >>> Ryavagen 173
> >>> s-26030 Vallakra
> >>> Sweden
> >>> http://blogg.kvistofta.nu
> >>> -------
> >>> _______________________________________________
> >>> For more information regarding industry leading CCIE Lab training,
> >>> please visit www.ipexpert.com
> >>
> >
> >
> > --
> > -------
> > Jimmy Larsson
> > Ryavagen 173
> > s-26030 Vallakra
> > Sweden
> > http://blogg.kvistofta.nu
> > -------
> >
>
>
> --
> -------
> Jimmy Larsson
> Ryavagen 173
> s-26030 Vallakra
> Sweden
> http://blogg.kvistofta.nu
> -------
>



-- 
-------
Jimmy Larsson
Ryavagen 173
s-26030 Vallakra
Sweden
http://blogg.kvistofta.nu
-------
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to