Hi,

The second method uses URL Filtering service. If this is not mentioned in the 
task, you should know which method to exclude.

Regards,
Piotr


From: Karthik sagar 
Sent: Thursday, August 09, 2012 8:11 PM
To: ccie security 
Subject: [OSL | CCIE_Security] ZBF - http inspection

A task is worded like "do not allow .badhost.com to be accessed through the 
firewall" . I have come across two solutions. Are they both correct ? If yes, 
which should we prefer in the lab ?

Method 1: using regex matching header host
------------
parameter-map type regex PRMregexbadhost
pattern badhost\.com

class-map type inspect match-all CMout
match protocol http

class-map type inspect http match-all CM7http
match  request header host regex PRMregexbadhost

policy-map type inspect http PM7http
class type inspect http CM7http
  reset

policy-map type inspect PMout
class type inspect CMout
  inspect
  service-policy http PM7http

=======================================================================
Method 2": usinf urlfilter
------------
parameter-map type urlfilter PRMurlfilter
exclusive-domain deny .badhost.com

class-map type inspect match-all CMout
match protocol http

policy-map type inspect PMout2
class type inspect CMout
  inspect
  urlfilter PRMurlfilter



Regards,
Karthik 




--------------------------------------------------------------------------------
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to