
3-14
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 3 Access Control Lists
Configure ACLs
The options are:
•
Name—The
access_list_name
argument specifies the name of number of an ACL. Traditional
numbers for standard ACLs are 1-99 or 1300-1999, but you can use any name or number. You create
a new ACL if the ACL does not already exist, otherwise, you are adding the entry to the end of the
ACL.
•
Permit or Deny—The
deny
keyword denies or exempts a packet if the conditions are matched. The
permit
keyword permits or includes a packet if the conditions are matched.
•
Destination Address—The
any4
keyword matches all IPv4 addresses. The
host
ip_address
argument matches a host IPv4 address. The
ip_address ip_mask
argument matches an IPv4 subnet,
for example, 10.1.1.0 255.255.255.0.
Configure Webtype ACLs
Webtype ACLs are used for filtering clientless SSL VPN traffic, constraining user access to specific
networks, subnets, hosts, and Web servers. If you do not define a filter, all connections are allowed. A
webtype ACL is composed of all ACEs with the same ACL ID or name.
With webtype ACLs, you can match traffic based on URLs or destination addresses. A single ACE
cannot mix these specifications. The following sections explain each type of ACE.
•
Add a Webtype ACE for URL Matching, page 3-14
•
Adding a Webtype ACE for IP Address Matching, page 3-15
•
Examples for Webtype ACLs, page 3-16
Add a Webtype ACE for URL Matching
To match traffic based on the URL the user is trying to access, use the following command;
access-list
access_list_name
webtype
{
deny
|
permit
}
url
{
url_string
|
any
}
[
log
[[
level
] [
interval
secs
] |
disable
|
default
]]
[
time_range
time_range_name
]]
[
inactive
]
Example:
hostname(config)#
access-list acl_company webtype deny url http://*.example.com
The options are:
•
access_list_name
—The name of the new or existing ACL. If the ACL already exists, you are adding
the ACE to the end of the ACL.
•
Permit or Deny—The
deny
keyword denies or exempts a packet if the conditions are matched. The
permit
keyword permits or includes a packet if the conditions are matched.
•
URL—The
url
keyword specifies the URL to match. Use
url any
to match all URL-based traffic.
Otherwise, enter a URL string, which can include wildcards. Following are some tips and limitations
on specifying URLs:
–
Specify
any
to match all URLs.
–
‘Permit url any' will allow all the URLs that have the format protocol://server-ip/path and will
block traffic that does not match this pattern, such as port-forwarding. There should be an ACE
to allow connections to the required port (port 1494 in the case of Citrix) so that an implicit deny
does not occur.
Содержание ASA 5508-X
Страница 11: ...P A R T 1 Access Control ...
Страница 12: ......
Страница 60: ...4 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 4 Access Rules History for Access Rules ...
Страница 157: ...P A R T 2 Network Address Translation ...
Страница 158: ......
Страница 204: ...9 46 Cisco ASA Series Firewall CLI Configuration Guide Chapter 9 Network Address Translation NAT History for NAT ...
Страница 232: ...10 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 10 NAT Examples and Reference DNS and NAT ...
Страница 233: ...P A R T 3 Service Policies and Application Inspection ...
Страница 234: ......
Страница 379: ...P A R T 4 Connection Management and Threat Detection ...
Страница 380: ......
Страница 400: ...16 20 Cisco ASA Series Firewall CLI Configuration Guide Chapter 16 Connection Settings History for Connection Settings ...
Страница 414: ...17 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 Quality of Service History for QoS ...