?
Solved

Block all web traffic

Posted on 2007-10-01
2
Medium Priority
?
261 Views
Last Modified: 2010-04-09
We currently have a web filter in place and have users proxy through that. We need to be able to block all web traffic that does not come from the web filters IP address. We do have an cisco asa in place. Can avyone provide any insight.

Thank you
0
Comment
Question by:jimseiwert
2 Comments
 
LVL 9

Accepted Solution

by:
QBRad earned 2000 total points
ID: 19996084
I did the same thing, pretty easy.  If all of your users point to the proxy, then when they pass through the proxy they should hit your firewall with the address from the proxy server.  So in the eyes of the firewall your proxy server is surfing the web and not your PCs.  So what i did was i created a rule in the firewall specifing that the proxy server could surf the web and then i block it for all other users.

access-list outgoing permit 192.120.1.2 any 80
access-list outgoing deny any any 80

If you want you can add more permit statements if you want your pc or say servers to bypass the proxy.
0
 
LVL 2

Author Comment

by:jimseiwert
ID: 20007291
We have added those statements but it is not blocking web traffic for any users. Everything is still as it was before those statements were added.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
In this article, we’ll look at how to deploy ProxySQL.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question