blocking hotmail and in ASA 5510

Posted on 2009-05-05
Last Modified: 2013-11-16
Question by:alimohammed72
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 33

Expert Comment

ID: 24304525
In an ASA Firewall you can block any outbound request using an Access list.   THE ACL is read in sequential order, top to bottom, so as soon as there is a match the processing stops.  

Your list would need to look something like this:

Access-list inside_to_outside extended deny ip any <ip address subnet of hotmail>  <subnet mask of hotmail>
Access-list inside_to_outside extended deny ip any <ip address subnet of yahoo>  <subnet mask of yahoo>
Access-list inside_to_outside extended permit tcp any any eq 80
Access-list inside_to_outside extended permit tcp any any eq 443

access-group inside_to_outside in interface inside

This will block any ip request to the ip subnet of hotmail or yahoo yet allow any other port 80/443 request outbound.   There is an implicit deny at the end of any access list, so all other communication would be blocked.  


Author Comment

ID: 24305488
how am I going to know the subnets for Hotmail and Yahoo
LVL 33

Accepted Solution

MikeKane earned 500 total points
ID: 24305813
Here are the hotmail ips

Here are the yahoo ips

You know that anyone can still hit a public proxy then get to these sites....     Or setup a personal proxy at home and bypass this ip range.      The best way to block this would be setup a web filter like websense and block the webmail category along with the proxy/anonymizer category.  


Featured Post

Optimum High-Definition Video Viewing and Control

The ATEN VM0404HA 4x4 4K HDMI Matrix Switch supports 4K resolutions of UHD (3840 x 2160) and DCI (4096 x 2160) with refresh rates of 30 Hz (4:4:4) and 60 Hz (4:2:0). It is ideal for applications where the routing of 4K digital signals is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question