blocking hotmail and in ASA 5510

Posted on 2009-05-05
Last Modified: 2013-11-16
Question by:alimohammed72
  • 2
LVL 33

Expert Comment

ID: 24304525
In an ASA Firewall you can block any outbound request using an Access list.   THE ACL is read in sequential order, top to bottom, so as soon as there is a match the processing stops.  

Your list would need to look something like this:

Access-list inside_to_outside extended deny ip any <ip address subnet of hotmail>  <subnet mask of hotmail>
Access-list inside_to_outside extended deny ip any <ip address subnet of yahoo>  <subnet mask of yahoo>
Access-list inside_to_outside extended permit tcp any any eq 80
Access-list inside_to_outside extended permit tcp any any eq 443

access-group inside_to_outside in interface inside

This will block any ip request to the ip subnet of hotmail or yahoo yet allow any other port 80/443 request outbound.   There is an implicit deny at the end of any access list, so all other communication would be blocked.  


Author Comment

ID: 24305488
how am I going to know the subnets for Hotmail and Yahoo
LVL 33

Accepted Solution

MikeKane earned 500 total points
ID: 24305813
Here are the hotmail ips

Here are the yahoo ips

You know that anyone can still hit a public proxy then get to these sites....     Or setup a personal proxy at home and bypass this ip range.      The best way to block this would be setup a web filter like websense and block the webmail category along with the proxy/anonymizer category.  


Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sudden performance loss on a Vista system. 14 153
Firewall port opening 2 73
Windows Folder Permissions 9 94
Virus Software comparrison 5 36
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question