Cisco 5505 firewall

We have this firewall in our network and I think it is blocking certain web pages from doing things. I have checked every machine to make sure it wasn't any issue with flash, java or IE. All are updated to current versions.
What settings, if any, would be blocking certain web pages to load? and please give the directions on how to get to the settings.
The one I know all time doesn't work is the web site for the when searching for hotels. the results page is never able to be displayed. When I am out of the network, it works fine.
Who is Participating?
genie4allConnect With a Mentor Commented:
If you are not using websense you can remove those lines. ASA will not be affected by that. But there will be no webfiltering on your network (provided you have one now):

to remove, login into your ASA via SSH / Telnet and in Global config mode issue the below commands:

no filter url http allow
no filter url 443 allow
no url-server (inside) vendor websense host timeout 30 protocol TCP version 4 connections 15

Do you have any proxy on your network? If so check that out. If you don't have proxy check for regex statements in your firewall. Regex are used to filter websites.
Robert Sutton JrSenior Network ManagerCommented:
And then again a sanitized copy of the asa config would be even more helpful in helping us better help you in providing a solution.
The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

You can also check the logs to look for messages saying "mss excceded"
You can change the mss size, or you can upgrade the ASA OS image to a newer release
raffie613Author Commented:
there is no proxy

how do I get the config log to a file?

Where do I check a log file to look for the mss exceeded?

You can connect to ASA through a console port using HyperTerminal or any other program, like Putty

When you are connected, isshue this command

sh run

You will see your running config. You can now copy and paste it into text file
To get logs from your firewall:

1) Get a SYSLOG tool - suggestion Kiwicat Syslog (Freeware) and install / configure on your machine or another networked PC.

2) on ASA, Global config mode execute below:

logging trap informational
logging host Inside <IP address of syslog system>

3) On the syslog application console you will start seeing all the logs of the firewall

to remove the logging entries use the following:

no logging trap informational
no logging host Inside <IP address of syslog system>

If you have ASDM:
logging asdm informational

your ASDM should start showing you the logs

raffie613Author Commented:
Result of the command: "sh run"
: Saved
ASA Version 7.2(4)
hostname secsignalsfw
domain-name secsignals.local
enable password JVLqJVmxcyY5oUTI encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
interface Vlan1
 nameif inside
 security-level 100
 ip address
interface Vlan2
 nameif outside
 security-level 0
 pppoe client vpdn group SS
 ip address pppoe setroute
interface Vlan3
 no forward interface Vlan1
 nameif dmz
 security-level 50
 ip address dhcp
interface Ethernet0/0
 switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
 switchport access vlan 3
ftp mode passive
dns server-group DefaultDNS
 domain-name secsignals.local
object-group service websense tcp
 port-object eq 15868
access-list inside_access_in extended permit tcp any any object-group websense
access-list outside_access_in extended permit icmp any any
access-list inside_nat0_outbound extended permit ip
access-list outside_1_cryptomap extended permit ip
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
url-server (inside) vendor websense host timeout 30 protocol TCP version 4 connections 15
aaa authentication enable console LOCAL
aaa authentication telnet console LOCAL
filter url http allow
filter url 443 allow
http server enable
http inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs group1
crypto map outside_map 1 set peer
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn group SS request dialout pppoe
vpdn group SS localname
vpdn group SS ppp authentication pap
vpdn username password *********
dhcpd auto_config outside
dhcpd address inside
dhcpd dns interface inside
dhcpd domain secsignals.local interface inside
dhcpd enable inside
username ssicor password mUAe4Hu9uZEBUrD8 encrypted privilege 15
username securas password Qx2vIbDWqaPDJl5O encrypted privilege 15
username super1 password nQHcyCkd1aqdRpso encrypted privilege 15
tunnel-group type ipsec-l2l
tunnel-group ipsec-attributes
 pre-shared-key *
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
service-policy global_policy global
prompt hostname context
: end

You've got websense application which does URL filtering. Your websense is in-path of your network. It means you don't need explicit proxy settings but still the websites will be filtered by websense.

Look into websense configuration for rules /  settings that might block the web browsing.

I will go through your config again and let you know if there's anything suspicious.

I don't see any issues with your configuration just now...

Try applying exception for your system and browse to the websites that were getting blocked / dropped earlier. This will prove whether the issue is with your firewall or websense

To apply exception:

filter url except local_ip local_mask foreign_ip foreign_mask]

To remove exception:

no filter url except local_ip local_mask foreign_ip foreign_mask]
raffie613Author Commented:
how do I get to the websense utility?
raffie613Author Commented:
ok, I see you meant a program called websense. I opened it and saw the ip of my server and when I right click and nothing. I don't need the program so I am just going to remove it completely from the server. That won't affect the ASA at will it?
raffie613Author Commented:
If I just remove Websense and do not remove those lines in the ASA, will my web filtering still stop? I just want it off at this point.
Raffie613, If you have a webfilter in your network, you might to reconsider your decision of removing it totally. If there is no webfiltering users can access any websites they want including porn and other blacklisted ones. So try and get the websense part sorted out and re-enable this rule in your ASA.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.