Importing multiple IPs and domains into a Cisco ACL via ASDM

ASDM Version: 7.1(2)

Cisco Hardware:   ASA5510

Hey folks.  I need to import and blacklist a list of varied IP addresses and domains.  No traffic in from them, no traffic out to them.

My questions:

1. In what format, and inside what file type, can I import these individual domains and IP addresses all at the same time (as a network object, or... what)?

2. What is best practice (and how exactly do I) import this list into a rule?

Thanks for your attention.
DemolayAsked:
Who is Participating?
 
rauenpcConnect With a Mentor Commented:
With command line this shouldn't be too bad of a task. If you are uncomfortable with CLI, you could start off with ASDM to make the object group (and you only need to enter 1 object in the group initially), and then setup the ACL lines. From there you can copy/paste in CLI. You might need to get notepad out and do some edit/replace, or in some cases I've used a combination of excel and notepad in order to get additional text.
0
 
rauenpcCommented:
I'm not very experienced with blocking domain names, but below is a good link on how it's done.

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml

As far as IP's go, I've never done a bulk import using ASDM nor do I believe that function specifically exists. The easiest way you will be able to get the results you want is to go with object groups. I would add an ACL line to your inbound and outbound ACL's for any taffic going to/from the object group. Then you just need to add all the ip's/networks to the object group and it will block them both directions. This can be done via command line or ASDM, but it is not considered a "bulk import".
0
 
DemolayAuthor Commented:
Unfortunately, the list is *very* long and entering them manually is out of the question.
0
The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

 
DemolayAuthor Commented:
Great, that's helpful.  Can you point me towards a helpful CLI guide?
0
 
rauenpcCommented:
for your case, it might be easier to post a portion of your configuration and we can show you how to make the right changes.

In the ASDM, go to tools --> command line interface
Do a single line command "show run | inc access-group|access-list"

Mask any entry that would identify the company with something like XXXX or xx.xx.xx.xx. This output will show us the ACL's in use and the interfaces they are applied and we can then show what it takes to make the ACL entries and object groups.
0
 
DemolayAuthor Commented:
Thank  you!
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.