Solved

Importing multiple IPs and domains into a Cisco ACL via ASDM

Posted on 2013-06-26
6
1,525 Views
Last Modified: 2013-06-26
ASDM Version: 7.1(2)

Cisco Hardware:   ASA5510

Hey folks.  I need to import and blacklist a list of varied IP addresses and domains.  No traffic in from them, no traffic out to them.

My questions:

1. In what format, and inside what file type, can I import these individual domains and IP addresses all at the same time (as a network object, or... what)?

2. What is best practice (and how exactly do I) import this list into a rule?

Thanks for your attention.
0
Comment
Question by:Demolay
  • 3
  • 3
6 Comments
 
LVL 20

Expert Comment

by:rauenpc
ID: 39278161
I'm not very experienced with blocking domain names, but below is a good link on how it's done.

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml

As far as IP's go, I've never done a bulk import using ASDM nor do I believe that function specifically exists. The easiest way you will be able to get the results you want is to go with object groups. I would add an ACL line to your inbound and outbound ACL's for any taffic going to/from the object group. Then you just need to add all the ip's/networks to the object group and it will block them both directions. This can be done via command line or ASDM, but it is not considered a "bulk import".
0
 

Author Comment

by:Demolay
ID: 39278228
Unfortunately, the list is *very* long and entering them manually is out of the question.
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 500 total points
ID: 39278655
With command line this shouldn't be too bad of a task. If you are uncomfortable with CLI, you could start off with ASDM to make the object group (and you only need to enter 1 object in the group initially), and then setup the ACL lines. From there you can copy/paste in CLI. You might need to get notepad out and do some edit/replace, or in some cases I've used a combination of excel and notepad in order to get additional text.
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 

Author Comment

by:Demolay
ID: 39278981
Great, that's helpful.  Can you point me towards a helpful CLI guide?
0
 
LVL 20

Expert Comment

by:rauenpc
ID: 39279304
for your case, it might be easier to post a portion of your configuration and we can show you how to make the right changes.

In the ASDM, go to tools --> command line interface
Do a single line command "show run | inc access-group|access-list"

Mask any entry that would identify the company with something like XXXX or xx.xx.xx.xx. This output will show us the ACL's in use and the interfaces they are applied and we can then show what it takes to make the ACL entries and object groups.
0
 

Author Closing Comment

by:Demolay
ID: 39280071
Thank  you!
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Join & Write a Comment

Suggested Solutions

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now