10-7
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Chapter10 Application Security
URL Filtering
Note Peer-to-peer applications are able to communicate over nonnative protocol
ports, such as HTTP, and through their native TCP and UDP ports. Cisco
SDM configures block and permit actions based on the native port for t he
application, and always blocks communication conducted over HTTP p orts.
Application security policies will not block files if they are being provided by
a paid service such as altnet.com. Files downloaded from peer-to-peer
networks are blocked.
URL Filtering
URL filtering allows you to control user access to Internet websites by using URL
lists. In these lists, you can specify whether a URL is to be permitted or denied.
Include URL filtering capabilities in the Application Security policy by clicking
Enable URL filtering in this window.
You can configure one local URL list on the router that is used for all Application
Security policies. URL lists can also be stored on URL filter servers that the router
can connect to. Information for these servers is stored in a URL filter server list.
You can configure one URL filter server list on the router that is used for all
Application Security policies.
The local URL list can be maintained in this window by using the Add URL, Edit
URL, and Import URL list buttons. Because Cisco IOS software can maintain
these lists with or without a configured Application Security policy, you can also
maintain these lists the Additional Tasks window.
To learn how to maintain a local URL list, click Local URL List.
To learn how to maintain the URL filter server list, click URL Filter Servers.
For information on how the router uses a local URL list in combination with URL
lists on URL filter servers, click URL Filtering Precedence.
For general information about URL filtering, click URL Filtering Window.