<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic &amp;gt; Actually I dont use FTD ,I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076163#M1016977</link>
    <description>&lt;P&gt;&amp;gt; Actually I dont use FTD ,I am using version 6.2 Firepower and my sensor is 5525&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are you using 6.2 as SFR module in ASA? Do you have connection events on the FMC?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I don't really understand your setup. Also, if you don't run FTD (which has a trial 90 days of URL licensing) and you don't have an URL license, what are you trying to achieve will not work.&lt;/P&gt;</description>
    <pubDate>Wed, 22 Feb 2017 10:28:09 GMT</pubDate>
    <dc:creator>Claudiu Cismaru</dc:creator>
    <dc:date>2017-02-22T10:28:09Z</dc:date>
    <item>
      <title>FTD running in ASA Mode</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076153#M1016958</link>
      <description>&lt;P&gt;&amp;nbsp;does &amp;nbsp;CIsco firesight running &amp;nbsp;ni ASA mode sipport &amp;nbsp;using FQDN in Access-list to &amp;nbsp;allow or block access by ports ex SSh&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076153#M1016958</guid>
      <dc:creator>roberto cotto</dc:creator>
      <dc:date>2020-02-21T14:00:58Z</dc:date>
    </item>
    <item>
      <title>If you have the Firepower URL</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076154#M1016960</link>
      <description>&lt;P&gt;If you have the Firepower URL licence you can definitely block by URL ...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If the ASA software is not too old you can also block by FQDN on the ASA side.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2017 03:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076154#M1016960</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2017-02-15T03:20:36Z</dc:date>
    </item>
    <item>
      <title>FTD is running in ASA AND</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076155#M1016963</link>
      <description>&lt;P&gt;FTD is running in ASA AND Firepower mode in the same time. There's no separate way of operations.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can add URL based rules. Or you can add application (like SSH) or you can add ports.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 19:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076155#M1016963</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-16T19:54:06Z</dc:date>
    </item>
    <item>
      <title>thanks for the responce </title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076156#M1016966</link>
      <description>&lt;P&gt;thanks for the responce&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2017 18:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076156#M1016966</guid>
      <dc:creator>roberto cotto</dc:creator>
      <dc:date>2017-02-21T18:41:47Z</dc:date>
    </item>
    <item>
      <title>Hi Philip ,</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076157#M1016969</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/pdath" title="View user profile." class="username" lang="" about="/users/pdath" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;Philip&lt;/A&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Although Firepower has this ability ( at least they insist ) they can not block majority of porn sites ,I am totally fed up with these small issues which made me crazy ,all of them are fall to uncategorized category which actually they should not.I know that Checkpoint or PaloAlto has URL report webpages which you can request to change specific site's category .&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 07:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076157#M1016969</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T07:32:28Z</dc:date>
    </item>
    <item>
      <title>They block. Maybe there's</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076158#M1016971</link>
      <description>&lt;P&gt;They block. Maybe there's something wrong on your setup. Or there could be other configuration issues.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 08:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076158#M1016971</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-22T08:50:18Z</dc:date>
    </item>
    <item>
      <title>what issues ? I dont think</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076159#M1016973</link>
      <description>&lt;P&gt;what issues ? I dont think there is configuration error ,if you want i can share my policy&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 09:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076159#M1016973</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T09:46:35Z</dc:date>
    </item>
    <item>
      <title>Well. Assuming that you have</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076160#M1016974</link>
      <description>&lt;P&gt;Well. Assuming that you have the license active, I need to know what is the ASA model you have. Also the version of the FTD.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If the database is correctly setup on the FTD and the model is not 5506 (where the size of the database is much smaller), you also need to configure the FMC to query the cloud for URLs are not in the database.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, check the FQDN you are testing with against brightcloud.com and see what's the category.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 09:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076160#M1016974</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-22T09:52:37Z</dc:date>
    </item>
    <item>
      <title>Actually I dont use FTD ,I am</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076161#M1016975</link>
      <description>&lt;P&gt;Actually I dont use FTD ,I am using version 6.2 Firepower and my sensor is 5525&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 09:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076161#M1016975</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T09:55:09Z</dc:date>
    </item>
    <item>
      <title>I have done it man all of</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076162#M1016976</link>
      <description>&lt;P&gt;I have done it man all of them ! still doesnt work &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; , Unfortunately I dont have license for opening TAC ,what do you recommend me to do ?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 10:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076162#M1016976</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T10:13:21Z</dc:date>
    </item>
    <item>
      <title>&gt; Actually I dont use FTD ,I</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076163#M1016977</link>
      <description>&lt;P&gt;&amp;gt; Actually I dont use FTD ,I am using version 6.2 Firepower and my sensor is 5525&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are you using 6.2 as SFR module in ASA? Do you have connection events on the FMC?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I don't really understand your setup. Also, if you don't run FTD (which has a trial 90 days of URL licensing) and you don't have an URL license, what are you trying to achieve will not work.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 10:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076163#M1016977</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-22T10:28:09Z</dc:date>
    </item>
    <item>
      <title>I am using Firepower ,not FTD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076164#M1016978</link>
      <description>&lt;P&gt;I am using Firepower ,not FTD ,I have 90 days proper license for this feature ,that's why it should work man&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 10:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076164#M1016978</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T10:58:26Z</dc:date>
    </item>
    <item>
      <title>FTD means Firepower Threat</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076165#M1016979</link>
      <description>&lt;P&gt;FTD means Firepower Threat Defense.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Attach an screenshot of your Access Control Policy.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 11:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076165#M1016979</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-22T11:01:35Z</dc:date>
    </item>
    <item>
      <title>Also, a screenshot from</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076166#M1016980</link>
      <description>&lt;P&gt;Also, a screenshot from System -&amp;gt; Integration page, where URL filtering configuration is shown.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 11:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076166#M1016980</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-22T11:03:22Z</dc:date>
    </item>
    <item>
      <title>FYI</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076167#M1016981</link>
      <description>&lt;P&gt;FYI&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 11:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076167#M1016981</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T11:25:33Z</dc:date>
    </item>
    <item>
      <title>FYI</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076168#M1016983</link>
      <description>&lt;P&gt;FYI&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 11:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076168#M1016983</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T11:26:42Z</dc:date>
    </item>
    <item>
      <title>You're doing it wrong. The</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076169#M1016986</link>
      <description>&lt;P&gt;You're doing it wrong. The URL categories should be configured on the URLs tab of the ACP rule, not on the Applications.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please check the documentation for further information:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Access_Control_Rules__URL_Filtering.html#ID-2189-000001c1&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 11:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076169#M1016986</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-22T11:47:06Z</dc:date>
    </item>
    <item>
      <title>I am sorry I did wrong screen</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076170#M1016988</link>
      <description>&lt;P&gt;I am sorry I did wrong screen ,it should be like that .&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 11:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076170#M1016988</guid>
      <dc:creator>hacizeynal</dc:creator>
      <dc:date>2017-02-22T11:55:53Z</dc:date>
    </item>
    <item>
      <title>Have an endpoint where you</title>
      <link>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076171#M1016989</link>
      <description>&lt;P&gt;Have an endpoint where you can troubleshoot from (used to try to access one of the destinations in those categories). Is recommended that endpoint to not generate too much other traffic&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Open a ssh connection to the FTD's management IP. From cli, run:&lt;/P&gt;
&lt;P&gt;system support firewall-engine-debug&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Provide the filtering info, like this:&lt;/P&gt;
&lt;P&gt;Please specify an IP protocol: tcp&lt;BR /&gt;Please specify a client IP address: your_endpoint_IP_address&lt;BR /&gt;Please specify a client port: &lt;BR /&gt;Please specify a server IP address: &lt;BR /&gt;Please specify a server port: &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now, while it runs, access one of the websites. Stop the debug with CTRL+C. Grab the output and add it in here.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2017 12:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-running-in-asa-mode/m-p/3076171#M1016989</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-02-22T12:08:56Z</dc:date>
    </item>
  </channel>
</rss>

