<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes actually you will need to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011031#M1017510</link>
    <description>&lt;P&gt;Yes actually you will need to redirect traffic in the ASA to sfr module. SFR will take no action since till the time it sees traffic. It is good if you configure NTP, however this doesn't seem to be NTP problem&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jan 2017 18:16:56 GMT</pubDate>
    <dc:creator>Pranay Prasoon</dc:creator>
    <dc:date>2017-01-18T18:16:56Z</dc:date>
    <item>
      <title>blocking a Particular URL with FirePOWER Services using ASDM on ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011028#M1017505</link>
      <description>&lt;DIV dir="ltr"&gt;Hi guys, need a clue about
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;I have an asa 5506-X that is running the next version&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Cisco Adaptive Security Appliance Software Version 9.6(1)&lt;/DIV&gt;
&lt;DIV&gt;Device Manager Version 7.6(1)&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;And the sfr &amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;Mod &amp;nbsp;SSM Application Name &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; SSM Application Version&lt;/DIV&gt;
&lt;DIV&gt;---- ------------------------------ ---------------- --------------------------&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;sfr ASA FirePOWER &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 6.0.0-1005&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Mod &amp;nbsp;Status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Data Plane Status &amp;nbsp; &amp;nbsp; Compatibility&lt;/DIV&gt;
&lt;DIV&gt;---- ------------------ --------------------- -------------&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp;1 Up Sys &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Not Applicable&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;sfr Up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Up&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa#&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;I need to configure an url filter, to block some links. I don't have a server to install &amp;nbsp;the FireSight. And I &amp;nbsp;would like to use only asdm. I &amp;nbsp;am following the steps on the link bellow &lt;B&gt;&amp;nbsp;&lt;/B&gt;&lt;FONT face="arial, helvetica, sans-serif"&gt;&lt;B&gt;(b&lt;/B&gt;&lt;SPAN&gt;&lt;B&gt;locking a Particular URL with FirePOWER Services&lt;/B&gt;)&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;A href="http://www.petenetlive.com/KB/Article/0001107" target="_blank" data-saferedirecturl="https://www.google.com/url?hl=es&amp;amp;q=http://www.petenetlive.com/KB/Article/0001107&amp;amp;source=gmail&amp;amp;ust=1484753998831000&amp;amp;usg=AFQjCNGQR-jJCoQ4gcrVLODREf_gMymChw"&gt;http://www.petenetlive.com/KB/&lt;WBR /&gt;Article/0001107&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;But is not working. &amp;nbsp; I was wondering if something is missing?. Thanks for your help.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:15:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011028#M1017505</guid>
      <dc:creator>eurixjaneth1</dc:creator>
      <dc:date>2019-03-12T13:15:27Z</dc:date>
    </item>
    <item>
      <title>Can you elaborate the issue</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011029#M1017507</link>
      <description>&lt;P&gt;Can you elaborate the issue you are facing at this point? Are you able to manage the firepower with ASDM at this point?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 12:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011029#M1017507</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-18T12:45:59Z</dc:date>
    </item>
    <item>
      <title>I am able to manage the</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011030#M1017508</link>
      <description>&lt;P&gt;I am able to manage the firepower with asdm. I have only the protection and control license enabled. I am blocking some urls with firepower services and then I commit and deploy the changes on the Access Control policy; the task status is completed. But &amp;nbsp;I can still access &amp;nbsp;to the blocked urls since the source networks.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did'nt configure ntp settings on the module, and did´nt follow the steps to "send" the traffic throw the module(8,9). &amp;nbsp;Could it be the problem?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 18:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011030#M1017508</guid>
      <dc:creator>eurixjaneth1</dc:creator>
      <dc:date>2017-01-18T18:10:06Z</dc:date>
    </item>
    <item>
      <title>Yes actually you will need to</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011031#M1017510</link>
      <description>&lt;P&gt;Yes actually you will need to redirect traffic in the ASA to sfr module. SFR will take no action since till the time it sees traffic. It is good if you configure NTP, however this doesn't seem to be NTP problem&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 18:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011031#M1017510</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-18T18:16:56Z</dc:date>
    </item>
    <item>
      <title>http://www.cisco.com/c/en/us</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011032#M1017512</link>
      <description>&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/modules-sfr.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;please see section redirection to module&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 18:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011032#M1017512</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-18T18:21:42Z</dc:date>
    </item>
    <item>
      <title>How can I  verify if I have a</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011033#M1017513</link>
      <description>&lt;P&gt;How can I &amp;nbsp;verify if I have a d&lt;SPAN&gt;efault policy-map applied? Once I redirected the traffic in the asa to the sfr module. Must the asa firepower configuration take effect?. Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 18:51:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011033#M1017513</guid>
      <dc:creator>eurixjaneth1</dc:creator>
      <dc:date>2017-01-18T18:51:47Z</dc:date>
    </item>
    <item>
      <title>Send me command </title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011034#M1017515</link>
      <description>&lt;P&gt;Send me command&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show run class-map&lt;/P&gt;
&lt;P&gt;show run policy-map&lt;/P&gt;
&lt;P&gt;show run service-policy&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes once you apply that wait for some time so that all existing connected are torn down and then test again&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 19:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011034#M1017515</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-18T19:08:08Z</dc:date>
    </item>
    <item>
      <title>ciscoasa# sh runn class-map</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011035#M1017516</link>
      <description>&lt;P&gt;ciscoasa# sh runn class-map&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;ciscoasa# sh runn poli&lt;BR /&gt;ciscoasa# sh runn policy-map&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;ciscoasa# sh runn servi&lt;BR /&gt;ciscoasa# sh runn service-pol&lt;BR /&gt;ciscoasa# sh runn service-policy&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks I'm going to check the link.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 19:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011035#M1017516</guid>
      <dc:creator>eurixjaneth1</dc:creator>
      <dc:date>2017-01-18T19:18:35Z</dc:date>
    </item>
    <item>
      <title>yes you need to do required</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011036#M1017518</link>
      <description>&lt;P&gt;&lt;EM&gt;yes you need to do required configuration&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 19:24:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011036#M1017518</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-18T19:24:15Z</dc:date>
    </item>
    <item>
      <title>Do the following</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011037#M1017520</link>
      <description>&lt;P&gt;Do the following configuration&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list sfr permit ip any any&lt;/P&gt;
&lt;P&gt;class-map sfr&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; match access-list sfr&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp; class sfr&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sfr fail-open&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 05:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011037#M1017520</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-19T05:41:37Z</dc:date>
    </item>
    <item>
      <title>I redirected the traffic in</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011038#M1017523</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I redirected the traffic in the asa to the sfr module. But the url filter still does´nt work.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;iscoasa(config)# show run class-map&lt;BR /&gt;!&lt;BR /&gt;class-map SFR&lt;BR /&gt; match access-list SFR&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;ciscoasa(config)# show run policy-map&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; class SFR&lt;BR /&gt; &lt;SPAN style="color: #ff0000;"&gt;sfr fail-open&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;ciscoasa(config)# show run service-policy&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 21:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011038#M1017523</guid>
      <dc:creator>eurixjaneth1</dc:creator>
      <dc:date>2017-01-19T21:09:54Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011039#M1017526</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I give up with the firepower services, and I am blocking URLs using FQDN objects, and it is working, but I have problems with facebook.com. &amp;nbsp; I can access to the website intermittenly, and the users experimented problems with google complements.&lt;/P&gt;
&lt;P&gt;access-list ACL-INSIDE; 5 elements; name hash: 0xfb5f17a8&lt;BR /&gt;access-list ACL-INSIDE line 1 extended deny ip any object OBJ-FACEBOOK.COM (hitcnt=57) 0x10988964&lt;BR /&gt; access-list ACL-INSIDE line 1 extended deny ip any fqdn facebook.com (resolved) 0xaf2d4651&lt;BR /&gt; access-list ACL-INSIDE line 1 extended deny ip any host 31.13.73.36 (facebook.com) (hitcnt=57) 0x10988964&lt;BR /&gt;access-list ACL-INSIDE line 2 extended deny ip any object OBJ-YOUTUBE.COM (hitcnt=23714) 0x9e8d44e3&lt;BR /&gt; access-list ACL-INSIDE line 2 extended deny ip any fqdn youtube.com (resolved) 0xa3337447&lt;BR /&gt; access-list ACL-INSIDE line 2 extended deny ip any host 216.58.219.78 (youtube.com) (hitcnt=23714) 0x9e8d44e3&lt;BR /&gt;access-list ACL-INSIDE line 3 extended permit ip any any (hitcnt=36658) 0x2ed1288c&lt;BR /&gt;ciscoasa(config)# sh acc&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 16:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011039#M1017526</guid>
      <dc:creator>eurixjaneth1</dc:creator>
      <dc:date>2017-01-20T16:11:02Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011040#M1017528</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Configuration are correct by redirecting the traffic to the SFR module.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Protection and Control only uses IPS and Application blocking.You need a URL license in order to block specific URL. Kindly check on Cisco documents about the licensing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Licensing.html&lt;/P&gt;
&lt;P&gt;Thank you and Best Regards!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 07:25:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-a-particular-url-with-firepower-services-using-asdm-on/m-p/3011040#M1017528</guid>
      <dc:creator>ccg-security</dc:creator>
      <dc:date>2017-02-01T07:25:37Z</dc:date>
    </item>
  </channel>
</rss>

