<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTD URLs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3355930#M1027412</link>
    <description>&lt;P&gt;Security Intelligence uses reputation to quickly block connections to or from known malicious IPs or URLs.&lt;/P&gt;
&lt;P&gt;The white list in the security intelligence is effectively used for false positive IPs and URLs. If you add a URL to the white list in the security intelligence, traffic from to that URL may be dropped later according to the configured polices.&lt;/P&gt;
&lt;P&gt;So most of the time&amp;nbsp;you would use&amp;nbsp;&lt;SPAN&gt;Object Management URLs, but if the URL is blocked because of the security Intelligence you may need to add it to the security intelligence URL white-list.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Bogdan&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Mar 2018 14:24:48 GMT</pubDate>
    <dc:creator>Bogdan Nita</dc:creator>
    <dc:date>2018-03-27T14:24:48Z</dc:date>
    <item>
      <title>Cisco FTD URLs</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3355896#M1027411</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;What is difference between URLs configured&amp;nbsp;on&amp;nbsp;"Object Management &amp;gt; Security Intelligence &amp;gt; URL Lists and Feeds" page and "URL" object located in "&lt;SPAN&gt;Object Management &amp;gt; URL"?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco FTD: Configuration and Troubleshooting book from Ciscopress said that if we need to allow an special URL inside a completely banned URL category, we should create a URL object in "Object Management &amp;gt; URL" and use it inside an another access control rule to allow that URL. So, can't we put that URL inside "Global Whitelist for URL" on "Object Management &amp;gt; Security Intelligence &amp;gt; URL Lists and Feeds" page?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fmc0.png" style="width: 381px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/9452iC1D0A1B5BC51343F/image-size/large?v=v2&amp;amp;px=999" role="button" title="fmc0.png" alt="fmc0.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3355896#M1027411</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2020-02-21T15:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URLs</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3355930#M1027412</link>
      <description>&lt;P&gt;Security Intelligence uses reputation to quickly block connections to or from known malicious IPs or URLs.&lt;/P&gt;
&lt;P&gt;The white list in the security intelligence is effectively used for false positive IPs and URLs. If you add a URL to the white list in the security intelligence, traffic from to that URL may be dropped later according to the configured polices.&lt;/P&gt;
&lt;P&gt;So most of the time&amp;nbsp;you would use&amp;nbsp;&lt;SPAN&gt;Object Management URLs, but if the URL is blocked because of the security Intelligence you may need to add it to the security intelligence URL white-list.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Bogdan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 14:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3355930#M1027412</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-27T14:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URLs</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3355940#M1027413</link>
      <description>Thank you. This is what I'd missed &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Tue, 27 Mar 2018 14:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3355940#M1027413</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2018-03-27T14:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URLs</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3685829#M1027414</link>
      <description>&lt;P&gt;I have a customer with ASA who has 1000+ Objects and ACL rules. They want to understand if they move to FTD can this ruleset be simplified and easier to manage adds moves and changes. They have a huge problem managing direct access to Office 365 as the URLs and IP addresses change all the time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there possibly a category in FPWR URL filtering that would cover all O365 access?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 14:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-urls/m-p/3685829#M1027414</guid>
      <dc:creator>Pete Cowen</dc:creator>
      <dc:date>2018-08-10T14:27:45Z</dc:date>
    </item>
  </channel>
</rss>

