<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Seriously Cisco/SourceFire??? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624526#M1027976</link>
    <description>&lt;P&gt;Seriously Cisco/SourceFire????? This is your URL filtering? This is a joke.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a TAC case open and I'm curious to hear what the tech I speak to will say when this is happening with 5.3 for everyone.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm extremely disappointed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 01 Mar 2015 20:25:34 GMT</pubDate>
    <dc:creator>David Inabinet</dc:creator>
    <dc:date>2015-03-01T20:25:34Z</dc:date>
    <item>
      <title>Sourcefire URL filtering - odd behavior</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624523#M1027967</link>
      <description>&lt;P&gt;I'm seeing some strange behavior with our new ASA 5545-X with the Sourefire URL filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm intermittently able to get to known bad sites that should be blocked. For example, we are testing the porn URL filtering and our device is configured to NOT allow any Nudity. For some time, I'm able to browse playboy.com or some of the other known bad sites. Then, without any configuration changes, the sites get blocked. It also seems that after an undetermined amount of time, the sites are allowed, at least for the first attempt then they are blocked again - sending users to the block page.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, a few sites (well known Adult sites) are allowed when, clearly, they should be blocked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is anyone seeing anything like this?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:37:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624523#M1027967</guid>
      <dc:creator>David Inabinet</dc:creator>
      <dc:date>2019-03-12T12:37:46Z</dc:date>
    </item>
    <item>
      <title>Yes. This happens in my lab.</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624524#M1027970</link>
      <description>&lt;P&gt;Yes. This happens in my lab. I'm running 5.3 and I'm hoping the upgrade to 5.4 fixes it.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Feb 2015 15:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624524#M1027970</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-28T15:45:16Z</dc:date>
    </item>
    <item>
      <title>Same here running same code.</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624525#M1027973</link>
      <description>&lt;P&gt;Same here running same code.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Feb 2015 21:06:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624525#M1027973</guid>
      <dc:creator>mikgruff3</dc:creator>
      <dc:date>2015-02-28T21:06:10Z</dc:date>
    </item>
    <item>
      <title>Seriously Cisco/SourceFire???</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624526#M1027976</link>
      <description>&lt;P&gt;Seriously Cisco/SourceFire????? This is your URL filtering? This is a joke.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a TAC case open and I'm curious to hear what the tech I speak to will say when this is happening with 5.3 for everyone.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm extremely disappointed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2015 20:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624526#M1027976</guid>
      <dc:creator>David Inabinet</dc:creator>
      <dc:date>2015-03-01T20:25:34Z</dc:date>
    </item>
    <item>
      <title>I'm seeing this same behavior</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624527#M1027981</link>
      <description>&lt;P&gt;I'm seeing this same behavior. I shouldn't be allowed to access &lt;A href="https://community.cisco.com/www.playboy.com" target="_blank"&gt;www.playboy.com&lt;/A&gt; when I've got a rule configured to block "Adult and Pornography" sites. When I look at the connection events it appears that the "URL category" isn't getting set on any of my web browsing type traffic. I verified that I have "Enable automatic updates" turned on and the "URL filtering" update shows it was last updated on 2/26/15.&lt;/P&gt;&lt;P&gt;What's up with this?????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2015 16:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624527#M1027981</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2015-03-02T16:01:12Z</dc:date>
    </item>
    <item>
      <title>Remember that this is an IPS</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624528#M1027983</link>
      <description>&lt;P&gt;Remember that this is an IPS appliance that has had multiple add-on's like URL filtering, NAT, VPN, etc. If you want tried and true URL filtering you should look at the WSA.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2015 21:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624528#M1027983</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-03-02T21:53:33Z</dc:date>
    </item>
    <item>
      <title>I understand your point but</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624529#M1027985</link>
      <description>&lt;P&gt;I understand your point but if the product doesn't work they shouldn't sell it or at least label it as "Beta". It is touted as a top tier URL filtering solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I spoke with TAC today. They are aware of the issue and will be getting back to me with a workaround until an official patch is released.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2015 23:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624529#M1027985</guid>
      <dc:creator>David Inabinet</dc:creator>
      <dc:date>2015-03-02T23:27:07Z</dc:date>
    </item>
    <item>
      <title>I opened a ticket yesterday</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624530#M1027987</link>
      <description>&lt;P&gt;I opened a ticket yesterday and had a tech call me back and resolve this issue. There is a bug that is fixed in v5.3.1.2 and v5.4. After the tech applied the fix the issue was resolved.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2015 13:36:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624530#M1027987</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2015-03-03T13:36:24Z</dc:date>
    </item>
    <item>
      <title>I am having the same issue</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624531#M1027988</link>
      <description>&lt;P&gt;I am having the same issue even with 5.4. it started 3 days ago. what is the solution&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2015 08:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624531#M1027988</guid>
      <dc:creator>Philippos Ioannou</dc:creator>
      <dc:date>2015-03-27T08:18:53Z</dc:date>
    </item>
    <item>
      <title>I am having this same issue</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624532#M1027990</link>
      <description>&lt;P&gt;I am having this same issue but we are running v5.4.1 build 59.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My customer has a rule configured to block "Adult and Pornography" as well as "Music" sites. After successfully reaching &lt;A href="https://community.cisco.com/www.vainaporno.com" target="_blank"&gt;www.vainaporno.com&lt;/A&gt; and &lt;A href="https://community.cisco.com/www.suenamp3.com" target="_blank"&gt;www.suenamp3.com&lt;/A&gt;, the Connection Events show &lt;STRONG&gt;no URL category set &lt;/STRONG&gt;for any of these sites.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to block uncategorized sites? He prefers to create a new rule allowing permitted sites 'on-demand' after the Connection Event has been reviewed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2015 01:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624532#M1027990</guid>
      <dc:creator>Margarita Malacara Cruz</dc:creator>
      <dc:date>2015-04-07T01:32:10Z</dc:date>
    </item>
    <item>
      <title>Also, according to the</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624533#M1027991</link>
      <description>&lt;P&gt;Also, according to the Brightcloud URL / IP Lookup tool, the site &lt;A href="https://community.cisco.com/www.vainaporno.com" target="_blank"&gt;www.vainaporno.com&lt;/A&gt; is actually categorized as "&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="color: rgb(34, 34, 34); line-height: 18px;"&gt;Adult and Pornography&lt;/SPAN&gt;&lt;/SPAN&gt;". But the Connection Events on the Defense Center don't show any URL category set.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.brightcloud.com/tools/url-ip-lookup.php"&gt;http://www.brightcloud.com/tools/url-ip-lookup.php&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/capture_41.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2015 01:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624533#M1027991</guid>
      <dc:creator>Margarita Malacara Cruz</dc:creator>
      <dc:date>2015-04-07T01:52:03Z</dc:date>
    </item>
    <item>
      <title>we had the same issue and got</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624534#M1027992</link>
      <description>&lt;P&gt;we had the same issue and got the url filter to work properly with a workaround from tac&lt;/P&gt;&lt;P&gt;by adding a &lt;STRONG&gt;monitor rule &lt;/STRONG&gt;with the same categories we tried to block above the block urls rule the filter seems to work as it should. by adding this the website is first categorized and then the blocking rule matches&lt;/P&gt;&lt;P&gt;i hope this was helpful!&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2015 17:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624534#M1027992</guid>
      <dc:creator>bernhard.hoerl</dc:creator>
      <dc:date>2015-05-12T17:01:31Z</dc:date>
    </item>
    <item>
      <title>Nobody seems to know the</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624535#M1027993</link>
      <description>&lt;P&gt;Nobody seems to know the solution? I have this and other extrange behaviour allowing traffic to supossedly blocked sites, not receiving the http response page, or not filtering some of my networks.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2015 11:36:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624535#M1027993</guid>
      <dc:creator>alberx</dc:creator>
      <dc:date>2015-05-15T11:36:57Z</dc:date>
    </item>
    <item>
      <title>I think they should come up</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624536#M1027994</link>
      <description>&lt;P&gt;I think they should come up with a major release to fix these issues, because they will lose a lot of customers like this.&amp;nbsp; this is a joke of a product. nowhere near WSA&lt;/P&gt;&lt;P&gt;very disappointed. even using user access under terminal services does not work properly. it binds the username with IP of the server so at the end of the day its the Ip that has access and if you have different access levels for the user on the RDP a big mess happens.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rubbish to me&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2015 11:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624536#M1027994</guid>
      <dc:creator>Philippos Ioannou</dc:creator>
      <dc:date>2015-05-15T11:53:13Z</dc:date>
    </item>
    <item>
      <title>We worked a case on this with</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624537#M1027995</link>
      <description>&lt;P&gt;We worked a case on this with Sourcefire support before they were fully assimilated by Cisco.&lt;/P&gt;&lt;P&gt;My conclusion.......The URL Filtering is pretty much garbage.&lt;/P&gt;&lt;P&gt;Here is the response from support:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"The feature is working as designed, with no plans to change this. However, it's possible they could make this an enhancement. In order to consider that, they would need to understand the specific use case and clarify why you want the change."&lt;/P&gt;&lt;P&gt;"It appears the reason the first attempt passes is because the AC rule category will not match when a cloud lookup has to be done on the URL and the result has not yet been received. It instead matches the later "Allow" rule, so further requests to the same host will be permitted as long as the browser keeps the connection open."&lt;/P&gt;&lt;P&gt;"Note that each Snort&amp;nbsp;instance (appliance) keeps its own individual cache of URL cloud lookups, so a different connection from a different IP address could still go through, if it is load-balanced to a different Snort instance."&lt;/P&gt;&lt;P&gt;"The maximum size of each Snort instance's cache for URL cloud lookups is fixed. When the limit is reached, the least recently used entries are discarded."&lt;/P&gt;&lt;P&gt;"So essentially, the first attempt may pass because a cloud lookup has to be done on the URL and the result has not yet been received."&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2015 20:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624537#M1027995</guid>
      <dc:creator>jonathanross1</dc:creator>
      <dc:date>2015-06-04T20:40:53Z</dc:date>
    </item>
    <item>
      <title>Last week I upgraded to new</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624538#M1027996</link>
      <description>&lt;P&gt;Last week I upgraded to new releases for DC ans sensors. It solved my problems with http reponse page, and it seems URLs are now well categorized and blocked correctly. Try to upgrade maybe it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In 2nd quarter 2015 Cisco Will release 6.0 trying to give more functionalities. I hope also improvements in general behavior, but unfortunately these improvements (web portal as example)&amp;nbsp; does not include time based rules or much more complete http response pages with information about categories bloking sites.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jun 2015 08:48:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624538#M1027996</guid>
      <dc:creator>alberx</dc:creator>
      <dc:date>2015-06-05T08:48:22Z</dc:date>
    </item>
    <item>
      <title>running 5.3.  Playboy blocked</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624539#M1027997</link>
      <description>&lt;P&gt;running 5.3. &amp;nbsp;Playboy blocked, &amp;nbsp;weird url above not blocked the first time. Blocked it the second. &amp;nbsp;I'm literally, fine with that because I'm going to give the information to peoples managers regardless if they got one free peek or not.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jun 2015 12:31:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624539#M1027997</guid>
      <dc:creator>Austin Clark</dc:creator>
      <dc:date>2015-06-05T12:31:59Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624540#M1027998</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are running 5.4 but still it is not working as expected. Many of the bad known websites are allowing even after&amp;nbsp;blocked all related sites and application categories.&lt;/P&gt;
&lt;P&gt;Kindly suggest if any solution for this issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ashok&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2015 16:46:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624540#M1027998</guid>
      <dc:creator>S.ashok S</dc:creator>
      <dc:date>2015-11-09T16:46:30Z</dc:date>
    </item>
    <item>
      <title>You could add them to the</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624541#M1027999</link>
      <description>&lt;P&gt;You could add them to the security intelligence global black list.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 15:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624541#M1027999</guid>
      <dc:creator>Austin Clark</dc:creator>
      <dc:date>2015-11-13T15:17:16Z</dc:date>
    </item>
    <item>
      <title>Hi All,</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624542#M1028000</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;This issue is due to the device behavior which has been corrected in 6.0 release.&lt;/P&gt;
&lt;P&gt;"The first time Snort looks up a URL for filtering, if the URL isn't in shared memory or request cache, it requests the URL from the cloud, but allows the URL to go through. By the time it get's a response from server about it's category, the url is allowed. If you refresh the page or open a new page with same URL it's get's blocked."&lt;/P&gt;
&lt;P&gt;This was tested and reproduced by TAC in lab and enhancement request was filed to change this behavior. The ENH request is CSCuu42562 and this issue has been fixed in latest release 6.0.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/60/relnote/firepower-system-release-notes-version-600.html&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dinkar&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Nov 2015 09:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-url-filtering-odd-behavior/m-p/2624542#M1028000</guid>
      <dc:creator>Dinkar Sharma</dc:creator>
      <dc:date>2015-11-16T09:09:59Z</dc:date>
    </item>
  </channel>
</rss>

