<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firesight URL filtering - not showing block page for https websites in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815384#M1032192</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have configured URL filtering to block certain pages. I have configured ssl decryption as well. But I noticed that when an https website is blocked firesight is not showing the block page. When http website is blocked the block page is showing properly. Is this a limitation in the firesight?. The firesight version is 6.0.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;
&lt;P&gt;Shabeeb&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 12:53:39 GMT</pubDate>
    <dc:creator>SHABEEB KUNHIPOCKER</dc:creator>
    <dc:date>2019-03-12T12:53:39Z</dc:date>
    <item>
      <title>Firesight URL filtering - not showing block page for https websites</title>
      <link>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815384#M1032192</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have configured URL filtering to block certain pages. I have configured ssl decryption as well. But I noticed that when an https website is blocked firesight is not showing the block page. When http website is blocked the block page is showing properly. Is this a limitation in the firesight?. The firesight version is 6.0.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;
&lt;P&gt;Shabeeb&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815384#M1032192</guid>
      <dc:creator>SHABEEB KUNHIPOCKER</dc:creator>
      <dc:date>2019-03-12T12:53:39Z</dc:date>
    </item>
    <item>
      <title>Not suppose to be but it</title>
      <link>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815385#M1032193</link>
      <description>&lt;P&gt;Not suppose to be but it absolutely is. Upon much investigation (working with Cisco TAC) it appears to be due to the order of operations. Once a URL is blocked, further processing does not occur including applying the SSL policy. Actually decoding the SSL is necessary to inject the block page into the conversation we we never get to the SSL policy if the URL is blocked.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 19:08:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815385#M1032193</guid>
      <dc:creator>smoores</dc:creator>
      <dc:date>2016-02-12T19:08:12Z</dc:date>
    </item>
    <item>
      <title>SSL web filtering occurs with</title>
      <link>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815386#M1032194</link>
      <description>&lt;P&gt;SSL web filtering occurs with server certificate's common name. When end user open any SSL based website. End System does the TCP handshake with the server then SSL handshake starts.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The sensor monitors the SSL handshake and when the server sends the Server certificate. Sensor matches the common&amp;nbsp;name of the certificate with access rule (URL-based rules). If it matches then sensor blocks the connection during the SSL handshake. Hence, the connection has been blocked before reaching to application protocol (HTTP GET request) so the system does not send any response page.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The sensor does the certificate resign (SSL decryption) when it receive the server certificate but at the same time/ packet (server certificate) common name matches to access rule (URL blocking) to block the connection. Hence, blocking of connection has occurred&amp;nbsp;so&amp;nbsp;SSL decryption does not happen. In this way, the system can save some resources (CPU/ Memory).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Sunil Kumar&lt;/P&gt;
&lt;P&gt;Rate if it helps !!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2016 10:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815386#M1032194</guid>
      <dc:creator>Sunil Kumar</dc:creator>
      <dc:date>2016-02-13T10:52:03Z</dc:date>
    </item>
    <item>
      <title>Hi Sunil,</title>
      <link>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815387#M1032195</link>
      <description>&lt;P&gt;Hi Sunil,&lt;/P&gt;
&lt;P&gt;Thanks a lot&amp;nbsp;for the clarification. I opened TAC and got the same response from them. Can you have a look at my another post which is for blocking nested files inside zip?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/12886076/firesight-not-blocking-exe-file-inside-zip-archive&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Shabeeb&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2016 22:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/2815387#M1032195</guid>
      <dc:creator>SHABEEB KUNHIPOCKER</dc:creator>
      <dc:date>2016-02-13T22:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSL web filtering occurs with</title>
      <link>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/3216969#M1032196</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;will this behaviour be adressed in a future release? More and more websites tend towards ssl/https, so the block page feature as it exists today is losing its usability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kr,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Piet&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2017 12:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-url-filtering-not-showing-block-page-for-https/m-p/3216969#M1032196</guid>
      <dc:creator>Piet Vanbeckbergen</dc:creator>
      <dc:date>2017-11-15T12:46:43Z</dc:date>
    </item>
  </channel>
</rss>

