<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL filtering vs IP Address filtering rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-filtering-vs-ip-address-filtering-rules/m-p/4076772#M1069670</link>
    <description>&lt;P&gt;It looks like you have the priority right on your access control list, with URL before IP. In general, IP filtering is faster than URL filtering, so it might be applying the IP restriction first anyway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;either way, you should be able to tell which access control rule the blocks are hitting from event viewer. Maybe the ssh block is hitting a different policy? Maybe your domain whitelist is not hitting the rule as you intend? You might need to check syntax on the domain entry.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I use URL filtering for global whitelist and blacklist. When I have users with issues accessing a site, I add the domain to the global whitelist and it works. But they’re usually using 443. So that’s why I think there might be an issue with 22.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Apr 2020 23:59:00 GMT</pubDate>
    <dc:creator>superadmin9</dc:creator>
    <dc:date>2020-04-29T23:59:00Z</dc:date>
    <item>
      <title>URL filtering vs IP Address filtering rules</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-vs-ip-address-filtering-rules/m-p/4076622#M1069658</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am facing an issue with URL filtering vs IP Address filtering rules, as the title suggests. Let me elaborate more on the issue:&lt;/P&gt;&lt;P&gt;We are using ASA with Firepower Services, managed through an FMC. The two rules at the top are the following:&lt;/P&gt;&lt;P&gt;1. Source IP "All Local Network" Destination IP "Any" Destination Ports "Any" URLs "Allowed-URLs" - Allow&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;Source IP "All Local Network" Destination IP "Allowed-IPs" Destination Ports "Any" URLs "Any" - Allow&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-04-29 at 9.21.43 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/73324iDF84A8F922B4D042/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2020-04-29 at 9.21.43 PM.png" alt="Screen Shot 2020-04-29 at 9.21.43 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "Allowed-URLs" URL group consists of several URL objects, like github.com, bitbucket.org etc.&lt;/P&gt;&lt;P&gt;The "Allowed-IPs" IP group consists of several IP objects, like remote public IP addresses or public IP networks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we liked to achieve is the following - When we have a request from a user to access a certain URL, like github.com, we add the URL object to the "Allowed-URLs" group and access to that particular URL should be allowed on all ports.&lt;/P&gt;&lt;P&gt;The same applies to the second rule with the "Allowed-IPs".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is the following - Our users cannot perform git/ssh operations on github.com or similar websites. However, when I add the IP address ranges of github.com in the "Allowed-IPs" group, then there is no issue and they can perform the previously mentioned operations.&lt;/P&gt;&lt;P&gt;Even a separate rule explicity allowing access to github.com on port 22 does not help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why is this happening i.e. is there somekind of limitation for which protocols work with URL filtering and URL groups?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anyone has experience with this type of issue, please share your opinion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Mile&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 19:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-vs-ip-address-filtering-rules/m-p/4076622#M1069658</guid>
      <dc:creator>milep</dc:creator>
      <dc:date>2020-04-29T19:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering vs IP Address filtering rules</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-vs-ip-address-filtering-rules/m-p/4076772#M1069670</link>
      <description>&lt;P&gt;It looks like you have the priority right on your access control list, with URL before IP. In general, IP filtering is faster than URL filtering, so it might be applying the IP restriction first anyway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;either way, you should be able to tell which access control rule the blocks are hitting from event viewer. Maybe the ssh block is hitting a different policy? Maybe your domain whitelist is not hitting the rule as you intend? You might need to check syntax on the domain entry.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I use URL filtering for global whitelist and blacklist. When I have users with issues accessing a site, I add the domain to the global whitelist and it works. But they’re usually using 443. So that’s why I think there might be an issue with 22.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 23:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-vs-ip-address-filtering-rules/m-p/4076772#M1069670</guid>
      <dc:creator>superadmin9</dc:creator>
      <dc:date>2020-04-29T23:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering vs IP Address filtering rules</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-vs-ip-address-filtering-rules/m-p/4076911#M1069691</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/753191"&gt;@superadmin9&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;It looks like you have the priority right on your access control list, with URL before IP. In general, IP filtering is faster than URL filtering, so it might be applying the IP restriction first anyway?&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;I do not know which one is faster, but in an Access Control Policy, the order of rule execution is top to bottom, so I do not believe that this could be an issue. Seems illogical to everything I have read on ACPs.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;either way, you should be able to tell which access control rule the blocks are hitting from event viewer. Maybe the ssh block is hitting a different policy? Maybe your domain whitelist is not hitting the rule as you intend? You might need to check syntax on the domain entry.&lt;BR /&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;In terms of the syntax, I have checked this multiple times and it should be fine. However, I will check again to confirm which rule is being hit of the Access Control Policy.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I use URL filtering for global whitelist and blacklist. When I have users with issues accessing a site, I add the domain to the global whitelist and it works. But they’re usually using 443. So that’s why I think there might be an issue with 22.&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Yes, I believe this is also an issue. I also tried adding the domains to the global whitelist, however this does not work as well. There might be an issue with all ports, except 80 and 443 i.e. HTTP and HTTPS protocols.&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2020 06:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-vs-ip-address-filtering-rules/m-p/4076911#M1069691</guid>
      <dc:creator>milep</dc:creator>
      <dc:date>2020-04-30T06:11:44Z</dc:date>
    </item>
  </channel>
</rss>

