<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FirePower URL Blocking in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4131523#M1072699</link>
    <description>&lt;P&gt;Hello Mohammed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are not using any SSL with this policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's a simple policy that allows internet access to all users, except for specific AD users, that have a "denied ANY" except for couple of websites that I have allowed specifically for these users, placed above this block ANY rule. However, these allowed websites are taking a long time to load, taking up to almost 2-5 minutes. We are also noticing Office 365 online portal doesn't take us to the next steps after sign-in because it's using different URLs in the back-end (for authentication). I hoped by just allowing "microsoft.com, office365.com or outlook.com, etc." would help but like I said there are more urls involved and it sucks I have to go in and allow more and urls just to get one website to work properly. Please let me know if you or anyone else has encountered this issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Thu, 06 Aug 2020 16:04:10 GMT</pubDate>
    <dc:creator>burfisaini03</dc:creator>
    <dc:date>2020-08-06T16:04:10Z</dc:date>
    <item>
      <title>Cisco FirePower URL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4128636#M1072484</link>
      <description>&lt;P&gt;Hi community&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a question in-regards to URL blocking. I want to set a rule in policy that would allow me to block all website access except for specific websites, AD users need such as email (owa/outlook client), ticketing system (spiceworks), etc..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would you guys approach this? The way I have done this is but creating an allow rule to the websites they need access to, and right under creating a block rule with "ANY", however, I have noticed ALLOWED websites are loading very slow, and Outlook takes 5 minutes on its initial boot-up. What am I doing wrong here and is there a better way to approach this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 13:09:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4128636#M1072484</guid>
      <dc:creator>burfisaini03</dc:creator>
      <dc:date>2020-07-31T13:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower URL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4128657#M1072488</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;URL filtering shouldn't cause slowness unless you are doing ssl&lt;BR /&gt;interception which is impacting performance because of decryption.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;From CLISH check show cpu and show memory detail&lt;BR /&gt;</description>
      <pubDate>Fri, 31 Jul 2020 13:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4128657#M1072488</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-07-31T13:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower URL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4131523#M1072699</link>
      <description>&lt;P&gt;Hello Mohammed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are not using any SSL with this policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's a simple policy that allows internet access to all users, except for specific AD users, that have a "denied ANY" except for couple of websites that I have allowed specifically for these users, placed above this block ANY rule. However, these allowed websites are taking a long time to load, taking up to almost 2-5 minutes. We are also noticing Office 365 online portal doesn't take us to the next steps after sign-in because it's using different URLs in the back-end (for authentication). I hoped by just allowing "microsoft.com, office365.com or outlook.com, etc." would help but like I said there are more urls involved and it sucks I have to go in and allow more and urls just to get one website to work properly. Please let me know if you or anyone else has encountered this issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 16:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4131523#M1072699</guid>
      <dc:creator>burfisaini03</dc:creator>
      <dc:date>2020-08-06T16:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower URL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4131774#M1072714</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can refer to o365 online urls guide which includes all the details&lt;BR /&gt;published by ms.&lt;BR /&gt;&lt;BR /&gt;For url filtering delay, this is a surprise to see. If you aren't using ssl&lt;BR /&gt;policy then I am assuming that the slowness for http websites only. In&lt;BR /&gt;this case what actions do you have on the rule (ips, file, etc).&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Aug 2020 01:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4131774#M1072714</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-08-07T01:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower URL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4132016#M1072723</link>
      <description>&lt;P&gt;I found the Microsoft page with their URL's and IP addresses, there are a lot of addresses and I think URL filtering only supports max up to 50 entries. Do you know if FMC supports wildcards? I may have to shorten a few of them to fit these requirements. Ex. *.microsoft.com&lt;/P&gt;&lt;P&gt;I do have a policy that does Incoming/Outgoing File inspection but nothing else I see that could be impacting this. I don't understand why this would only effect the AD users specified, all other users excluded from this list have no issues, could this be an issue on the AD end and if so, I can't think of reasons why? &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 14:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4132016#M1072723</guid>
      <dc:creator>burfisaini03</dc:creator>
      <dc:date>2020-08-07T14:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower URL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4132045#M1072724</link>
      <description>&lt;P&gt;There's a Github repo that has a project for downloading the Microsoft URLs in to FMC as an object which can then be used as needed in an Access Control Policy.&lt;/P&gt;
&lt;P&gt;Have a look at it here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/chrivand/Firepower_O365_Feed_Parser" target="_blank"&gt;https://github.com/chrivand/Firepower_O365_Feed_Parser&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 14:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-url-blocking/m-p/4132045#M1072724</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-07T14:56:03Z</dc:date>
    </item>
  </channel>
</rss>

