<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FirePower allow visit to specific websites in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396923#M1080466</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yup, PAT with your suggestion will work. I have to modify the existing lazy Access Policy inside any &amp;gt; outside any.&lt;/P&gt;&lt;P&gt;May I have some example for FMC for URL filtering or FQDN object?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roy Lee&lt;/P&gt;</description>
    <pubDate>Mon, 03 May 2021 09:09:49 GMT</pubDate>
    <dc:creator>Roy Lee</dc:creator>
    <dc:date>2021-05-03T09:09:49Z</dc:date>
    <item>
      <title>FirePower allow visit to specific websites</title>
      <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396894#M1080458</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We setup FirePower with NAT(PAT I think) for a group of computer so that they can access internet.&lt;/P&gt;&lt;P&gt;However, we want to allow all computers able to visit a list of websites.&lt;/P&gt;&lt;P&gt;Is it possible and how?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 07:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396894#M1080458</guid>
      <dc:creator>Roy Lee</dc:creator>
      <dc:date>2021-05-03T07:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower allow visit to specific websites</title>
      <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396896#M1080460</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/77525"&gt;@Roy Lee&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you running FTD and how are you managing it, FMC or FDM?&lt;/P&gt;
&lt;P&gt;Or are you running ASA with Firepower services?&lt;/P&gt;
&lt;P&gt;What licensing do you have?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could use URL filtering if you are licensed or FQDN objects, example &lt;A href="https://integratingit.wordpress.com/2021/02/01/ftd-fqdn-objects/" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 07:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396896#M1080460</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-03T07:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower allow visit to specific websites</title>
      <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396911#M1080463</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are running FTD and managing it by FMC.&lt;/P&gt;&lt;P&gt;Not all our internal computers are NATed. How can they access?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 08:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396911#M1080463</guid>
      <dc:creator>Roy Lee</dc:creator>
      <dc:date>2021-05-03T08:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower allow visit to specific websites</title>
      <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396915#M1080464</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/77525"&gt;@Roy Lee&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You'll at least need to PAT traffic from the internal lan, hiding traffic behind the outside interface. You don't need a static NAT per host if that is what you were implying. Restrict the outbound traffic using the options I previously metioned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The other alternative is to use a proxy server, only this server would then need a NAT and outbound firewall rules. You can restrict outbound traffic on the proxy from the internal hosts ip address/username etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 08:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396915#M1080464</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-03T08:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower allow visit to specific websites</title>
      <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396923#M1080466</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yup, PAT with your suggestion will work. I have to modify the existing lazy Access Policy inside any &amp;gt; outside any.&lt;/P&gt;&lt;P&gt;May I have some example for FMC for URL filtering or FQDN object?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roy Lee&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 09:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396923#M1080466</guid>
      <dc:creator>Roy Lee</dc:creator>
      <dc:date>2021-05-03T09:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower allow visit to specific websites</title>
      <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396930#M1080467</link>
      <description>&lt;P&gt;FQDN DNS filtering&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214698-understand-fqdn-feature-on-firepower-thr.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214698-understand-fqdn-feature-on-firepower-thr.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;URL Filtering&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=nXIBDQqekPY" target="_blank"&gt;https://www.youtube.com/watch?v=nXIBDQqekPY&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://wannabecybersecurity.blogspot.com/2019/07/configuring-cisco-fmc-url-filtering.html" target="_blank"&gt;https://wannabecybersecurity.blogspot.com/2019/07/configuring-cisco-fmc-url-filtering.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 09:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4396930#M1080467</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-03T09:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower allow visit to specific websites</title>
      <link>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4571934#M1088360</link>
      <description>&lt;P&gt;In some DHCP swimming pools, you have designated a DNS server other than eight.Eight.8.Eight to get the &lt;A href="https://louise-wener.co.uk/" target="_self"&gt;web agency&lt;/A&gt; service., is that on cause ? Are these 'problem' web sites not handy from unique Vlans, or from everywhere ?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 09:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-allow-visit-to-specific-websites/m-p/4571934#M1088360</guid>
      <dc:creator>euwjrtei</dc:creator>
      <dc:date>2022-03-18T09:13:19Z</dc:date>
    </item>
  </channel>
</rss>

