<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block DNS over HTTPS requests in Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4397072#M1080476</link>
    <description>&lt;P&gt;You could try blocking the Application "DNS over HTTPs" or "DNS over TLS".&lt;/P&gt;&lt;P&gt;Worked in my lab just fine, this is FTD 6.7.0.1 managed by FMC though.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acl.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119442i6BE228D9DF7BAB78/image-size/large?v=v2&amp;amp;px=999" role="button" title="acl.png" alt="acl.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119443iD85FE9B5EA36395E/image-size/large?v=v2&amp;amp;px=999" role="button" title="log.png" alt="log.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;BR&lt;BR /&gt;Rick&lt;/P&gt;</description>
    <pubDate>Mon, 03 May 2021 14:50:22 GMT</pubDate>
    <dc:creator>rschlayer</dc:creator>
    <dc:date>2021-05-03T14:50:22Z</dc:date>
    <item>
      <title>Block DNS over HTTPS requests in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4394104#M1080330</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a number of 5506-X devices licensed for URL, IPS, and Malware filtering on the Firepower Module. These are installed in an education setting and therefore it is critical that certain content is blocked for the children using the network. We have discovered today that a certain user has been able to access pornographic thumbnail images from google searches due to the fact that Google Chrome is set to use Secure DNS (DNS over HTTPS) on their device on a public/BYOD network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to prevent users from attempting to use DNS over HTTPS on the Firepower module, and enforce standard DNS requests? We are using ADSM on this device and have no FMC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas or suggestions would be gratefully received.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 15:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4394104#M1080330</guid>
      <dc:creator>Shocksmith</dc:creator>
      <dc:date>2021-04-27T15:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Block DNS over HTTPS requests in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4397072#M1080476</link>
      <description>&lt;P&gt;You could try blocking the Application "DNS over HTTPs" or "DNS over TLS".&lt;/P&gt;&lt;P&gt;Worked in my lab just fine, this is FTD 6.7.0.1 managed by FMC though.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acl.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119442i6BE228D9DF7BAB78/image-size/large?v=v2&amp;amp;px=999" role="button" title="acl.png" alt="acl.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119443iD85FE9B5EA36395E/image-size/large?v=v2&amp;amp;px=999" role="button" title="log.png" alt="log.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;BR&lt;BR /&gt;Rick&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 14:50:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4397072#M1080476</guid>
      <dc:creator>rschlayer</dc:creator>
      <dc:date>2021-05-03T14:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: Block DNS over HTTPS requests in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4397144#M1080483</link>
      <description>&lt;P&gt;What &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/119998"&gt;@rschlayer&lt;/a&gt; said - that's the best option you have with the setup you've described. The application blocking settings should be available in the Firepower configuration section of ASDM.&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 16:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4397144#M1080483</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-03T16:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Block DNS over HTTPS requests in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4397380#M1080502</link>
      <description>&lt;P&gt;Thanks for the response Rick. I actually found this option when looking at this last week but forgot to update the thread.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;To confirm this can blocked using an application rule in ASDM.&lt;/P&gt;</description>
      <pubDate>Tue, 04 May 2021 06:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-dns-over-https-requests-in-firepower/m-p/4397380#M1080502</guid>
      <dc:creator>Shocksmith</dc:creator>
      <dc:date>2021-05-04T06:14:51Z</dc:date>
    </item>
  </channel>
</rss>

