<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildcard domain matching on the FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489272#M1084504</link>
    <description>&lt;P&gt;I'm working on a similar issue with Office 365. Aldex-PR, did the below suggestion work for you?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Oct 2021 14:52:37 GMT</pubDate>
    <dc:creator>perryj1</dc:creator>
    <dc:date>2021-10-20T14:52:37Z</dc:date>
    <item>
      <title>Wildcard domain matching on the FTD</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4293972#M1078595</link>
      <description>&lt;P&gt;I am trying to limit internet access for a server that needs access to several wildcard based domains and I can't figure out if that is possible on a Firepower FTD managed by FMC&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;As an example, one of the requirements is&lt;BR /&gt;*.compute-*.amazonaws.com - TCP 80, 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is that wildcards won't work in an FQDN based access rule.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Is a workaround to have a url based rule to allow .amazonaws.com ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am confused if this will work as I have only seen URL matching for filtering (blocking) and the other piece of the puzzle is it takes 5 or so packets of a http request before the URL is even seen...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This post talks a bit about creating the wildcard for URL&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/network-security/using-wildcard-in-url-filtering/td-p/3196891" target="_blank"&gt;https://community.cisco.com/t5/network-security/using-wildcard-in-url-filtering/td-p/3196891&lt;/A&gt;&lt;BR /&gt;Firepower does support wildcard, but not this format like (*.microsoft.com) rather it support (.microsoft.com) format. You can create a URL object with value (.microsoft.com) for blocking all microsoft.com domain, it will block for support.microsoft.com/ &lt;A href="http://www.update.microsoft.com/" target="_blank"&gt;www.update.microsoft.com/&lt;/A&gt; or any other sub domain after .microsoft.com. So use dot(.) instead of asterisk(*) it will work fine. I am testing it in production environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This article specifies that the wildcard won't work as an access rule&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214505-configure-fqdn-based-object-for-access-c.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214505-configure-fqdn-based-object-for-access-c.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 21:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4293972#M1078595</guid>
      <dc:creator>Alex-Pr</dc:creator>
      <dc:date>2021-02-18T21:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard domain matching on the FTD</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4294013#M1078597</link>
      <description>&lt;P&gt;If you configure a url object (ex. cisco.com) and reference that in the rule, this will match any url that contains cisco.com.&amp;nbsp; This could be tools.cisco.com or even cisco.com/some-page.&amp;nbsp; So it is not a wildcard per se but will act much like a wild card.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 22:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4294013#M1078597</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-18T22:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard domain matching on the FTD</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489272#M1084504</link>
      <description>&lt;P&gt;I'm working on a similar issue with Office 365. Aldex-PR, did the below suggestion work for you?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 14:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489272#M1084504</guid>
      <dc:creator>perryj1</dc:creator>
      <dc:date>2021-10-20T14:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard domain matching on the FTD</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489281#M1084505</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1264602"&gt;@perryj1&lt;/a&gt;&amp;nbsp;I have actually had more success in some scenarios setting up an FQDN network object.&amp;nbsp; Especially in scenarios where remote side IPs change frequently.&amp;nbsp; Setup a new network object (fqdn), and assign this object in your ACP as the destination.&amp;nbsp; As long as you have DNS setup properly this should work.&amp;nbsp; From FTD command line you can issue &amp;gt; show fqdn to verify resolution.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 15:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489281#M1084505</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-10-20T15:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard domain matching on the FTD</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489479#M1084516</link>
      <description>&lt;P&gt;The way that I find works best is URL matching.&lt;/P&gt;&lt;P&gt;It is not quite a wildcard match but close.&amp;nbsp; It basically allows all the subdomains and directories&lt;/P&gt;&lt;P&gt;as example, of you create it as microsoft.com it will allow as *.microsoft.com/*&lt;/P&gt;&lt;P&gt;How the match is made is when the URL is seen the first few packets.&amp;nbsp; &amp;nbsp;So essentially the ACL will allow the handshake to start and will then kill the session if it cannot match the URL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To do it&lt;/P&gt;&lt;P&gt;1 - Create URL objects&amp;nbsp;&lt;/P&gt;&lt;P&gt;as example microsoft.com&amp;nbsp; &amp;nbsp;(don't put a * or . in front)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 - Create a ACL&lt;/P&gt;&lt;P&gt;Make your destination network ANY (or geographically limit etc)&lt;/P&gt;&lt;P&gt;Dest Port HTTP/HTTPS etc&lt;/P&gt;&lt;P&gt;URLs - Enter your group of URLs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that this will not work for protocols that don't send a URL in the first few packets.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FQDN matching - I don't think this will work for what you are doing. Basically how it works is it is creating a dynamic ACL by periodically querying the FQDN's that you tell it to.&amp;nbsp; So if you don't know every subdomain that it will use you are hooped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for O365, what you may need to do if the URL object doesn't get it to work is create a network group with the 10 or so large network ranges they have listed on their support sites (way more if you are doing IPv6).&amp;nbsp; from there create a ACL that matches an ip from that range and the port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 20:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489479#M1084516</guid>
      <dc:creator>Alex-Pr</dc:creator>
      <dc:date>2021-10-20T20:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard domain matching on the FTD</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489934#M1084539</link>
      <description>&lt;P&gt;Thanks for the advice. While I believe the URL method should work, the potential for the many URL's that MS uses to change has led us to try and automate updating the object group in FMC that we will use in our ACP.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Oct 2021 14:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/4489934#M1084539</guid>
      <dc:creator>perryj1</dc:creator>
      <dc:date>2021-10-21T14:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard domain matching on the FTD</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/5344771#M1123401</link>
      <description>&lt;P&gt;I know this is a 4 year old thread, but&amp;nbsp;thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/123685"&gt;@Alex-Pr&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had a requirement to allow wildcard access to a remote SQL server over tcp/1433, with the host portion of destination URL can dynamically change.&lt;/P&gt;&lt;P&gt;I've tested with 2 rules, one using a wildcard network FQDN object&amp;nbsp; in "subdomain.domain.com" format (no leading "dot ."), and another rule using a wild card URL object, both have port specified to tcp/1433.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rule with network FQDN object did not work, but URL object works.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Initially, after reading &lt;A href="https://community.cisco.com/t5/network-security/using-wildcard-in-url-filtering/td-p/3196891" target="_blank"&gt;Solved: Using wildcard in URL filtering - Cisco Community&lt;/A&gt;&amp;nbsp;i've added URL object as ".subdomain.domain.com" with the leading dot, this worked fine.&lt;/P&gt;&lt;P&gt;then after seeing this post,&amp;nbsp; removed the leading dot and tested, and the access is still still working, so not entirely not sure what to make of the significance of the leading dot.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 15:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-domain-matching-on-the-ftd/m-p/5344771#M1123401</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2025-11-05T15:38:28Z</dc:date>
    </item>
  </channel>
</rss>

