<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: block all https traffic, only allow *.microsoft.com and any url in in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492314#M1084607</link>
    <description>&lt;P&gt;Yes, at least 3 products can do that: Cisco Secure Firewall (formerly known as Firepower Threat Defense), Umbrella SIG and Cisco Secure Web Appliance (formerly known as WSA).&lt;/P&gt;
&lt;P&gt;Which one is right for you (if any of them are) depends on a lot of things, as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/823684"&gt;@MrBeginner&lt;/a&gt; alluded to.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Oct 2021 04:23:46 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-10-26T04:23:46Z</dc:date>
    <item>
      <title>block all https traffic, only allow *.microsoft.com and any url inside</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492252#M1084605</link>
      <description>&lt;P&gt;hi all&lt;/P&gt;&lt;P&gt;is there any cisco products are able to do that?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 01:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492252#M1084605</guid>
      <dc:creator>ivan.yeung</dc:creator>
      <dc:date>2021-10-26T01:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492294#M1084606</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;You should explain more what is your use case. eg .do you need routers or firewalls and your traffic flow?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 03:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492294#M1084606</guid>
      <dc:creator>MrBeginner</dc:creator>
      <dc:date>2021-10-26T03:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492314#M1084607</link>
      <description>&lt;P&gt;Yes, at least 3 products can do that: Cisco Secure Firewall (formerly known as Firepower Threat Defense), Umbrella SIG and Cisco Secure Web Appliance (formerly known as WSA).&lt;/P&gt;
&lt;P&gt;Which one is right for you (if any of them are) depends on a lot of things, as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/823684"&gt;@MrBeginner&lt;/a&gt; alluded to.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 04:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492314#M1084607</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-10-26T04:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492392#M1084610</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/823684" target="_self"&gt;&lt;SPAN class=""&gt;MrBeginner,&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;let say an enterprise dont allow their emp&lt;SPAN&gt;loyees access internet by default,&amp;nbsp; they access to specific web site only they requested.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;let say employee A requested access&amp;nbsp;O365, but how the network admin takes to get this job done in firewall level?&lt;/P&gt;&lt;P&gt;O365 contains different URL, so it wont work if using URL as a security object?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 06:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492392#M1084610</guid>
      <dc:creator>ivan.yeung</dc:creator>
      <dc:date>2021-10-26T06:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492435#M1084614</link>
      <description>&lt;P&gt;Microsoft publishes a listing of the IP addresses its service map to. You can use that listing to create an object which can then be used in an ACL.&lt;/P&gt;
&lt;P&gt;See this example:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/chrivand/Firepower_O365_Feed_Parser" target="_blank" rel="noopener"&gt;https://github.com/chrivand/Firepower_O365_Feed_Parser&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Cisco has also developed the Cisco Secure Dynamic Attributes Connector (CSDAC) which allows you to automate the process using newer versions of Cisco Secure Firewall (7.0+).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/integrations/dynamic-attributes-connector/1-0/cisco-secure-dynamic-attributes-connector/about-dynamic-attributes-collector.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/integrations/dynamic-attributes-connector/1-0/cisco-secure-dynamic-attributes-connector/about-dynamic-attributes-collector.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 07:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492435#M1084614</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-10-26T07:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492534#M1084620</link>
      <description>Hi Marvin Rhoads,&lt;BR /&gt;Thanks for your suggestions, is there any scalable ways apply to non-famous web site?&lt;BR /&gt;</description>
      <pubDate>Tue, 26 Oct 2021 09:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492534#M1084620</guid>
      <dc:creator>ivan.yeung</dc:creator>
      <dc:date>2021-10-26T09:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492638#M1084625</link>
      <description>&lt;P&gt;If it's just a web site and not a collection of services then you can simply use an FQDN in your ACL.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 12:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4492638#M1084625</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-10-26T12:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4493085#M1084633</link>
      <description>&lt;P&gt;if that web site have tons of FQDN inside? so i can only input those tons of FQDN one by one on firewall ACL?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Oct 2021 00:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4493085#M1084633</guid>
      <dc:creator>ivan.yeung</dc:creator>
      <dc:date>2021-10-27T00:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: block all https traffic, only allow *.microsoft.com and any url in</title>
      <link>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4494608#M1084694</link>
      <description>&lt;P&gt;Correct. Doing whitelisting (vs. blacklisting) can be a very tedious process. That's one reason why very few organizations use that approach.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 01:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-https-traffic-only-allow-microsoft-com-and-any-url/m-p/4494608#M1084694</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-10-29T01:33:24Z</dc:date>
    </item>
  </channel>
</rss>

