<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTD URL Filtering rule issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611885#M1090151</link>
    <description>&lt;P&gt;&lt;A href="https://www.lookingpoint.com/blog/whitelist/blacklist-ips-and-urls-in-fmc" target="_blank"&gt;https://www.lookingpoint.com/blog/whitelist/blacklist-ips-and-urls-in-fmc&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;check this.&lt;/P&gt;</description>
    <pubDate>Tue, 17 May 2022 19:29:27 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-05-17T19:29:27Z</dc:date>
    <item>
      <title>Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610019#M1090065</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we've installed two 2130 FTDs in HA, managed with FMCv, we've configured a rule to block facebook &amp;amp; Youtube. on the Application tab we've selected HTTP &amp;amp; HTTPS plus on the URL tab we've added facebook.com &amp;amp; youtube.com urls. but the traffics are passing and please advise on the issue.&lt;/P&gt;
&lt;P&gt;FMC version 7.0.1, FTD version 6.6.1&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 19:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610019#M1090065</guid>
      <dc:creator>telesymbol</dc:creator>
      <dc:date>2022-05-13T19:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610147#M1090067</link>
      <description>&lt;P&gt;could you confirm your rule blocking facebook and youtube there is no allow any any on above/top of it. what you can do Is to change the rule number. Forexample put your block rule on No1 on the ACP policy and check it. Also it seem you have URL lic as you mentioned that you put the web address in URL too.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 May 2022 08:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610147#M1090067</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-14T08:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610376#M1090082</link>
      <description>&lt;P&gt;I think for FTD there is Blacklist and whitelist for Web, you must include these Web site to this list.&lt;BR /&gt;this list is override the other ACL.&lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 11:57:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610376#M1090082</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-15T11:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610454#M1090084</link>
      <description>&lt;P&gt;Could you post the log entry for the traffic that is being allowed which should be denied.&lt;/P&gt;
&lt;P&gt;My initial thought is that this traffic is not matching on the Application field.&amp;nbsp; I suggest you use port tcp/80 and tcp/443 instead of application.&lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 20:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4610454#M1090084</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-05-15T20:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611329#M1090128</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the rule is placed on top of all rules. and for test purpose we've blocked other sites like BBC, CNN, Gmail and others and works as expected but not for facebook and youtube. our FTD version was 6.6.1, upgraded it to 6.6.5 but nothing changed. we've disabled all DNS rules, do we need to create SSL policy for URL filtering ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 09:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611329#M1090128</guid>
      <dc:creator>telesymbol</dc:creator>
      <dc:date>2022-05-17T09:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611428#M1090130</link>
      <description>&lt;P&gt;Again, as I mentioned in my previous post, you need to look at the logs that are allowing facebook.com and youtube.com. My initial thought, as also mentioned earlier, is that you are not matching on http and https application field. I suggest using ports http and https or just remove that and only match on the URL. &amp;nbsp;Optionally you could check if there is a Facebook and YouTube application you can match on.&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 10:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611428#M1090130</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-05-17T10:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611862#M1090146</link>
      <description>&lt;P&gt;please find attached screen shots of the policy configured. regarding the logs i found some logs for facebook labeled blocked but its accessible by chrome bowser on some PCs but not on firefox and edge and vice versa on the rest of PCs.&lt;/P&gt;
&lt;P&gt;there is no log for youtube, but accessible on all browsers&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 18:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611862#M1090146</guid>
      <dc:creator>telesymbol</dc:creator>
      <dc:date>2022-05-17T18:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611885#M1090151</link>
      <description>&lt;P&gt;&lt;A href="https://www.lookingpoint.com/blog/whitelist/blacklist-ips-and-urls-in-fmc" target="_blank"&gt;https://www.lookingpoint.com/blog/whitelist/blacklist-ips-and-urls-in-fmc&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;check this.&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 19:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611885#M1090151</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-17T19:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611920#M1090152</link>
      <description>&lt;P&gt;I suggest creating a separate rule that denies Facebook and YouTube. The new rule should only match on Facebook and YouTube application, do not include URL. And then test.&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 20:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611920#M1090152</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-05-17T20:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611938#M1090154</link>
      <description>&lt;P&gt;Any proxy in between the Client and the Firepower or your FTD is acting as proxy?&lt;/P&gt;&lt;P&gt;As others mentioned, create two separate rules, if you need, use Facebook and Youtube for applications only and another rule for URL&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 20:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611938#M1090154</guid>
      <dc:creator>SinghRaminder</dc:creator>
      <dc:date>2022-05-17T20:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611952#M1090155</link>
      <description>&lt;P&gt;Also take the debug with :&lt;/P&gt;&lt;P&gt;System support debug-firewall-engine&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use the parameters like tcp source ip, destination fqdn and it will give you the rule you are matching, will come to know what you are missing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 21:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4611952#M1090155</guid>
      <dc:creator>SinghRaminder</dc:creator>
      <dc:date>2022-05-17T21:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4612014#M1090160</link>
      <description>&lt;P&gt;Change your rule from "Block with rest" to "Block".&lt;/P&gt;
&lt;P&gt;most probably if inside traffic tcp is going to facebook/youtube as tcp syn and it getting the syn-ack where as your rule does say Block with rest. try to but Block.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also as mentioned use the command "System support debug-firewall-engine" on your FTD cli.&lt;/P&gt;
&lt;PRE&gt;system support firewall-engine-debug

Please specify an IP protocol: tcp
Please specify a client IP address: x.x.x.x
Please specify a client port:
Please specify a server IP address: youtube/facebook
Please specify a server port:
Monitoring firewall engine debug messages&lt;/PRE&gt;
&lt;P&gt;you can get the youtube/facebook ip addresses from your event logs so you can test them and check the output&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2022 00:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4612014#M1090160</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-18T00:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4613487#M1090235</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally we've configured DNS Policy with a rule that blocks facebook.com and youtube.com domains and applied on the ACP. at the moment we're able to block both facebook and youtube. but there are some users who need access to facebook and youtube. please advise how to exceptionally allow them&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;reagrds&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 19:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4613487#M1090235</guid>
      <dc:creator>telesymbol</dc:creator>
      <dc:date>2022-05-19T19:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4613492#M1090236</link>
      <description>&lt;P&gt;There are some ways:&lt;/P&gt;&lt;P&gt;1. If you have AD integration, use it for allowing and move it to the top in ACP&lt;/P&gt;&lt;P&gt;2. If you have SGT, you can do that with ISE as well ACP&lt;/P&gt;&lt;P&gt;3. Assign then a different VLAN and use Source Group with that range and allow it&lt;/P&gt;&lt;P&gt;4. Assign them reserved IP and add them to the allowed list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other than that, i may be missing something, experts - please let me know as well&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 20:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4613492#M1090236</guid>
      <dc:creator>SinghRaminder</dc:creator>
      <dc:date>2022-05-19T20:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4614703#M1090298</link>
      <description>&lt;P&gt;Depending on how many users need to access facebook and youtube I would consider my options in the following order:&lt;/P&gt;
&lt;P&gt;1. you might want to consider giving them static IPs as this will be much easier to manage&lt;/P&gt;
&lt;P&gt;2. set up AD connectors for the FMC, and then make rules that match on the users AD accounts or AD groups they are member of.&lt;/P&gt;
&lt;P&gt;3. I would not even consider SGT for this solution unless you plan on implementing it throughout your network.&amp;nbsp; The financial and technical cost of implementing this far exceeds the rewards for just a few users.&lt;/P&gt;</description>
      <pubDate>Sat, 21 May 2022 21:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4614703#M1090298</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-05-21T21:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4622568#M1090550</link>
      <description>&lt;P&gt;we've achieved this by creating different DNS rules&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 13:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4622568#M1090550</guid>
      <dc:creator>telesymbol</dc:creator>
      <dc:date>2022-06-01T13:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD URL Filtering rule issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4699166#M1094009</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are not successful applying DNS Policy blocks for youtube.com. Works for Firefox but not Chrome. Do you mind sharing your settings?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 11:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-url-filtering-rule-issues/m-p/4699166#M1094009</guid>
      <dc:creator>mingho</dc:creator>
      <dc:date>2022-10-06T11:24:56Z</dc:date>
    </item>
  </channel>
</rss>

