<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Category Block in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833143#M1100323</link>
    <description>&lt;P&gt;yes it matches the URL it will block only - the order rule top down. (so global rule will catch allowed all )&lt;/P&gt;</description>
    <pubDate>Thu, 11 May 2023 09:55:42 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2023-05-11T09:55:42Z</dc:date>
    <item>
      <title>URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833120#M1100322</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;May i know if we configure a Rule with certain unwanted URL Categories to Block on top of the rule base. Will it block only the categories and allow any other traffic from that rule?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 09:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833120#M1100322</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-11T09:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833143#M1100323</link>
      <description>&lt;P&gt;yes it matches the URL it will block only - the order rule top down. (so global rule will catch allowed all )&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 09:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833143#M1100323</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-05-11T09:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833146#M1100324</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; the cisco recommendations L3/L4 traffic should come before rules that require inspection (URL filtering in your instance), as inspection L3/L4 can be evaluated quicker and without inspection.&lt;/P&gt;
&lt;P&gt;If your rules only contain URL categories to block it will only block those categories.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 09:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833146#M1100324</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-11T09:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833150#M1100325</link>
      <description>&lt;P&gt;Yes. It requires the URL Filtering license to block based on category. Assuming you have that, the Block rule will check for the traffic and, if it is found to be destined to a URL categorized among your block categories, it will be blocked.&lt;/P&gt;
&lt;P&gt;Any traffic not matching that rule will be evaluated against the subsequent rules in your Access Control Policy.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 10:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833150#M1100325</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-05-11T10:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833183#M1100329</link>
      <description>&lt;P&gt;Thanks a lot Balaji, Rob and Marvin for the quick reply.&lt;/P&gt;&lt;P&gt;If it is not matching the category in the block rule then it will continue checking the other rules from top to bottom approach and act based on the other ACLs below the Block URL rule?&lt;/P&gt;&lt;P&gt;I want to be more specific on this. Please help me for better understanding on this.&lt;/P&gt;&lt;P&gt;If i configure a rule on top of my rule base as below:&lt;/P&gt;&lt;P&gt;Src Zone: Any&lt;/P&gt;&lt;P&gt;Dst Zone: Any&lt;/P&gt;&lt;P&gt;Src: Any&lt;/P&gt;&lt;P&gt;Dst: Any&lt;/P&gt;&lt;P&gt;URL Category: Spyware, Phishing&lt;/P&gt;&lt;P&gt;Action: Block&lt;/P&gt;&lt;P&gt;In this case i am blocking on Spyware and Phishing and it is on top of the rule base. So if the traffic is not matching this category, then will the packet be implicitly allowed or will it check the next rules with the IP address config and allow or deny based on the config?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 10:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833183#M1100329</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-11T10:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833202#M1100330</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; I would say you should explictly define the SRC (inside) DST (outside) zones and the SRC network (local networks) at a minimum.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 11:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833202#M1100330</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-11T11:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833212#M1100331</link>
      <description>&lt;P&gt;Any reason Rob?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 11:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833212#M1100331</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-11T11:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833218#M1100332</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; if you don't specify the SRC/DST zones and/or networks, all traffic is evaluated against those rules to determine if there is a match. It's more efficient if you are specific when you write the rules.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 11:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833218#M1100332</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-11T11:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833219#M1100333</link>
      <description>&lt;P&gt;Thank you Rob for clarification.&lt;/P&gt;&lt;P&gt;Apart from all traffic being checked by the rule, Will it allow other category traffic as we are blocking only Spyware and Phishing on top of the rule base?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 11:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833219#M1100333</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-11T11:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833221#M1100334</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; traffic that does not match the rule that blocks spyware and phishing will be processed by the other rules in the policy.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 12:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833221#M1100334</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-11T12:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833230#M1100335</link>
      <description>&lt;P&gt;The same rule allow all the other traffic other than Spyware and Phishing is it? If this is the 1st rule in the policy then it will allow everything else and it will not even check the 2nd policy is it? Sorry for being a pain but need to get complete understanding on this. As i am not getting complete picture with the documents i read.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 11:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833230#M1100335</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-11T11:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833239#M1100336</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; traffic that is not spyware or phishing will not match that rule, they will be evaluated by the other rules in the Access Control Policy and permitted/denied accordingly.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 12:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833239#M1100336</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-11T12:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833247#M1100338</link>
      <description>&lt;P&gt;Thank you Very Much Rob for the clear explanation &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 12:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4833247#M1100338</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-11T12:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4836960#M1100458</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;I am hearing lot of other things about the below policy on top.&lt;/P&gt;&lt;P&gt;Src Zone: Any&lt;/P&gt;&lt;P&gt;Dst Zone: Any&lt;/P&gt;&lt;P&gt;Src: Any&lt;/P&gt;&lt;P&gt;Dst: Any&lt;/P&gt;&lt;P&gt;URL Category: Spyware, Phishing&lt;/P&gt;&lt;P&gt;Action: Block&lt;/P&gt;&lt;P&gt;Will FTD allow any traffic from Outside to Inside 3 to 5 packets&amp;nbsp;through in order for a handshake to establish so it can compare the details with the categories in the rule?&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 16:21:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4836960#M1100458</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-16T16:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4836970#M1100459</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; yes,&amp;nbsp; identification should occur within 3 to 5 packets, or after the server certificate exchange in the &lt;SPAN class="ph"&gt;TLS/SSL&lt;/SPAN&gt; handshake if the traffic is encrypted. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/730/management-center-device-config-73/access-url-filtering.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/730/management-center-device-config-73/access-url-filtering.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 16:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4836970#M1100459</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-16T16:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837319#M1100468</link>
      <description>&lt;P&gt;Thank you Rob,&lt;/P&gt;&lt;P&gt;So this mean any public IP accessing inside server on some random port will be allowed 3-5 packets from the rule above and try TCP handshake or SSL handshake and then see if it is matching the category(Phishing and Spyware). If it doesn't match then it will go ahead with other rules is it?&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 06:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837319#M1100468</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-17T06:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837470#M1100471</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; I think it's unlikely you are hosting phishing or spyware servers? In which case don't use "any" as the Source Zone, it's inefficient (as mentioned previously). You probably want a rule from Inside to Outside for URL filtering. Then inbound traffic from a public IP addressing will not match the URL filtering rule and be processed by another rule.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 08:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837470#M1100471</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-17T08:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837561#M1100474</link>
      <description>&lt;P&gt;Thank you Rob,&lt;/P&gt;&lt;P&gt;True, but we do have remote access VPN setup so this has been implemented as Any Source Zone.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 10:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837561#M1100474</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-17T10:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837576#M1100476</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;So does it mean it will allow traffic from out to In using this rule? We have Remote Access VPN users coming from outside so implementing the URL category rule for them will also can cause the issue is it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for being a pain but trying to get more knowledge to follow the best practice.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 11:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837576#M1100476</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2023-05-17T11:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category Block</title>
      <link>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837585#M1100477</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/580642"&gt;@ssan239&lt;/a&gt; if you don't specify source/destination zone and/or network and just on URL category, then that rule will be processed from any direction (inside to outside and vice versa and any other interface). If you want to follow the best practice, then as stated before don't use "any", specify the source/destination, therefore there is no ambiguity.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 11:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-category-block/m-p/4837585#M1100477</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-17T11:28:02Z</dc:date>
    </item>
  </channel>
</rss>

