<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic URL filtering with HTTPS inspection can indeed block acce... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4853923#M1101544</link>
    <description>URL filtering with HTTPS inspection can indeed block access to specific categories like Gambling, but it may not be 100% effective in blocking all related websites, especially if they are child websites or use different encryption methods. To improve the effectiveness of URL filtering with HTTPS inspection, you need to enable SSL decryption.&lt;BR /&gt;&lt;BR /&gt;SSL decryption would require you to install a certificate on the Firepower Threat Defense (FTD) and on the user's devices. You can use a self-signed certificate generated on the FTD, but it is generally better to use a certificate from a trusted third-party Certificate Authority (CA). The main reason being that third-party CA certificates are already trusted by most devices and browsers, reducing the chances of security warnings or issues due to an untrusted certificate. Additionally, using a third-party CA certificate can help improve the overall security posture of your network and reduce the risk of man-in-the-middle attacks.&lt;BR /&gt;&lt;BR /&gt;To enable SSL decryption on FTD, you should follow these steps:&lt;BR /&gt;&lt;BR /&gt;1. Obtain a valid certificate from a trusted CA or generate a self-signed certificate on the FTD.&lt;BR /&gt;2. Install the certificate on the FTD and configure it for SSL decryption.&lt;BR /&gt;3. If using a self-signed certificate, distribute and install it on all user devices that need to be part of the SSL decryption process.&lt;BR /&gt;4. Create and apply a decryption policy on the FTD, specifying the traffic to be decrypted and the certificate to use for decryption.&lt;BR /&gt;&lt;BR /&gt;It is true that enabling SSL decryption can increase CPU and memory usage on the FTD, as it needs to decrypt, inspect, and re-encrypt the traffic. However, this additional resource usage is generally acceptable and manageable, especially on modern FTD devices with adequate hardware resources. If you are concerned about resource usage, you can selectively decrypt only specific categories of traffic or specific user groups to minimize the impact on device performance.&lt;BR /&gt;&lt;BR /&gt;In summary, enabling SSL decryption with URL filtering on FTD can improve the effectiveness of your network security measures and provide better visibility and control over encrypted traffic. It is recommended to use a trusted third-party CA certificate; however, you can also use a self-signed certificate if necessary. Keep in mind that enabling SSL decryption may consume additional resources on the FTD, but this can be managed through selective decryption policies.</description>
    <pubDate>Tue, 13 Jun 2023 14:44:04 GMT</pubDate>
    <dc:creator>Cisco_Virtual_Engineer</dc:creator>
    <dc:date>2023-06-13T14:44:04Z</dc:date>
    <item>
      <title>FTD URL Filtering unable to inspect https sites</title>
      <link>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4849261#M1101271</link>
      <description>&lt;P&gt;Looks URL filtering was enabled on a policy with different categories like Gambling blocked but unfortunately few of them are still accessible. I gone through some Cisco document, it's mentioned that https inspection for url filtering only works for main website and can't inspect child websites, for http inspection to work with url filtering do we need to enable SSL decryption ?&amp;nbsp; Can we install self signed certificate generated on FTD in user PC's and enable ssl decryption, what's difference if we have third party CA certificate for SSL decryption, any insights and any body did ssl decryption on FTD, also herd ssl decryption will utilize more cpu and memory, is it recommended to enable ssl decryption?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 14:03:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4849261#M1101271</guid>
      <dc:creator>KP6677</dc:creator>
      <dc:date>2023-06-06T14:03:53Z</dc:date>
    </item>
    <item>
      <title>URL filtering with HTTPS inspection can indeed block acce...</title>
      <link>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4853923#M1101544</link>
      <description>URL filtering with HTTPS inspection can indeed block access to specific categories like Gambling, but it may not be 100% effective in blocking all related websites, especially if they are child websites or use different encryption methods. To improve the effectiveness of URL filtering with HTTPS inspection, you need to enable SSL decryption.&lt;BR /&gt;&lt;BR /&gt;SSL decryption would require you to install a certificate on the Firepower Threat Defense (FTD) and on the user's devices. You can use a self-signed certificate generated on the FTD, but it is generally better to use a certificate from a trusted third-party Certificate Authority (CA). The main reason being that third-party CA certificates are already trusted by most devices and browsers, reducing the chances of security warnings or issues due to an untrusted certificate. Additionally, using a third-party CA certificate can help improve the overall security posture of your network and reduce the risk of man-in-the-middle attacks.&lt;BR /&gt;&lt;BR /&gt;To enable SSL decryption on FTD, you should follow these steps:&lt;BR /&gt;&lt;BR /&gt;1. Obtain a valid certificate from a trusted CA or generate a self-signed certificate on the FTD.&lt;BR /&gt;2. Install the certificate on the FTD and configure it for SSL decryption.&lt;BR /&gt;3. If using a self-signed certificate, distribute and install it on all user devices that need to be part of the SSL decryption process.&lt;BR /&gt;4. Create and apply a decryption policy on the FTD, specifying the traffic to be decrypted and the certificate to use for decryption.&lt;BR /&gt;&lt;BR /&gt;It is true that enabling SSL decryption can increase CPU and memory usage on the FTD, as it needs to decrypt, inspect, and re-encrypt the traffic. However, this additional resource usage is generally acceptable and manageable, especially on modern FTD devices with adequate hardware resources. If you are concerned about resource usage, you can selectively decrypt only specific categories of traffic or specific user groups to minimize the impact on device performance.&lt;BR /&gt;&lt;BR /&gt;In summary, enabling SSL decryption with URL filtering on FTD can improve the effectiveness of your network security measures and provide better visibility and control over encrypted traffic. It is recommended to use a trusted third-party CA certificate; however, you can also use a self-signed certificate if necessary. Keep in mind that enabling SSL decryption may consume additional resources on the FTD, but this can be managed through selective decryption policies.</description>
      <pubDate>Tue, 13 Jun 2023 14:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4853923#M1101544</guid>
      <dc:creator>Cisco_Virtual_Engineer</dc:creator>
      <dc:date>2023-06-13T14:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: FTD URL Filtering unable to inspect https sites</title>
      <link>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4853932#M1101545</link>
      <description>&lt;P&gt;Sure you need to enable SSL decryption,&amp;nbsp;&lt;BR /&gt;the traffic first decrypt then inspect as clear text (as http)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 14:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4853932#M1101545</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-13T14:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering with HTTPS inspection can indeed block acce...</title>
      <link>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4854062#M1101555</link>
      <description>&lt;P&gt;Yes we used url filtering but few of the child web sites aren’t working . I am now trying to enable ssl decryption but since it’s 1150 thinking can it handle the resources . Ameya’s thanks for your detailed elaboration .&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 18:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-url-filtering-unable-to-inspect-https-sites/m-p/4854062#M1101555</guid>
      <dc:creator>KP6677</dc:creator>
      <dc:date>2023-06-13T18:18:14Z</dc:date>
    </item>
  </channel>
</rss>

