<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower URL Filtering on non https/http outbound traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017684#M1109106</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are trying to create a rule to allow outbound sftp, ssh &amp;amp; sql traffic based on URL/hostname but we are not getting any luck.&amp;nbsp;&amp;nbsp;We are seeing the traffic but it is being captured as Application and IP address without any url/hostname information.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering if this is only possible on https/http traffic?&amp;nbsp; &amp;nbsp; Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;GDS&lt;/P&gt;</description>
    <pubDate>Tue, 13 Feb 2024 15:30:19 GMT</pubDate>
    <dc:creator>GDS2023</dc:creator>
    <dc:date>2024-02-13T15:30:19Z</dc:date>
    <item>
      <title>Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017684#M1109106</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are trying to create a rule to allow outbound sftp, ssh &amp;amp; sql traffic based on URL/hostname but we are not getting any luck.&amp;nbsp;&amp;nbsp;We are seeing the traffic but it is being captured as Application and IP address without any url/hostname information.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering if this is only possible on https/http traffic?&amp;nbsp; &amp;nbsp; Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;GDS&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 15:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017684#M1109106</guid>
      <dc:creator>GDS2023</dc:creator>
      <dc:date>2024-02-13T15:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017779#M1109109</link>
      <description>&lt;P&gt;sorry I dont get your request url for ssh and sftp?&lt;/P&gt;
&lt;P&gt;Maybe you looking for using fqdn for ACP?&lt;/P&gt;
&lt;P&gt;If Yes then check below&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214505-configure-fqdn-based-object-for-access-c.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214505-configure-fqdn-based-object-for-access-c.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 19:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017779#M1109109</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-13T19:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017823#M1109111</link>
      <description>&lt;P&gt;Thanks for your reply.&amp;nbsp; FQDN sounds like a solution which I have tried.&amp;nbsp; Work on the first time but not after the fqdn host got a new IP.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 20:50:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017823#M1109111</guid>
      <dc:creator>GDS2023</dc:creator>
      <dc:date>2024-02-13T20:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017828#M1109112</link>
      <description>&lt;P&gt;Can you more elaborate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 20:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017828#M1109112</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-13T20:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017890#M1109116</link>
      <description>&lt;P&gt;I'll try my best with the screenshot.&amp;nbsp; &amp;nbsp;Hope you'll get what I meant.&lt;/P&gt;&lt;P&gt;1. Created network object FQDN-TEST with the value of &lt;A href="http://www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. Added a BLOCK rule from my data zone/network to FQDN-TEST&lt;/P&gt;&lt;P&gt;3. Before applying the rule, I can ping &lt;A href="http://www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;4. After applying the rule, &lt;A href="http://www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;&amp;nbsp;times out&lt;/P&gt;&lt;P&gt;5. After a while, &lt;A href="http://www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;&amp;nbsp;is resolving to a new IP.&amp;nbsp; Ping is allowed and not hitting the block rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 22:27:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017890#M1109116</guid>
      <dc:creator>GDS2023</dc:creator>
      <dc:date>2024-02-13T22:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017894#M1109117</link>
      <description>&lt;P&gt;It can be issue the dns expire entry time is high so the dns not resolve new IP.&lt;/P&gt;
&lt;P&gt;From fmc&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Devices &amp;gt; Platform Settings &amp;gt; DNS&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can you reduce it and check again.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 22:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017894#M1109117</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-13T22:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017904#M1109119</link>
      <description>&lt;P&gt;Sorry, I should have mention that the FTD is managed locally and not with FMC.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks like default poll time is 4 hours.&amp;nbsp; I'll lower it for testing and will report back.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 22:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5017904#M1109119</guid>
      <dc:creator>GDS2023</dc:creator>
      <dc:date>2024-02-13T22:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018231#M1109145</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/311088"&gt;@GDS2023&lt;/a&gt;, FQDN-based rules have never been working properly on either ASA or FTD and will never work, so don't use them. The problem here is that many large enterprises like Google or Cisco use round-robin DNS. Their DNS servers respond with a subset of IP addresses (or a single IP) to a DNS query. FQDNs you configured on FTD in an ACP (or FQDNs configured in an ASA ACL) are resolved by the firewall itself. The client behind the firewall also resolves the same FQDN. Obviously, it is not guaranteed that the firewall and clients get same IP address from the outside DNS server. In this case, when the client sends a packet, the firewall cannot find an entry in its DNS cache for the packet's destination IP and hence cannot apply proper ACP rule or ASA ACL.&lt;/P&gt;&lt;P&gt;This basically means that entire implementation is broken.&lt;/P&gt;&lt;P&gt;ASA has Botnet Traffic Filtering feature with a different design. Instead of resolving FQDN configured in an ACLs, ASA sniffs DNS requests and responses and populates cache from DNS traffic. This is a completely different story, but at some point the feature was deprecated.&lt;/P&gt;&lt;P&gt;Later Network-Service Objects were implemented on ASA with a somewhat similar idea and code ported to FTD. But on FTD this is still an ASA/Lina feature and hence can be used in PBR only. It cannot be used in ACP, so far as I know.&lt;/P&gt;&lt;P&gt;DNS requests themselves can be filtered on FTD by either local DNS policy or by cloud-based Cisco Umbrella. This means that the client will either receive NXDOMAIN or be redirected to a sinkhole for certain FQDNs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 14:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018231#M1109145</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-14T14:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018251#M1109148</link>
      <description>&lt;P&gt;This explains the &lt;SPAN&gt;intermittency I'm seeing.&amp;nbsp; &amp;nbsp;Thank you for the excellent explanation.&amp;nbsp; Much appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 14:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018251#M1109148</guid>
      <dc:creator>GDS2023</dc:creator>
      <dc:date>2024-02-14T14:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018252#M1109149</link>
      <description>&lt;P&gt;That correct if the FTD keep one entry for each fqdn'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I know the ftd keep multi IP for same fqdn' and drop traffic destiantion to thesee IP's.&lt;/P&gt;
&lt;P&gt;Fqdn work well in ftd ? I am with you with this point but let him try' I know there are some bug but cisco secure team always work hard to fix this bug.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 14:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018252#M1109149</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-14T14:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018257#M1109150</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"As I know the ftd keep multi IP for same fqdn' and drop traffic destiantion to these IP's."&amp;nbsp; Is there a way check on FTD if the fqdn keeps multi IP?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 15:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018257#M1109150</guid>
      <dc:creator>GDS2023</dc:creator>
      <dc:date>2024-02-14T15:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018267#M1109154</link>
      <description>&lt;PRE&gt;aleescob# show dns
Name: talosintelligence.com
  Address: 2001:DB8::6810:1b36                          TTL 00:05:43
  Address: 2001:DB8::6810:1c36                          TTL 00:05:43
  Address: 2001:DB8::6810:1d36                          TTL 00:05:43
  Address: 2001:DB8::6810:1a36                          TTL 00:05:43
  Address: 2001:DB8::6810:1936                          TTL 00:05:43
  Address: 192.168.27.54                                  TTL 00:05:43
  Address: 192.168.29.54                                  TTL 00:05:43
  Address: 192.168.28.54                                  TTL 00:05:43
  Address: 192.168.26.54                                  TTL 00:05:43
  Address: 192.168.25.54&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214698-understand-fqdn-feature-on-firepower-thr.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214698-understand-fqdn-feature-on-firepower-thr.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 15:12:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018267#M1109154</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-14T15:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018285#M1109156</link>
      <description>&lt;P&gt;Thanks!&amp;nbsp; The one listed below was the initial IP before adding the rule.&amp;nbsp; &amp;nbsp;I'm pretty sure it changed to something else during my testing but it only kept the initial one.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GDS2023_0-1707924007486.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210270i06E1B1CB1F18F552/image-size/medium?v=v2&amp;amp;px=400" role="button" title="GDS2023_0-1707924007486.png" alt="GDS2023_0-1707924007486.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;EDIT:&lt;BR /&gt;See below:&amp;nbsp; So it looks like it keeps multi IP.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GDS2023_1-1707924198056.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210273i035DA737AE0760C2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="GDS2023_1-1707924198056.png" alt="GDS2023_1-1707924198056.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 15:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018285#M1109156</guid>
      <dc:creator>GDS2023</dc:creator>
      <dc:date>2024-02-14T15:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018301#M1109157</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;, this is not a bug. This is bad design of the product. There is a doc bug which discourages use of FQDNs:&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;CSCwi04109&lt;/SPAN&gt; DOC ASA/FTD guides should discourage use of FQDN rules that can resolve into high number of IPs&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt; This is a doc defect. ASA/FTD Configuration Guides should discourage the use of FQDN based rules when associated with FQDNs that can resolved into a high number of IP addresses, such as hundreds or more (example "cylance-optics-files-use1.s3.amazonaws.com"). Efficacy of using FQDN rule for this nature of DNS A record and IPs returned is very low, considering that the chances for a resolved IP used by the source client when initiating the connection to match an existing DNS entry on the FTD is very small. (for the FQDN above for instance which can resolve into 2,600 addresses or more, and that in default settings the firewall will end up having about 100 addresses on its DNS database, the efficacy is of approx. 4%) ASA and FTD Configuration Guides should encourage customer to use instead URL and/or IP based rules whenever possible when associating with FQDN behaving as above.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 15:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018301#M1109157</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-14T15:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018307#M1109159</link>
      <description>&lt;P&gt;I dont know what is not clear in my pervious statement' let him try and check.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/311088"&gt;@GDS2023&lt;/a&gt;&amp;nbsp;use fqdn and monitor even check if ftd block traffic' if not&lt;/P&gt;
&lt;P&gt;You need to manually add IP to SI blacklist &lt;STRONG&gt;IF&lt;/STRONG&gt; the fqdn not solve your issue.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 15:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018307#M1109159</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-14T15:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018316#M1109160</link>
      <description>&lt;P&gt;If the intention is to allow traffic based on FQDN/URL/hostname why would traffic be added to an IP Security Intelligence blacklist, that is going to block the traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 16:08:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018316#M1109160</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-14T16:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering on non https/http outbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018388#M1109166</link>
      <description>&lt;P&gt;This is because &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; rarely reads initial question carefully and rushes into answering it instead.&lt;/P&gt;&lt;P&gt;ASA/FTD does keep multiple records for the same FQDN in the cache, but this doesn't help, which is quite obvious from the explanation I have given.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 18:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-on-non-https-http-outbound-traffic/m-p/5018388#M1109166</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-14T18:06:04Z</dc:date>
    </item>
  </channel>
</rss>

