<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Block Wildcard in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5060650#M1110888</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;We have a requirement to block wildcard domain for example *.xx.xx. As this is wildcard we dont see an option to block it in FTD(Managed using FMC). Please suggest a best way to block this wildcard in FTD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sanjay S&lt;/P&gt;</description>
    <pubDate>Mon, 08 Apr 2024 14:56:57 GMT</pubDate>
    <dc:creator>ssan239</dc:creator>
    <dc:date>2024-04-08T14:56:57Z</dc:date>
    <item>
      <title>Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5060650#M1110888</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;We have a requirement to block wildcard domain for example *.xx.xx. As this is wildcard we dont see an option to block it in FTD(Managed using FMC). Please suggest a best way to block this wildcard in FTD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sanjay S&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 14:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5060650#M1110888</guid>
      <dc:creator>ssan239</dc:creator>
      <dc:date>2024-04-08T14:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5060697#M1110909</link>
      <description>&lt;P&gt;You can use SI dns policy' you can in notepad add domain then fed it to FMC and use in ACP SI.&lt;/P&gt;
&lt;P&gt;Did you try that?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 15:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5060697#M1110909</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-08T15:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5061172#M1110918</link>
      <description>&lt;P&gt;Is this the process your speaking of?&amp;nbsp;&lt;A href="https://safe.menlosecurity.com/doc/docview/viewer/docNDCCEB78C228273e1953362d6e58abe0aede2f9b72dfcc5bdc716e33a263d9ea0ed0150b5bedf" target="_blank"&gt;https://safe.menlosecurity.com/doc/docview/viewer/docNDCCEB78C228273e1953362d6e58abe0aede2f9b72dfcc5bdc716e33a263d9ea0ed0150b5bedf&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;We do this for our block list&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 21:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5061172#M1110918</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2024-04-08T21:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5063483#M1110942</link>
      <description>&lt;P&gt;There is a good doc on this:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214852-block-dns-with-security-intelligence-usi.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214852-block-dns-with-security-intelligence-usi.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The document claims that blocking a domain also blocks sub-domains, although I'm not sure. This needs to be tested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 17:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5063483#M1110942</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-09T17:43:52Z</dc:date>
    </item>
    <item>
      <title>Re: Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5064560#M1110949</link>
      <description>&lt;P&gt;The URL in FTD is a string match.&amp;nbsp; So, for example, blocking facebook.com will also block chat.facebook.com.&amp;nbsp; Add a deny statement at the top of the ACP blocking the base domain and this should also block subdomains.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 12:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5064560#M1110949</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-10T12:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5064899#M1110954</link>
      <description>&lt;P&gt;IMO, manual URLF for HTTPS would require either Decryption Policy or TLS Server Identity Discovery for TLS1.3 and matching by CN instead of host portion of the URL itself. This should also work, but there is a chance to face with CSCwi76002 or CSCwf35573 or something similar.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 15:15:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5064899#M1110954</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-10T15:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5065034#M1110959</link>
      <description>&lt;P&gt;I would agree if you are going to inspect the packet details.&amp;nbsp; However, the poster is only looking to block the URL / domain and subdomains which is not encrypted in the HTTPS header.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 16:55:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5065034#M1110959</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-10T16:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: Block Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5066045#M1110999</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;, HTTP header is of course encrypted in both TLS1.2 and TLS1.3. You mean SNI extension in the Client Hello probably, which is not encrypted, right? My understanding of official documentation and TACSEC-2002 (Las Vegas 2023) is that manual URL filtering (URL object in ACP rule) doesn't use SNI and relies on server certificate CN instead, if decryption policy is absent:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="URLF.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215519iAE23674FEB804255/image-size/large?v=v2&amp;amp;px=999" role="button" title="URLF.jpg" alt="URLF.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Documentation:&lt;/P&gt;&lt;P class=""&gt;&lt;EM&gt;To filter encrypted traffic, the system determines the requested URL based on information passed during the &lt;SPAN class=""&gt;TLS/SSL&lt;/SPAN&gt; handshake: the subject common name in the public key certificate used to encrypt the traffic.&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;EM&gt;HTTPS filtering, unlike HTTP filtering, disregards subdomains within the subject common name. Do not include subdomain information when manually filtering HTTPS URLs in access control&lt;SPAN class=""&gt; or QoS&lt;/SPAN&gt; policies. For example, use example.com rather than &lt;A href="http://www.example.com" target="_blank" rel="noopener"&gt;www.example.com&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;On the other hand, from TACSEC-2002 it appears that Security Intelligence URL lists and feeds can use SNI, but this is not documented officially.&lt;/P&gt;&lt;P class=""&gt;Documentation is awful.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 10:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-wildcard/m-p/5066045#M1110999</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-11T10:00:30Z</dc:date>
    </item>
  </channel>
</rss>

