<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Marvin in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073336#M145186</link>
    <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;We are using Demo 5516-X that the reason we have old version of Firepower.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;Kindly find the screenshots of the ACLs created and the URL blocking applied on the Device. As you can observe the Category wise blocking is not happening as per the policies configured&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Apr 2017 05:56:32 GMT</pubDate>
    <dc:creator>mdsayeed525</dc:creator>
    <dc:date>2017-04-05T05:56:32Z</dc:date>
    <item>
      <title>ASA with Firepower services</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073334#M145180</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone help me on below query&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;The URL filtering option in Cisco ASA5516-X is not observed to be working and blocking websites based on the&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;&amp;nbsp; &amp;nbsp; category, like if I select the category of Games to block all the Websites related to&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;&amp;nbsp; &amp;nbsp; Games and apply it to the Device, the filtering is not blocking websites related to the Games.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;I am using ASDM for Configuring Firepower services.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;Current ASA version is 9.6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;ASDM version is 7.6 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;ASA firepower verison 5.4.1&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:10:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073334#M145180</guid>
      <dc:creator>mdsayeed525</dc:creator>
      <dc:date>2019-03-12T09:10:41Z</dc:date>
    </item>
    <item>
      <title>Can you share a screen shot</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073335#M145183</link>
      <description>&lt;P&gt;Can you share a screen shot of your access control policy including details of the rules that are not working?&lt;/P&gt;
&lt;P&gt;Also you are running a very old version of FirePOWER - it's actually the first release for that platform. The current release is 6.2.0.1&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 04:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073335#M145183</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-05T04:27:50Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073336#M145186</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;We are using Demo 5516-X that the reason we have old version of Firepower.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;Kindly find the screenshots of the ACLs created and the URL blocking applied on the Device. As you can observe the Category wise blocking is not happening as per the policies configured&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 05:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073336#M145186</guid>
      <dc:creator>mdsayeed525</dc:creator>
      <dc:date>2017-04-05T05:56:32Z</dc:date>
    </item>
    <item>
      <title>OK that looks pretty good.</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073337#M145188</link>
      <description>&lt;P&gt;OK that looks pretty good.&lt;/P&gt;
&lt;P&gt;Can you confirm that the source address is a private network (RFC 1918 space) and that the URL Filtering license is applied?&lt;/P&gt;
&lt;P&gt;Also check the Monitoring tab to look for the connection record details when you access that site. Let's see if that gives any clues.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 06:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073337#M145188</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-05T06:12:31Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073338#M145190</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;The Private Network is the source from where the request comes (Local Network)&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;and URL filtering is applied to it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;I have also attached the Connection monitoring snapshot which shows the blocked action for the individual object Poker.com.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Tahoma','sans-serif';"&gt;Websites are getting Blocked if I create individual object. Category based blocking is not working.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 07:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073338#M145190</guid>
      <dc:creator>mdsayeed525</dc:creator>
      <dc:date>2017-04-05T07:58:27Z</dc:date>
    </item>
    <item>
      <title>I checked this document:</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073339#M145192</link>
      <description>&lt;P&gt;I checked this document:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/118852-technote-firesight-00.html#anc15&lt;/P&gt;
&lt;P&gt;...and see there were some bugs fixed in 5.4.1.1 and later which "&lt;SPAN&gt;Resolved an issue where, in some cases, you were not able to get URL category or URL reputation information. (CSCur38971, CSCus59492)&lt;/SPAN&gt;".&lt;/P&gt;
&lt;P&gt;I suspect if you upgrade your FirePOWER release you will find this issue is resolved.&lt;/P&gt;
&lt;P&gt;You should also confirm that your FirePOWER module itself can resolve FQDNs and reach the Internet as that could also cause this issue. (Use the expert mode cli and do an nslookup and something like a curl to access an https site.)&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;admin@firepower:~$ sudo curl -vvk &lt;A href="https://www.google.com" target="_blank"&gt;https://www.google.com&lt;/A&gt;&lt;BR /&gt;* Rebuilt URL to: &lt;A href="https://www.google.com/" target="_blank"&gt;https://www.google.com/&lt;/A&gt;&lt;BR /&gt;* Trying 216.58.217.132...&lt;BR /&gt;* Connected to &lt;A href="https://community.cisco.com/www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt; (216.58.217.132) port 443 (#0)&lt;BR /&gt;* ALPN, offering http/1.1&lt;BR /&gt;* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH&lt;BR /&gt;* TLSv1.2 (OUT), TLS header, Certificate Status (22):&lt;BR /&gt;* TLSv1.2 (OUT), TLS handshake, Client hello (1):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Server hello (2):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Certificate (11):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Server key exchange (12):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Server finished (14):&lt;BR /&gt;* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):&lt;BR /&gt;* TLSv1.2 (OUT), TLS change cipher, Client hello (1):&lt;BR /&gt;* TLSv1.2 (OUT), TLS handshake, Finished (20):&lt;BR /&gt;* TLSv1.2 (IN), TLS change cipher, Client hello (1):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Finished (20):&lt;BR /&gt;* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;* ALPN, server accepted to use http/1.1&lt;BR /&gt;* Server certificate:&lt;BR /&gt;* subject: C=US; ST=California; L=Mountain View; O=Google Inc; CN=www.google.com&lt;BR /&gt;* start date: Mar 22 16:27:10 2017 GMT&lt;BR /&gt;* expire date: Jun 14 16:16:00 2017 GMT&lt;BR /&gt;* issuer: C=US; O=Google Inc; CN=Google Internet Authority G2&lt;BR /&gt;* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.&lt;BR /&gt;&amp;gt; GET / HTTP/1.1&lt;BR /&gt;&amp;gt; Host: &lt;A href="https://community.cisco.com/www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;&lt;BR /&gt;&amp;gt; User-Agent: curl/7.48.0&lt;BR /&gt;&amp;gt; Accept: */*&lt;BR /&gt;&amp;gt; &lt;BR /&gt;&amp;lt; HTTP/1.1 200 OK&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;lt;output truncated&amp;gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 08:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073339#M145192</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-05T08:21:46Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073340#M145193</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;I have tried the expert mode cli, I could not reach google.com.&lt;/P&gt;
&lt;P&gt;attached the screen shot for reference&lt;/P&gt;
&lt;P&gt;how can we upgrade the asa firepower module?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 13:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073340#M145193</guid>
      <dc:creator>mdsayeed525</dc:creator>
      <dc:date>2017-04-05T13:35:00Z</dc:date>
    </item>
    <item>
      <title>Since you cannot resolve</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073341#M145194</link>
      <description>&lt;P&gt;Since you cannot resolve public FQDNs, it appears your configured DNS is not resolving addresses for you. Fix that first and then re-try.&lt;/P&gt;
&lt;P&gt;If you need to upgrade, it's easiest to just re-image and reconfigure if there's not any significant configuration on the unit. Instructions for that are here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/firewall/asa-firewall-cli/modules-sfr.html#pgfId-1485989&lt;/P&gt;
&lt;P&gt;If it's a demo unit are you a partner or has your partner SE provided it to you? If the latter, they should be able to assist.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 14:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services/m-p/3073341#M145194</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-05T14:06:28Z</dc:date>
    </item>
  </channel>
</rss>

