<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Marvn, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886948#M154110</link>
    <description>&lt;P&gt;Hi Marvn,&lt;/P&gt;
&lt;P&gt;To be precise, &lt;GS id="0a116970-944f-4f9a-bebf-42e9f84b2d10" ginger_software_uiphraseguid="31e10bb9-aa49-4813-b7e2-1da083b1bd26" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; need to manually block the url and that too without url filtering license.&lt;/P&gt;
&lt;P&gt;I want to &lt;GS id="ea2a9ce4-c04e-4587-b5ba-7f7b5478a5e9" ginger_software_uiphraseguid="3f96a47e-4f58-43cd-b0d3-eb2f1fb74384" class="GINGER_SOFTWARE_mark"&gt;one&lt;/GS&gt; by one block the urls.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;GS id="dab80713-11b0-4569-8b7a-1e50e09d8bd5" ginger_software_uiphraseguid="e15343d5-e584-4f0a-af74-e0bb8374ac21" class="GINGER_SOFTWARE_mark"&gt;Diwakar&lt;/GS&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 May 2016 05:21:58 GMT</pubDate>
    <dc:creator>diwakar410</dc:creator>
    <dc:date>2016-05-09T05:21:58Z</dc:date>
    <item>
      <title>Web filtering in Cisco ASA using the sfr module</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886943#M154103</link>
      <description>&lt;P&gt;Hello there,&lt;/P&gt;
&lt;P&gt;I have Cisco ASA 5515-x version 9.2&lt;GS id="74e383fd-d9a2-49e6-904d-0f19dce2391b" ginger_software_uiphraseguid="7f1bff5c-f2d9-4a22-898e-4ed51ca59576" class="GINGER_SOFTWARE_mark"&gt;(&lt;/GS&gt;2) and &lt;GS id="6f8fb80f-e499-4126-81ba-b64112da3bd8" ginger_software_uiphraseguid="7f1bff5c-f2d9-4a22-898e-4ed51ca59576" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; am using ASDM version 7.2&lt;GS id="88d529d9-bf48-4c27-8ff1-a57d7a5fb44b" ginger_software_uiphraseguid="7f1bff5c-f2d9-4a22-898e-4ed51ca59576" class="GINGER_SOFTWARE_mark"&gt;(&lt;/GS&gt;2). I have &lt;GS id="ac743f4f-7d10-4c50-ba16-4c8b45d388f7" ginger_software_uiphraseguid="9443e9b3-516b-46e3-a673-f7542966f3cb" class="GINGER_SOFTWARE_mark"&gt;sfr&lt;/GS&gt; module 5.3.1 in the ASA. I want to enable the web filtering feature in ASA. Previously, &lt;GS id="a007149a-6f65-4246-bbd2-5ecc90a102c5" ginger_software_uiphraseguid="fb9686ad-0076-437a-8121-2a58965e9736" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; used the &lt;GS id="a7dd373c-46ef-4b22-aa90-956550025de5" ginger_software_uiphraseguid="fb9686ad-0076-437a-8121-2a58965e9736" class="GINGER_SOFTWARE_mark"&gt;regex&lt;/GS&gt; expression method in the ASA to do the &lt;GS id="d94cae07-740b-4fd5-86d2-ad9bd9aa2321" ginger_software_uiphraseguid="fb9686ad-0076-437a-8121-2a58965e9736" class="GINGER_SOFTWARE_mark"&gt;url&lt;/GS&gt; filtering but this was not effective. Since, &lt;GS id="3fb5f0fd-ab29-4e55-bba3-5fd8e121b242" ginger_software_uiphraseguid="ebbdedb5-ba32-4026-9577-36c00d712d6e" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; have &lt;GS id="0f5f63f2-a591-4882-ab7f-5dab4f20eb73" ginger_software_uiphraseguid="ebbdedb5-ba32-4026-9577-36c00d712d6e" class="GINGER_SOFTWARE_mark"&gt;license&lt;/GS&gt; for the &lt;GS id="919b9f09-bc9c-4edb-9692-d389c0347fd3" ginger_software_uiphraseguid="ebbdedb5-ba32-4026-9577-36c00d712d6e" class="GINGER_SOFTWARE_mark"&gt;firesight&lt;/GS&gt; management &lt;GS id="a68520d4-edc1-4241-98a8-738cfba0a727" ginger_software_uiphraseguid="ebbdedb5-ba32-4026-9577-36c00d712d6e" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; want to use it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But &lt;GS id="e0ce31c8-59d6-410b-8263-b01ceb3bf01b" ginger_software_uiphraseguid="361d6749-1423-4bf8-9b84-0aedb83054d8" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; am confused as some &lt;GS id="75a416e7-2e9b-4355-96c2-396462d8bea8" ginger_software_uiphraseguid="361d6749-1423-4bf8-9b84-0aedb83054d8" class="GINGER_SOFTWARE_mark"&gt;cisco&lt;/GS&gt; docs are saying that we need to configure &lt;GS id="8ed94429-e21d-4815-b28e-f498c2d21fdd" ginger_software_uiphraseguid="361d6749-1423-4bf8-9b84-0aedb83054d8" class="GINGER_SOFTWARE_mark"&gt;firesight&lt;/GS&gt; management in &lt;GS id="4e9cda55-263c-4899-9e14-b614ffaaf106" ginger_software_uiphraseguid="361d6749-1423-4bf8-9b84-0aedb83054d8" class="GINGER_SOFTWARE_mark"&gt;vmware&lt;/GS&gt; while &lt;GS id="65538aed-640d-4893-b664-ce7b055293e3" ginger_software_uiphraseguid="361d6749-1423-4bf8-9b84-0aedb83054d8" class="GINGER_SOFTWARE_mark"&gt;other&lt;/GS&gt; are suggesting to run the boot image in the ASA itself. What is the proper way of doing it?&lt;/P&gt;
&lt;P&gt;From the show module command, &lt;GS id="bcc8eb3a-1b27-4ffe-ab83-bd9626d366c9" ginger_software_uiphraseguid="8d9705c6-769f-4af7-a5b0-541cb6685585" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; can see my &lt;GS id="4f5cd06d-239a-45ef-8d41-f009483e27a9" ginger_software_uiphraseguid="8d9705c6-769f-4af7-a5b0-541cb6685585" class="GINGER_SOFTWARE_mark"&gt;sfr&lt;/GS&gt; module is &lt;GS id="1f3ec83b-faca-47dd-acfc-59e37c4ee0ec" ginger_software_uiphraseguid="8d9705c6-769f-4af7-a5b0-541cb6685585" class="GINGER_SOFTWARE_mark"&gt;up so&lt;/GS&gt; does that mean the &lt;GS id="76b9c259-3a53-42e1-b962-2ddb973ac84f" ginger_software_uiphraseguid="8d9705c6-769f-4af7-a5b0-541cb6685585" class="GINGER_SOFTWARE_mark"&gt;sfr&lt;/GS&gt; module is pre-installed and &lt;GS id="69a6e1e9-4845-4f6e-b0c2-1380464a39dd" ginger_software_uiphraseguid="8d9705c6-769f-4af7-a5b0-541cb6685585" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; don't have to do much configurations?&lt;/P&gt;
&lt;P&gt;It would be better for me to run it in ASA &lt;GS id="fb1e5c8f-94be-43f4-bb8f-c918e34170ae" ginger_software_uiphraseguid="22517b4a-f917-42a9-96dd-3c1cc476ae8b" class="GINGER_SOFTWARE_mark"&gt;itself but&lt;/GS&gt; if it doesn't work that way &lt;GS id="49384284-1421-4797-aad9-0afc0d468c7c" ginger_software_uiphraseguid="22517b4a-f917-42a9-96dd-3c1cc476ae8b" class="GINGER_SOFTWARE_mark"&gt;then&lt;/GS&gt; &lt;GS id="b256f974-4e02-4d95-9c0b-0d163e6ca16c" ginger_software_uiphraseguid="22517b4a-f917-42a9-96dd-3c1cc476ae8b" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; will configure in &lt;GS id="ed832e0e-5bd0-4876-b5e2-970dcd438df3" ginger_software_uiphraseguid="22517b4a-f917-42a9-96dd-3c1cc476ae8b" class="GINGER_SOFTWARE_mark"&gt;VM&lt;/GS&gt;. So please &lt;GS id="133ebd73-41a9-465f-9340-cc4253456f19" ginger_software_uiphraseguid="d171cdee-a8b6-42d7-b3f4-1d0e391e5c9f" class="GINGER_SOFTWARE_mark"&gt;clearify&lt;/GS&gt; me regarding my options and &amp;nbsp;my best chances.&lt;/P&gt;
&lt;P&gt;If it is to be installed &lt;GS id="07d97173-1fe6-47b0-b45a-ab98fe3b28f0" ginger_software_uiphraseguid="2893adb1-b995-4836-a123-3b66f08f119f" class="GINGER_SOFTWARE_mark"&gt;in&lt;/GS&gt; VM or in ASA itself, then please provide me the link to download boot images and other files from cisco.com. I have the &lt;GS id="b58837ce-52d1-4da8-bc2e-577128fbe3ca" ginger_software_uiphraseguid="605b3b55-b9b7-4c9b-9594-e96f2ea32a16" class="GINGER_SOFTWARE_mark"&gt;cisco&lt;/GS&gt; user name and &lt;GS id="147d79b0-f1e8-41ef-b699-3edd4939167f" ginger_software_uiphraseguid="605b3b55-b9b7-4c9b-9594-e96f2ea32a16" class="GINGER_SOFTWARE_mark"&gt;password but&lt;/GS&gt; could not find the correct softwares.&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886943#M154103</guid>
      <dc:creator>diwakar410</dc:creator>
      <dc:date>2019-03-12T07:43:23Z</dc:date>
    </item>
    <item>
      <title>Your ASA 5515-X is running</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886944#M154105</link>
      <description>&lt;P&gt;Your ASA 5515-X is running the minimum version necessary to support the FirePOWER (sfr) module. The module is also running the initial release of FirePOWER software for ASA module-based FirePOWER.&lt;/P&gt;
&lt;P&gt;With that combination of ASA and FirePOWER software on your appliance, you are required to use an external FirePOWER Manager to manage the module (create policies, apply licenses, monitor event etc.)&lt;/P&gt;
&lt;P&gt;As of ASA 9.5(1) and FirePOWER 6.0 you have the option to do most of the same functions via ASDM. You would need to upgrade both the ASA (and ASDM) and FirePOWER module to accomplish that.&lt;/P&gt;
&lt;P&gt;In either case you would need the Protect and URL Filtering licenses for the FirePOWER module.&lt;/P&gt;
&lt;P&gt;The Quick Start Guide is here: http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/sfr/firepower-qsg.html&lt;/P&gt;
&lt;P&gt;Also see the excellent Lab Minutes vidoe guides for FirePOWER:&amp;nbsp;http://labminutes.com/video/sec/ASA%20FirePower&lt;/P&gt;
&lt;P&gt;The ASA and ASDM Software is here:&lt;/P&gt;
&lt;P&gt;https://software.cisco.com/download/type.html?mdfid=284143128&amp;amp;flowid=31442&lt;/P&gt;
&lt;P&gt;FirePOWER module software is here:&lt;/P&gt;
&lt;P&gt;https://software.cisco.com/download/release.html?mdfid=286271171&amp;amp;flowid=77243&amp;amp;softwareid=286277393&amp;amp;release=6.0.1&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest&lt;/P&gt;
&lt;P&gt;To run FirePOWER Management Center VM, that software is here:&lt;/P&gt;
&lt;P&gt;https://software.cisco.com/download/release.html?mdfid=286259687&amp;amp;flowid=54052&amp;amp;softwareid=286271056&amp;amp;release=5.4.1.6&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest&lt;/P&gt;
&lt;P&gt;All of the above links require a cisco.com userid with entitlement (support contract) to download the software.&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 17:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886944#M154105</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-05-07T17:07:03Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886945#M154106</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;Thanks a lot for your input. I did the task as you have suggested and it was quite fruitful.&lt;/P&gt;
&lt;P&gt;We have installed the firepower management center in our &lt;GS id="0764bfa3-1dc9-4196-9fa4-1d2de7bfce61" ginger_software_uiphraseguid="1464eb7f-4a39-4a2d-bbd5-746225e9fd1d" class="GINGER_SOFTWARE_mark"&gt;Vmware&lt;/GS&gt; Exsi in our &lt;GS id="611479fe-ec7e-4dbd-9fc9-10e617f1ba27" ginger_software_uiphraseguid="1464eb7f-4a39-4a2d-bbd5-746225e9fd1d" class="GINGER_SOFTWARE_mark"&gt;sfr&lt;/GS&gt; module 5.3.1. Our ASA is 5515-x version 9.2.2 and ASDM version 7.2.2.&lt;BR /&gt;&lt;GS id="d387c8a1-2428-4942-84f4-a7651c54ab77" ginger_software_uiphraseguid="4ae21a0b-ac3c-448e-96d8-a86fdc0d8bf3" class="GINGER_SOFTWARE_mark"&gt;Management&lt;/GS&gt; IP of ASA is 192.168.1.1 and the source fire defense center of &lt;GS id="6d54c640-c474-4938-9124-9ec91574b4f3" ginger_software_uiphraseguid="4ae21a0b-ac3c-448e-96d8-a86fdc0d8bf3" class="GINGER_SOFTWARE_mark"&gt;firepower management center&lt;/GS&gt; is 192.168.0.9 and we have installed the license for &lt;GS id="ba98dc4c-c9df-4d49-8816-e4fab721bbd7" ginger_software_uiphraseguid="4ae21a0b-ac3c-448e-96d8-a86fdc0d8bf3" class="GINGER_SOFTWARE_mark"&gt;sfr&lt;/GS&gt; module. But we don't have the url filtering license.&lt;BR /&gt;Both are &lt;GS id="963b592b-72c8-43be-a825-18281c0a47e5" ginger_software_uiphraseguid="11d71120-ec6a-4e7f-8f7b-58bb312108c4" class="GINGER_SOFTWARE_mark"&gt;in&lt;/GS&gt; different networks. Now, &lt;GS id="2152a8fa-a8ea-43fb-9b2a-8cde40a9fd2b" ginger_software_uiphraseguid="aaced985-7f22-495a-bc51-d351f8feffbc" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; don't see any connection of defense center with the ASA. How am &lt;GS id="8fac9d07-5a50-4131-8797-48b72f09f668" ginger_software_uiphraseguid="eb7fb3de-d0cb-4a77-a4a7-1814991271bc" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; going to block traffic or do the &lt;GS id="1fc3327f-3103-4ee5-866e-6f4f2490e9b3" ginger_software_uiphraseguid="eb7fb3de-d0cb-4a77-a4a7-1814991271bc" class="GINGER_SOFTWARE_mark"&gt;url&lt;/GS&gt; filtering this way?&lt;BR /&gt;My requirements are simple and all &lt;GS id="54de13b4-9490-463a-b8ef-919ae619e7cc" ginger_software_uiphraseguid="d3a6b751-a3f5-41c6-aee2-0cac1cb8f292" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; want is the ultimate solution for the url filtering. And we don't have url filtering license. How to filter the traffic?&lt;/P&gt;</description>
      <pubDate>Sun, 08 May 2016 15:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886945#M154106</guid>
      <dc:creator>diwakar410</dc:creator>
      <dc:date>2016-05-08T15:31:50Z</dc:date>
    </item>
    <item>
      <title>You need to register your</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886946#M154108</link>
      <description>&lt;P&gt;You need to register your FirePOWER module to FireSIGHT. That is a prerequisite. the Quick Start Guide describes how to do so.&lt;/P&gt;
&lt;P&gt;You will also need to apply both the control license and purchase and apply the URL filtering license.&lt;/P&gt;
&lt;P&gt;Once you have done so, you can use URLs in your Access Policy and deploy that to the managed and licensed FirePOWER modules.&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 03:39:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886946#M154108</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-05-09T03:39:36Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886947#M154109</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&lt;GS id="63c3547a-5210-4c6f-ac79-b62039fd6b7d" ginger_software_uiphraseguid="667af234-364e-4443-94e4-3a252fbcfeaa" class="GINGER_SOFTWARE_mark"&gt;Actually i&lt;/GS&gt; &lt;GS id="1cf2e071-f10e-4517-afff-d7974a972cdd" ginger_software_uiphraseguid="667af234-364e-4443-94e4-3a252fbcfeaa" class="GINGER_SOFTWARE_mark"&gt;had not register&lt;/GS&gt; my FirePOWER module to FIRESIGHT. Ok &lt;GS id="9e749c91-6b6b-445f-8cfc-10c7a568f27d" ginger_software_uiphraseguid="3d9d683b-975c-4cbb-8d66-c41746bc6657" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; will do that.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The thing that is bothering me is &lt;GS id="c1356289-ad2d-49a6-9163-d5571ec34f67" ginger_software_uiphraseguid="064ee02c-9a22-47b0-881c-1afbd56063eb" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; don't have url filtering license, all &lt;GS id="1197397d-631a-44ec-9119-308462996a6b" ginger_software_uiphraseguid="064ee02c-9a22-47b0-881c-1afbd56063eb" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; had was the license for the Firesight management center which was for monitoring 2 devices. So is there a way &lt;GS id="3fe67e72-2c26-43c7-b493-18885f01df8a" ginger_software_uiphraseguid="75dedc11-3307-4b9b-9e0e-264e182f5fa7" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; can use url &lt;GS id="03d8b5bc-d2c4-4a1f-ab3d-6ff932e8cced" ginger_software_uiphraseguid="75dedc11-3307-4b9b-9e0e-264e182f5fa7" class="GINGER_SOFTWARE_mark"&gt;filtering&lt;/GS&gt; through &lt;GS id="2daa4588-39d9-4c41-a553-025df7c9050c" ginger_software_uiphraseguid="75dedc11-3307-4b9b-9e0e-264e182f5fa7" class="GINGER_SOFTWARE_mark"&gt;firesight management center&lt;/GS&gt;? &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 04:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886947#M154109</guid>
      <dc:creator>diwakar410</dc:creator>
      <dc:date>2016-05-09T04:10:12Z</dc:date>
    </item>
    <item>
      <title>Hi Marvn,</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886948#M154110</link>
      <description>&lt;P&gt;Hi Marvn,&lt;/P&gt;
&lt;P&gt;To be precise, &lt;GS id="0a116970-944f-4f9a-bebf-42e9f84b2d10" ginger_software_uiphraseguid="31e10bb9-aa49-4813-b7e2-1da083b1bd26" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; need to manually block the url and that too without url filtering license.&lt;/P&gt;
&lt;P&gt;I want to &lt;GS id="ea2a9ce4-c04e-4587-b5ba-7f7b5478a5e9" ginger_software_uiphraseguid="3f96a47e-4f58-43cd-b0d3-eb2f1fb74384" class="GINGER_SOFTWARE_mark"&gt;one&lt;/GS&gt; by one block the urls.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;GS id="dab80713-11b0-4569-8b7a-1e50e09d8bd5" ginger_software_uiphraseguid="e15343d5-e584-4f0a-af74-e0bb8374ac21" class="GINGER_SOFTWARE_mark"&gt;Diwakar&lt;/GS&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 05:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886948#M154110</guid>
      <dc:creator>diwakar410</dc:creator>
      <dc:date>2016-05-09T05:21:58Z</dc:date>
    </item>
    <item>
      <title>To do it manually is possible</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886949#M154111</link>
      <description>&lt;P&gt;To do it manually is possible without URL filtering license but much more laborious.&lt;/P&gt;
&lt;P&gt;First define the URLs you want to block. Objects &amp;gt; Object management &amp;gt; URL then add the one at a time.&lt;/P&gt;
&lt;P&gt;Now that you have the objects defined, build an Access Control policy using them.&lt;/P&gt;
&lt;P&gt;Policies &amp;gt; Access Control &amp;gt; New Policy. The Add Rule and choose from the URL tab and sub-tab to pick the objects you created earlier.&lt;/P&gt;
&lt;P&gt;This is all in addition to any other Access Policy elements, Network Discovery policy etc.&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 12:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886949#M154111</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-05-09T12:49:09Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, </title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886950#M154112</link>
      <description>&lt;P&gt;Hi Marvin,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have installed "Sourcefire_Defense_Center_Virtual64_VMware-5&lt;GS id="842b8f9c-cb65-4705-a4ec-f2d45d56dc1a" ginger_software_uiphraseguid="f9a51c4c-0915-4e1f-91d1-c57176c0b0bb" class="GINGER_SOFTWARE_mark"&gt;.&lt;/GS&gt;3.1-152&lt;GS id="e179c089-c5a6-4948-8421-1d2cc524e8c2" ginger_software_uiphraseguid="f9a51c4c-0915-4e1f-91d1-c57176c0b0bb" class="GINGER_SOFTWARE_mark"&gt;.&lt;/GS&gt;tar" on my virtual machine and it was working. Now the &lt;GS id="f9253857-e72f-451d-b6a3-d3f7c40a99bf" ginger_software_uiphraseguid="cf017284-7ca8-43e6-b129-2edcefee4c1f" class="GINGER_SOFTWARE_mark"&gt;cisco&lt;/GS&gt; support Engineer says &lt;GS id="1c0cc618-2da5-4b47-b256-d665b0f065e2" ginger_software_uiphraseguid="cf017284-7ca8-43e6-b129-2edcefee4c1f" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; need to&amp;nbsp;upgrade to at least version 5.4.1.6 on DC and 5.4.0.7 on SFR. Now this &lt;GS id="3dcdde00-3f36-452d-8c7e-45a17faae26f" ginger_software_uiphraseguid="2584f040-cf88-4982-b8a3-9efce9daa1ae" class="GINGER_SOFTWARE_mark"&gt;has confused&lt;/GS&gt; me. In my understanding, DC is the defense &lt;GS id="0d838e68-d374-4971-a77c-00694d6462e2" ginger_software_uiphraseguid="6bb4e556-d5ce-4b6e-b11c-ec5a6190080c" class="GINGER_SOFTWARE_mark"&gt;center which&lt;/GS&gt; was created using this "&lt;SPAN&gt;Sourcefire_Defense_Center_Virtual64_VMware-5&lt;/SPAN&gt;&lt;SPAN&gt;&lt;GS id="fdfc9de7-bf45-48ba-a4ad-39a146712d84" ginger_software_uiphraseguid="6bb4e556-d5ce-4b6e-b11c-ec5a6190080c" class="GINGER_SOFTWARE_mark"&gt;.&lt;/GS&gt;&lt;/SPAN&gt;&lt;SPAN&gt;3.1-152&lt;/SPAN&gt;&lt;SPAN&gt;&lt;GS id="8ce7ea8b-99f6-45c8-b0c7-e6f90e5e3765" ginger_software_uiphraseguid="6bb4e556-d5ce-4b6e-b11c-ec5a6190080c" class="GINGER_SOFTWARE_mark"&gt;.&lt;/GS&gt;&lt;/SPAN&gt;&lt;SPAN&gt;tar&lt;/SPAN&gt;" image file. If so, then what is to be upgraded to 5.4.0.7 on SFR. SFR is something that is running on ASA is what he told me. But my ASA is running on version 9.2.(2).&lt;/P&gt;
&lt;P&gt;Now &lt;GS id="d8d37c0a-e6f5-4278-872c-8ca90b2f00e6" ginger_software_uiphraseguid="4dedfbb5-3f88-4616-8bfa-5263eac2fcd2" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; have 5.3.1 on DC that is running on &lt;GS id="84da13d2-7c49-420f-a9b8-d6444be62574" ginger_software_uiphraseguid="4dedfbb5-3f88-4616-8bfa-5263eac2fcd2" class="GINGER_SOFTWARE_mark"&gt;VM&lt;/GS&gt;, do &lt;GS id="7dcbbee7-e425-4636-ac2b-8256f3321142" ginger_software_uiphraseguid="4dedfbb5-3f88-4616-8bfa-5263eac2fcd2" class="GINGER_SOFTWARE_mark"&gt;i&lt;/GS&gt; uninstall it and then install the 5.4.0 -763 tar&lt;GS id="0f87743f-c4bc-4d07-922d-504017370e8e" ginger_software_uiphraseguid="4dedfbb5-3f88-4616-8bfa-5263eac2fcd2" class="GINGER_SOFTWARE_mark"&gt;.&lt;/GS&gt;&lt;GS id="a493bc0e-ec6b-44fc-9566-13b363a07246" ginger_software_uiphraseguid="4dedfbb5-3f88-4616-8bfa-5263eac2fcd2" class="GINGER_SOFTWARE_mark"&gt;gz&lt;/GS&gt;? Will that way work?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is difference between&amp;nbsp;&lt;STRONG id="9D50D415D76C4B973668DA9601B3F94AACD7F5DB" class="overlay_img"&gt;&lt;GS id="6c950b92-ed81-401a-b723-500279856d1e" ginger_software_uiphraseguid="7cae9c1f-6473-4ebb-89fd-fdf3e6f48e2c" class="GINGER_SOFTWARE_mark"&gt;FireSIGHT Virtual Defense Center&lt;/GS&gt; for VMware Package Installer&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp; and&amp;nbsp;&lt;STRONG id="BABBA2E8144134AA7A85A2A59AA9EE3004B8B205" class="overlay_img"&gt;Sourcefire 3D Defense Center S3 Upgrade 5.4&lt;/STRONG&gt;&lt;SPAN&gt;&lt;GS id="00f7bdd3-dd07-46ac-b139-cffc89ab9d5b" ginger_software_uiphraseguid="7cae9c1f-6473-4ebb-89fd-fdf3e6f48e2c" class="GINGER_SOFTWARE_mark"&gt;&amp;nbsp;?&lt;/GS&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can you please explain me the whole thing? Sorry for &lt;GS id="bf49fad5-8d29-4275-ae4d-db6b64a6fa81" ginger_software_uiphraseguid="4d624449-8bf3-437f-8e57-732a03eec8f9" class="GINGER_SOFTWARE_mark"&gt;preety&lt;/GS&gt; long queries.&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2016 07:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886950#M154112</guid>
      <dc:creator>diwakar410</dc:creator>
      <dc:date>2016-05-11T07:59:21Z</dc:date>
    </item>
    <item>
      <title>Hello Diwakar,</title>
      <link>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886951#M154113</link>
      <description>&lt;P&gt;Hello Diwakar,&lt;/P&gt;
&lt;P&gt;The answer to your first question is , the engineer must have meant to upgrade the Defence Center (Firesight Management Center ) from existing version of 5.3.1 to 5.4.1.6 which is latest available and stable version . By SFR he means the Firepower device or Firepower SFR module that you have integrated with the ASA firewall. It depends on you what kind of Firepower you have . Verify what kind of Firepower you have like if its a Firepower hardware device or sfr module.&lt;/P&gt;
&lt;P&gt;If you have a DC in 5.3.1 version , you just have to upgrade the DC to 5.4 directly. This is a base image &amp;nbsp;&lt;STRONG&gt;FireSIGHT Virtual Defense Center for VMware Package Installer&lt;/STRONG&gt;&amp;nbsp;to start the fresh installation from 5.4.0. and then update the patch&lt;STRONG&gt;&amp;nbsp;Sourcefire 3D Defense Center S3 Upgrade 5.4&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Refer the following release notes for 5.4 upgrade steps and procedures.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/540/relnotes/FireSIGHT-System-Release-Notes-v5-4.html#pgfId-51290&lt;/P&gt;
&lt;P&gt;5.4 is a major release upgrade due to which it has an installer file as well as a patch.Since you have a 5.3.1 already , you just need to use the patch &lt;STRONG&gt;Sourcefire 3D Defense Center S3 Upgrade 5.4&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;and update it..&lt;/P&gt;
&lt;P&gt;Rate if this post helps you.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 17:15:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-filtering-in-cisco-asa-using-the-sfr-module/m-p/2886951#M154113</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-05-12T17:15:08Z</dc:date>
    </item>
  </channel>
</rss>

