<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you for the information in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864355#M177238</link>
    <description>&lt;P&gt;Thank you for the information Karsten Iwen&lt;/P&gt;
&lt;P&gt;is there any alternative to achieve using destination with wildcards?&lt;/P&gt;
&lt;P&gt;Although Microsoft provided all the IPs used by Office365, its many compared to FQDN just in case.&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jun 2016 07:06:48 GMT</pubDate>
    <dc:creator>John Jenard Valencia</dc:creator>
    <dc:date>2016-06-17T07:06:48Z</dc:date>
    <item>
      <title>ASA ACL using FQDN with Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864353#M177236</link>
      <description>&lt;P&gt;Im new to firewalling and im currently trying to allow traffic from Office 365 on our Cisco ASA 5515-X&lt;/P&gt;
&lt;P&gt;Is the a way to use FQDN with wildcard (ex. *.office365.com)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are numerous destinations similar to the example to allow Office365.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864353#M177236</guid>
      <dc:creator>John Jenard Valencia</dc:creator>
      <dc:date>2019-03-12T07:54:16Z</dc:date>
    </item>
    <item>
      <title>No, that won't work. The ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864354#M177237</link>
      <description>&lt;P&gt;No, that won't work. The ASA uses the FQDNs to resolve them to an IP address. These IPs are used for access-control. With wildcards, the ASA doesn't know what to resolve.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 06:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864354#M177237</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-06-17T06:57:38Z</dc:date>
    </item>
    <item>
      <title>Thank you for the information</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864355#M177238</link>
      <description>&lt;P&gt;Thank you for the information Karsten Iwen&lt;/P&gt;
&lt;P&gt;is there any alternative to achieve using destination with wildcards?&lt;/P&gt;
&lt;P&gt;Although Microsoft provided all the IPs used by Office365, its many compared to FQDN just in case.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 07:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864355#M177238</guid>
      <dc:creator>John Jenard Valencia</dc:creator>
      <dc:date>2016-06-17T07:06:48Z</dc:date>
    </item>
    <item>
      <title>Solutions that inspect the</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864356#M177239</link>
      <description>&lt;P&gt;Solutions that inspect the payload can do that like the FirePower module that you can install in your ASA. But that works best with clear communication and is an extra effort for encrypted communication like HTTPS.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 09:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/2864356#M177239</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-06-17T09:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL using FQDN with Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/4510144#M1085454</link>
      <description>&lt;P&gt;In this example *.&lt;SPAN&gt;office365.com, you just put office365.com and that matches all of the wildcards. I tested this out with a pretty long list of FQDNs, and the test came back successful.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 18:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/4510144#M1085454</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2021-11-29T18:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL using FQDN with Wildcard</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/4930779#M1104645</link>
      <description>&lt;P&gt;does this work as ASA or FTD proactively matches the IP address to the FQDN ( as defined in the ACL ) and there wouldnt not be able to match to any IP for any&amp;nbsp;&lt;SPAN&gt;office365.com ( or its subdomain ) unless its FQDN .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please let me know what is output do you see for show FQDN or show DNS on your device for&amp;nbsp;office365.com .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 10:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-using-fqdn-with-wildcard/m-p/4930779#M1104645</guid>
      <dc:creator>subhasish.p</dc:creator>
      <dc:date>2023-09-28T10:01:30Z</dc:date>
    </item>
  </channel>
</rss>

