<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Marvin! :DThat is exactly in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-filtering/m-p/2736287#M178978</link>
    <description>&lt;P&gt;Hi Marvin! &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;That is exactly what I was looking for: "I've seen this feature used maybe &lt;STRONG&gt;once &lt;/STRONG&gt;in production [...] It's &lt;STRONG&gt;not&lt;/STRONG&gt; very &lt;STRONG&gt;robust&lt;/STRONG&gt;..."&lt;/P&gt;&lt;P&gt;I'm playing with a ASA v9.x and reading about the &lt;A href="https://supportforums.cisco.com/document/66011/using-hostnames-dns-access-lists-configuration-steps-caveats-and-troubleshooting"&gt;FQDN feature&lt;/A&gt; implemented I came across with the article I previously quoted "&lt;A href="https://supportforums.cisco.com/document/7201/asa-url-filtering-without-websense-or-n2h2smartfilter-server"&gt;ASA URL filtering without a Websense&lt;/A&gt;" and I wanted to know how much you can do with it.&lt;/P&gt;&lt;P&gt;Thank you very much for all the help &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Sep 2015 14:44:01 GMT</pubDate>
    <dc:creator>Rolando Valenzuela</dc:creator>
    <dc:date>2015-09-09T14:44:01Z</dc:date>
    <item>
      <title>URL filtering</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering/m-p/2736285#M178976</link>
      <description>&lt;P&gt;Hello community!&lt;/P&gt;&lt;P&gt;I was reading the following article: &lt;A href="https://supportforums.cisco.com/document/7201/asa-url-filtering-without-websense-or-n2h2smartfilter-server" target="_blank"&gt;ASA URL filtering without a Websense &lt;/A&gt;and I have additional questions regarding that process.&lt;/P&gt;&lt;P&gt;Is my understanding that the website denied is denied globally thanks to the command &lt;EM&gt;service-policy global_policy global, &lt;/EM&gt;which means that if I have 10 networks on my firewall, the traffic to that website is going to be denied for all of them, right?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that the example shows how to apply the rule to an specific host and we can have some flexibility due the ACL we have to set, but still this is a global setting right?&lt;/P&gt;&lt;P&gt;Is there a way I can setup this rule to only one interface? What about &lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;scalability can I set multiple rules for different type of traffic?&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering/m-p/2736285#M178976</guid>
      <dc:creator>Rolando Valenzuela</dc:creator>
      <dc:date>2019-03-12T06:34:11Z</dc:date>
    </item>
    <item>
      <title>I've seen this feature used</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering/m-p/2736286#M178977</link>
      <description>&lt;P&gt;I've seen this feature used maybe once in production and I've worked on hundreds of ASAs. It's not very robust and most people only ever did it as an experiment to see if they could.&lt;/P&gt;
&lt;P&gt;Anybody serious about URL filtering will use either a proxy or something like the FirePOWER service module.&lt;/P&gt;
&lt;P&gt;That said, you can apply the service policy either globally or on a specific interface. As shown in the article example:&lt;/P&gt;

&lt;PRE&gt;
service-policy http-traffic interface inside&lt;/PRE&gt;

&lt;P&gt;...would do it for the interface with nameif "inside".&lt;/P&gt;
&lt;P&gt;See also the &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/mpf_service_policy.html#pgfId-1469828"&gt;CLI configuration guide reference&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 02:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering/m-p/2736286#M178977</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-09-09T02:14:44Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin! :DThat is exactly</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering/m-p/2736287#M178978</link>
      <description>&lt;P&gt;Hi Marvin! &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;That is exactly what I was looking for: "I've seen this feature used maybe &lt;STRONG&gt;once &lt;/STRONG&gt;in production [...] It's &lt;STRONG&gt;not&lt;/STRONG&gt; very &lt;STRONG&gt;robust&lt;/STRONG&gt;..."&lt;/P&gt;&lt;P&gt;I'm playing with a ASA v9.x and reading about the &lt;A href="https://supportforums.cisco.com/document/66011/using-hostnames-dns-access-lists-configuration-steps-caveats-and-troubleshooting"&gt;FQDN feature&lt;/A&gt; implemented I came across with the article I previously quoted "&lt;A href="https://supportforums.cisco.com/document/7201/asa-url-filtering-without-websense-or-n2h2smartfilter-server"&gt;ASA URL filtering without a Websense&lt;/A&gt;" and I wanted to know how much you can do with it.&lt;/P&gt;&lt;P&gt;Thank you very much for all the help &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 14:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering/m-p/2736287#M178978</guid>
      <dc:creator>Rolando Valenzuela</dc:creator>
      <dc:date>2015-09-09T14:44:01Z</dc:date>
    </item>
  </channel>
</rss>

