<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Have you looked at the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034178#M431234</link>
    <description>&lt;P&gt;Have you looked at the Configuration Guide? It answers all of your questions and more.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620.html&lt;/P&gt;
&lt;P&gt;Additionally, here are pointers to the specific bits you asked about...&lt;/P&gt;
&lt;P&gt;Specifically,&lt;STRONG&gt; IPS and AMP&lt;/STRONG&gt; are covered in the chapter on Intrusion and File Policies.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620/AC-Intrusion-Malware-Detection.html&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Botnet&lt;/STRONG&gt; is not a separate concept with FirePOWER but protection from Botnets is included in Cisco's Security Intelligence feeds which work in conjunction with your Intrusion Policy.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620/AC-Secint-Blacklisting.html#pgfId-1531871&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;URL Filtering&lt;/STRONG&gt; configuration is part of an AccessControl Policy and is covered in the section on Controlling Traffic with Reputation-based Rules here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620/AC-Rules-App-URL-Reputation.html#77351&lt;/P&gt;</description>
    <pubDate>Wed, 29 Mar 2017 08:34:49 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-03-29T08:34:49Z</dc:date>
    <item>
      <title>Firepower url filtering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034175#M431230</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have recently installed a 5525x ASA with the aim of configuring url filtering and AMP, do I need to setup a FireSight Management center or can all configurations be done on ASDM? I have searched aroound and did not find any cofiguration guides on ASDM.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034175#M431230</guid>
      <dc:creator>Tulipomwene Haukongo</dc:creator>
      <dc:date>2020-02-21T14:02:32Z</dc:date>
    </item>
    <item>
      <title>Most customers elect to go</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034176#M431232</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Most customers elect to go with FMC as it is much better at retaining historical data and reporting. If that's not important to you, you can use ASDM instead.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You can use ASDM if you re-image the module up to version 6+. You should use the latest version 6.2 whether or not you use local (ASDM) management. You will also need the ASA at 9.5(2) or later and ASDM at 7.7(1).&lt;/P&gt;
&lt;P&gt;For the procedure, start here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/5500X/5500x_quick_start.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 16:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034176#M431232</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-28T16:37:40Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034177#M431233</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the response, I have done the basic configs and the firepower module is also up and running. What I want is configuration guides on the following via ASDM.&lt;/P&gt;
&lt;P&gt;- IPS&lt;/P&gt;
&lt;P&gt;- Botnet&lt;/P&gt;
&lt;P&gt;- URL filtering&lt;/P&gt;
&lt;P&gt;- AMP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tulee&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 07:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034177#M431233</guid>
      <dc:creator>Tulipomwene Haukongo</dc:creator>
      <dc:date>2017-03-29T07:33:50Z</dc:date>
    </item>
    <item>
      <title>Have you looked at the</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034178#M431234</link>
      <description>&lt;P&gt;Have you looked at the Configuration Guide? It answers all of your questions and more.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620.html&lt;/P&gt;
&lt;P&gt;Additionally, here are pointers to the specific bits you asked about...&lt;/P&gt;
&lt;P&gt;Specifically,&lt;STRONG&gt; IPS and AMP&lt;/STRONG&gt; are covered in the chapter on Intrusion and File Policies.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620/AC-Intrusion-Malware-Detection.html&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Botnet&lt;/STRONG&gt; is not a separate concept with FirePOWER but protection from Botnets is included in Cisco's Security Intelligence feeds which work in conjunction with your Intrusion Policy.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620/AC-Secint-Blacklisting.html#pgfId-1531871&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;URL Filtering&lt;/STRONG&gt; configuration is part of an AccessControl Policy and is covered in the section on Controlling Traffic with Reputation-based Rules here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v620/AC-Rules-App-URL-Reputation.html#77351&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 08:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034178#M431234</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-29T08:34:49Z</dc:date>
    </item>
    <item>
      <title>Thank you Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034179#M431236</link>
      <description>&lt;P&gt;Thank you Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have managed to configure the FMC but I got an error as per attached image when I configured the management address. I tried accessing the FMC via the browser but I could not log in either. Is there any configuration that I may have skipped? I restarted the modules but still no luck.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 17:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034179#M431236</guid>
      <dc:creator>Tulipomwene Haukongo</dc:creator>
      <dc:date>2017-04-04T17:11:33Z</dc:date>
    </item>
    <item>
      <title>Your FMC installation appears</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034180#M431237</link>
      <description>&lt;P&gt;Your FMC installation appears to be corrupted.&lt;/P&gt;
&lt;P&gt;Can you provide more details of how you set it up - i.e., please confirm the ESXi host version, allocated hardware resources and the image file used to build the server.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 02:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering/m-p/3034180#M431237</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-05T02:29:59Z</dc:date>
    </item>
  </channel>
</rss>

