<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Jetsy, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875697#M43848</link>
    <description>&lt;P&gt;Hi Jetsy,&lt;/P&gt;
&lt;P&gt;Thank you again.&lt;/P&gt;
&lt;P&gt;I see know that after editing the search for Playboy that it's identified under 'Business and Economy' Benign Sites with security risks which isn't hitting the policy as you say. I had assumed that the Category Adult and Pornography (1-2) would capture this, crazy that it doesn't.&lt;/P&gt;
&lt;P&gt;Further, images are from images.playboy.com which once identified seperately seems to help, however, if you click about on the site you can pull other content which evades the URL filter.&lt;/P&gt;
&lt;P&gt;I'm at the beginning of my understanding on the best way to configure Firepower and I clearly need to do more reading. I would have hoped it was a little more 'dynamic' and that anything from 'playboy.com' irrespective of it being images.playboy.com etc would hit the rule.&lt;/P&gt;
&lt;P&gt;I'll report the above to TAC / Brightcloud which I understand is the policy when such events occur.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jun 2016 15:53:42 GMT</pubDate>
    <dc:creator>darreng</dc:creator>
    <dc:date>2016-06-21T15:53:42Z</dc:date>
    <item>
      <title>Firepower not blocking URLs</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875693#M43835</link>
      <description>&lt;P&gt;Searching around I see a number of posts on the same subject, but these relate to v5.X software.   &lt;/P&gt;
&lt;P&gt;Relevant bits of config: &lt;/P&gt;
&lt;P&gt; class sfr &amp;nbsp;&lt;/P&gt;
&lt;P&gt;sfr fail-open&lt;BR /&gt;user-statistics accounting&lt;BR /&gt;! &lt;/P&gt;
&lt;P&gt;class-map sfr &amp;nbsp;match access-list SFR-REDIRECT &lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt; access-list SFR-REDIRECT extended permit ip any any  &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I added a URL deny for &lt;A href="https://community.cisco.com/www.playboy.com" target="_blank"&gt;www.playboy.com&lt;/A&gt; to test my URL filtering policy amongst other things. I also added a couple of random proxy / anonymiser sites. I see one of these hitting the Access Control Policy (deny - reset) but traffic still gets thorough. I don't see traffic to &lt;A href="http://www.playboy.com" target="_blank"&gt;www.playboy.com&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Runing: Sourcefire - 6.0.1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875693#M43835</guid>
      <dc:creator>darreng</dc:creator>
      <dc:date>2019-03-10T13:38:01Z</dc:date>
    </item>
    <item>
      <title>Hello Darren,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875694#M43837</link>
      <description>&lt;P&gt;Hello Darren,&lt;/P&gt;
&lt;P&gt;The configuration looks fine. Your understanding on version 5.4.x and 5.4.x.x is right. We have several known bugs in those version which affects the URL cateogarization. Is it a new installation or an already ongoing one ?&lt;/P&gt;
&lt;P&gt;In version 6.0.1 there is no any bugs related to url cateogarization issues. Before moving to the details I hope you have the url license which is must for blocking the url cateogaries. Are you blocking the url by adding it manually or using the Adult &amp;amp; Pornography caetogary ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are the two useful links to verify your configuration setup once again.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/117956-technote-sourcefire-00.html&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/118852-technote-firesight-00.html&lt;/P&gt;
&lt;P&gt;Could you please verify if the url database is uptodated or not ? For this refer the following .&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Log into the web user interface of the FireSIGHT Management Center.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to &lt;STRONG&gt;System &amp;gt; Local &amp;gt; Configuration&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Cloud Services&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Select the &lt;STRONG&gt;Enable URL Filtering&lt;/STRONG&gt; check box in order to enable URL Filtering.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If you already enabled it , could you please check when is the last url filtering update occurred ?&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 03:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875694#M43837</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-06-21T03:54:55Z</dc:date>
    </item>
    <item>
      <title>Thank you Jetsy.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875695#M43839</link>
      <description>&lt;P&gt;Thank you Jetsy.&lt;/P&gt;
&lt;P&gt;Yes, the URL database has been updated (screenshot enclosed).&lt;/P&gt;
&lt;P&gt;I messed about with the URL policy, after allowing DNS the URL policy is the 2nd policly in my ACP. In the URL policy I define Category: Adult &amp;amp; Pornography, URL: Tunnelbear, URL: Hola and URL: playboy.com. I noticed from the Firepower v6.X command ref that &lt;A href="https://community.cisco.com/www.xyz.com" target="_blank"&gt;www.xyz.com&lt;/A&gt;, &lt;A href="http://www.xyz.com" target="_blank"&gt;http://www.xyz.com&lt;/A&gt; and &lt;A href="https://xyz.com" target="_blank"&gt;https://xyz.com&lt;/A&gt; could be simplified to xyz.com only.&lt;/P&gt;
&lt;P&gt;Since the change I have had some success denying Hola and presenting a message stating 'Access Denied" etc. Tunnelbear sometimes works and sometimes does not i.e. I can periodially access the site. Playboy.com is not blocked at all.&lt;/P&gt;
&lt;P&gt;I probably need to understand a little more about how the URL filter works with brightcloud. Perhaps try this from a few additional devices as well to rule out my laptop as a probable cause. Each time of course I clear my browser cache / restart my browser etc.&lt;/P&gt;
&lt;P&gt;I reviewed&amp;nbsp; the 2 x URL's recommeded, much appreciated. I have additionally seen a useful Youtube video that demonstrates how to debug the policy on the sfr module (ASA 5525X). I'll follow this to see if I can see what's happenning at the Firewall end for playboy.com.&lt;/P&gt;
&lt;P&gt;Any other pointers greatly appreciated.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 13:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875695#M43839</guid>
      <dc:creator>darreng</dc:creator>
      <dc:date>2016-06-21T13:59:23Z</dc:date>
    </item>
    <item>
      <title>Hello Darren,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875696#M43845</link>
      <description>&lt;P&gt;Hello Darren,&lt;/P&gt;
&lt;P&gt;The url cateogarization should work fine with the AC policy action . It works this way .Once after the bright cloud database is updated in both FMC and Firepower , the url filtering will work based on the &amp;nbsp;cateogaries that &amp;nbsp;are added in the AC policy &amp;nbsp;If the sites are not getting blocked, that means its not hitting the right policy. I hope the AC policy rule position is proper. Try to position the URL rule first and see. Along with the&amp;nbsp;URL access control issues, there was a known issue which comes top of my mind . It has to do with the security zones and started affecting the version starting from 6.0.0. If you have a security &amp;nbsp;zone added in the interfaces&amp;nbsp;, there is a chance of access control policy never works properly.Its intermittent. I just have a suggestion for you since I have worked with another client for the same. Could you please try upgrading to the following version of 6.0.0.1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;https://software.cisco.com/download/release.html?mdfid=286259687&amp;amp;softwareid=286271056&amp;amp;release=6.0.1.1&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest&lt;/P&gt;
&lt;P&gt;IMPORTANT HOTFIXES for 6.0.0.1: After updating to Version 6.0.0.1, you must install both Hotfix K and Hotfix O or the Firepower Management Center fails to update access control rules referencing intrusion policies containing shared objects rules with the generator ID (GID) of 3 even though the Message center displays the deploy successful.&lt;/P&gt;
&lt;P&gt;Under version 6.0.0.1 , the issue is fixed for the security zone. If you are not planning to go ahead with the upgrade, you need to open a TAC service request as we need to verify the pcap for this specific traffic. We need to perform the debug level troubleshooting for this issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rate if this answer or post helps you.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 14:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875696#M43845</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-06-21T14:42:32Z</dc:date>
    </item>
    <item>
      <title>Hi Jetsy,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875697#M43848</link>
      <description>&lt;P&gt;Hi Jetsy,&lt;/P&gt;
&lt;P&gt;Thank you again.&lt;/P&gt;
&lt;P&gt;I see know that after editing the search for Playboy that it's identified under 'Business and Economy' Benign Sites with security risks which isn't hitting the policy as you say. I had assumed that the Category Adult and Pornography (1-2) would capture this, crazy that it doesn't.&lt;/P&gt;
&lt;P&gt;Further, images are from images.playboy.com which once identified seperately seems to help, however, if you click about on the site you can pull other content which evades the URL filter.&lt;/P&gt;
&lt;P&gt;I'm at the beginning of my understanding on the best way to configure Firepower and I clearly need to do more reading. I would have hoped it was a little more 'dynamic' and that anything from 'playboy.com' irrespective of it being images.playboy.com etc would hit the rule.&lt;/P&gt;
&lt;P&gt;I'll report the above to TAC / Brightcloud which I understand is the policy when such events occur.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 15:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-urls/m-p/2875697#M43848</guid>
      <dc:creator>darreng</dc:creator>
      <dc:date>2016-06-21T15:53:42Z</dc:date>
    </item>
  </channel>
</rss>

