<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering FTD/FMC2100 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939736#M925276</link>
    <description>&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my ACLs on FMC like this as an example.&lt;/P&gt;&lt;P&gt;I have many categories like this sourced from different zones.&lt;/P&gt;&lt;P&gt;Can I create new category with new name like URL/Sites Access and add rules under this.&lt;/P&gt;&lt;P&gt;How traffic through rules will process if my new category at the end.&lt;/P&gt;&lt;P&gt;Client IP also already exists in existing rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client IP : 1.1.1.1/32&lt;/P&gt;&lt;P&gt;Dest : &lt;A href="http://www.linkedin.com" target="_blank"&gt;www.linkedin.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Action : Allow&lt;/P&gt;&lt;P&gt;Dest : &lt;A href="http://www.facebook.com" target="_blank"&gt;www.facebook.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Action : Block&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt; Inside Rules (Existing)&lt;/P&gt;&lt;P&gt;1 - Source 1.1.1.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;2 - Source 2.2.2.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;3 - Source 1.1.1.1/32 &amp;nbsp; DST : 9.9.9.9/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;4 - Source 1.1.1.0/28 &amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;5 - Source 1.1.1.1/32 &amp;nbsp; DST : 10.10.10.10/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt; Corp&amp;nbsp; Rules (Existing)&lt;/P&gt;&lt;P&gt;1 - Source 11.11.11.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;2 - Source 22.22.22.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;3 - Source 11.11.11.11/32 &amp;nbsp; DST : 9.9.9.9/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;4 - Source 11.11.11.0/28 &amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;5 - Source 11.11.11.11/32 &amp;nbsp; DST : 10.10.10.10/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 13 Oct 2019 05:13:27 GMT</pubDate>
    <dc:creator>Fantas</dc:creator>
    <dc:date>2019-10-13T05:13:27Z</dc:date>
    <item>
      <title>URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939730#M925274</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we want to apply url filtering on our new FTD2100 firewalls through FMC. I have below questions and need clarity please before I proceed and deploy changes. My change is coming soon so wana prepare.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 - URL filtering enabling steps on through FMC&lt;/P&gt;&lt;P&gt;2 - How FTD will detect If it receives http/https traffic for website access.&lt;/P&gt;&lt;P&gt;3 - Current clients can access internet through bluecoat proxy but now I wana to remove proxy setting from browser and wana allow access to specific urls through FTD for all those internal clients.&lt;/P&gt;&lt;P&gt;4 - Do the FTD need to have SSL certificate for https sites to access outside urls&lt;/P&gt;&lt;P&gt;5 - How proxy will resolve request for linkedin.com from internal client&lt;/P&gt;&lt;P&gt;6 - How this will work when client open browser and type &lt;A href="http://www.linkedin.com" target="_blank"&gt;www.linkedin.com&lt;/A&gt;, how this request will go to FTD as its through browser and how FTD will resolve &lt;A href="http://www.linkedin.com" target="_blank"&gt;www.linkedin.com&lt;/A&gt; so that connection can happen.&lt;/P&gt;&lt;P&gt;7 - For URL filtering do we needs to add FTD inside IP in proxy setting port 8080 on client browser setting&lt;/P&gt;&lt;P&gt;8 - Since I have already 200 plus rules on FMC for FTD2100, Do I need to create new Category for URL filtering so If any client need access to sites ten I can just add them in that category , just a clean work.&lt;/P&gt;&lt;P&gt;9 - Will be any issue for existing rules because URL category rules will have block action for some sites , so I dont wana create any issues for other running policies.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:35:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939730#M925274</guid>
      <dc:creator>Fantas</dc:creator>
      <dc:date>2020-02-21T17:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939733#M925275</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;You don't need to configure anything in your clients browsers.&lt;BR /&gt;You don't need to do ssl decryption for https url filtering, it's based on ssl handshake with the server certificate exchange.&lt;BR /&gt;&lt;BR /&gt;If you want to deny some sites, you need to put the rule above other roles to avoid any overlap or override. It's difficult to tell you which position without knowing your configuration.&lt;BR /&gt;&lt;BR /&gt;To answer all your questions, take a look on the Cisco documentation which is clear and straight forward:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/url_filtering.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/url_filtering.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Ssl decryption will be needed if you want to filter results on search engines.&lt;BR /&gt;Here a documentation explaining how:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/access_control_using_content_restriction.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/access_control_using_content_restriction.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this is clear. Let me know if you need any clarifications after you looked at the docs.</description>
      <pubDate>Sun, 13 Oct 2019 04:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939733#M925275</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-10-13T04:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939736#M925276</link>
      <description>&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my ACLs on FMC like this as an example.&lt;/P&gt;&lt;P&gt;I have many categories like this sourced from different zones.&lt;/P&gt;&lt;P&gt;Can I create new category with new name like URL/Sites Access and add rules under this.&lt;/P&gt;&lt;P&gt;How traffic through rules will process if my new category at the end.&lt;/P&gt;&lt;P&gt;Client IP also already exists in existing rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client IP : 1.1.1.1/32&lt;/P&gt;&lt;P&gt;Dest : &lt;A href="http://www.linkedin.com" target="_blank"&gt;www.linkedin.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Action : Allow&lt;/P&gt;&lt;P&gt;Dest : &lt;A href="http://www.facebook.com" target="_blank"&gt;www.facebook.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Action : Block&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt; Inside Rules (Existing)&lt;/P&gt;&lt;P&gt;1 - Source 1.1.1.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;2 - Source 2.2.2.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;3 - Source 1.1.1.1/32 &amp;nbsp; DST : 9.9.9.9/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;4 - Source 1.1.1.0/28 &amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;5 - Source 1.1.1.1/32 &amp;nbsp; DST : 10.10.10.10/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt; Corp&amp;nbsp; Rules (Existing)&lt;/P&gt;&lt;P&gt;1 - Source 11.11.11.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;2 - Source 22.22.22.0/25&amp;nbsp;&amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;3 - Source 11.11.11.11/32 &amp;nbsp; DST : 9.9.9.9/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;4 - Source 11.11.11.0/28 &amp;nbsp; DST : Any&amp;nbsp;&amp;nbsp;&amp;nbsp; port : 443&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;5 - Source 11.11.11.11/32 &amp;nbsp; DST : 10.10.10.10/32 &amp;nbsp;&amp;nbsp; port : 443,22,80,53&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2019 05:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939736#M925276</guid>
      <dc:creator>Fantas</dc:creator>
      <dc:date>2019-10-13T05:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939785#M925277</link>
      <description>&lt;P&gt;Access Control Policy (ACP) rules are processed from top to bottom as they appear in FMC.&lt;/P&gt;
&lt;P&gt;The first match ends the rule processing (unless the action is Monitor in which case the subsequent rule(s) are processed).&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2019 12:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939785#M925277</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-10-13T12:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939934#M925278</link>
      <description>I would avoid mixing rules with url and ports. I would put url filtering rules before and then ports rules.&lt;BR /&gt;Add Marvin mentioned, rules are red and selected for traffic from top to down.</description>
      <pubDate>Mon, 14 Oct 2019 04:30:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3939934#M925278</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-10-14T04:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3940038#M925279</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I create new category for URLs traffic only and keep this category above Inside rules category.&lt;/P&gt;&lt;P&gt;New URLs category will be sourced from same inside zone to outside and other zone same as existing Inside existing category sourced from inside to outside and other internal zones.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 08:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3940038#M925279</guid>
      <dc:creator>Fantas</dc:creator>
      <dc:date>2019-10-14T08:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3940491#M925280</link>
      <description>&lt;P&gt;So my scenarios is like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client-----&amp;gt;FTD--------&amp;gt;ASA with FirePower---------&amp;gt;Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;based on above , Can I do URL filtering on ASA with firepower instead on FTD because client might to talk some other destinations so can be routed or allowed on FTD firewall but for URLs access like facebook.com will be routed to ASA with Firepower firewall So I can do URL filtering and NAT for Internet for internal clients on ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since we have SFR module on ASA so we should be able to URL filtering through FMC.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 22:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3940491#M925280</guid>
      <dc:creator>Fantas</dc:creator>
      <dc:date>2019-10-14T22:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3940528#M925281</link>
      <description>You can do url filtering on your asa instead of ftd but the rules given previously still remain. (From top down and avoid mixing url filters with ports/applications)</description>
      <pubDate>Tue, 15 Oct 2019 01:15:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3940528#M925281</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-10-15T01:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3941275#M925282</link>
      <description>&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have decided to do NAT on ASA and URL filtering on FTD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets see how it goes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 00:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3941275#M925282</guid>
      <dc:creator>Fantas</dc:creator>
      <dc:date>2019-10-16T00:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FTD/FMC2100</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3942657#M925283</link>
      <description>This is a good choice!</description>
      <pubDate>Thu, 17 Oct 2019 15:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-ftd-fmc2100/m-p/3942657#M925283</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-10-17T15:48:13Z</dc:date>
    </item>
  </channel>
</rss>

