<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering on SSL-RAVPN User FDM 6.2.3 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3888556#M925438</link>
    <description>&lt;P&gt;Sorry for the delay - I had on my list to test this. I just checked it in my lab and found that &lt;A href="http://www.twitter.com" target="_blank" rel="noopener"&gt;www.twitter.com&lt;/A&gt; and &lt;A href="http://www.youtube.com" target="_blank" rel="noopener"&gt;www.youtube.com&lt;/A&gt; were blocked just fine with a URL filtering ACP rule.&lt;/P&gt;
&lt;P&gt;I noticed the original post had "youtube" application in the policy. When my client was blocked it was categorized as simply "https" application and "ssl client".&lt;/P&gt;
&lt;P&gt;Here're the working policy and results for me:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACP Rule blocking URLs.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/40616i86F33522749000F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="ACP Rule blocking URLs.PNG" alt="ACP Rule blocking URLs.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Block results.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/40617i17B0F5D6CA784022/image-size/large?v=v2&amp;amp;px=999" role="button" title="Block results.PNG" alt="Block results.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jul 2019 15:18:06 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-07-11T15:18:06Z</dc:date>
    <item>
      <title>URL Filtering on SSL-RAVPN User FDM 6.2.3</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886309#M925434</link>
      <description>&lt;P&gt;I already done the SSL VPN Remote Access setup, and user already can connect to inside network and access the internet following the company network (I dont use split tunnel for that connectivity).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i enable the NAT Exempt and inside interface all inside zone interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I already set up the access control, to block some website, here my access control configuration&lt;/P&gt;&lt;P&gt;source :&lt;/P&gt;&lt;P&gt;- zone = outside&lt;/P&gt;&lt;P&gt;- address = object network user vpn (50.x/24)&amp;nbsp;&lt;/P&gt;&lt;P&gt;- port = ANY&lt;/P&gt;&lt;P&gt;destination :&amp;nbsp;&lt;/P&gt;&lt;P&gt;- zone = ANY&lt;/P&gt;&lt;P&gt;- address = ANY&lt;/P&gt;&lt;P&gt;- port = ANY&lt;/P&gt;&lt;P&gt;application :&amp;nbsp;&lt;/P&gt;&lt;P&gt;- youtube&lt;/P&gt;&lt;P&gt;url filtering :&amp;nbsp;&lt;/P&gt;&lt;P&gt;- object url : &lt;A href="https://youtube.com" target="_blank" rel="noopener"&gt;https://youtube.com&lt;/A&gt;, &lt;A href="https://twitter.com" target="_blank" rel="noopener"&gt;https://twitter.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;action : block&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But user vpn still can access twitter and youtube.&lt;/P&gt;&lt;P&gt;is there any solution for this case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886309#M925434</guid>
      <dc:creator>Yuslivan</dc:creator>
      <dc:date>2020-02-21T17:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering on SSL-RAVPN User FDM 6.2.3</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886651#M925435</link>
      <description>&lt;P&gt;Make sure the VPN IP address have access rules&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is the example video how you can block the URLS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=VA2S5h3zeVc" target="_blank"&gt;https://www.youtube.com/watch?v=VA2S5h3zeVc&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 22:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886651#M925435</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-07-08T22:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering on SSL-RAVPN User FDM 6.2.3</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886706#M925436</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;I believe both youtube.com and twitter.com use both HTTP Strict Transport Security (HSTS) and Public Key Pinning (PKP). We can confirm this in Chrome via the query box at&amp;nbsp;&lt;A href="chrome://net-internals/#hsts" target="_blank"&gt;chrome://net-internals/#hsts&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This creates a problem for a middleware box like Firepower since it cannot reliably intercept the traffic. For example, certificate SNI inspection doesn't work since yourtube.com uses *.google.com as its certificate.&lt;/P&gt;
&lt;P&gt;The best and much more reliable way to block these clients is to use Cisco Umbrella which works by preventing the sites' DNS resolution and instead redirecting the client to a block page.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 02:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886706#M925436</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-09T02:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering on SSL-RAVPN User FDM 6.2.3</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886834#M925437</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;i can understand what you saying, but if the VPN Terminate in to FTD, (if the user do no have umbrella or other DNS Sec solution) - can we achieve this using ACL filtering with FQDN ( as per my understand FTD support this feature)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do agree the video is bit away from this issue, The video just given example to understand how one can filter.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what would be the soluition or best approach, happy to hear / listen and understand what iam missing here ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 07:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3886834#M925437</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-07-09T07:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering on SSL-RAVPN User FDM 6.2.3</title>
      <link>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3888556#M925438</link>
      <description>&lt;P&gt;Sorry for the delay - I had on my list to test this. I just checked it in my lab and found that &lt;A href="http://www.twitter.com" target="_blank" rel="noopener"&gt;www.twitter.com&lt;/A&gt; and &lt;A href="http://www.youtube.com" target="_blank" rel="noopener"&gt;www.youtube.com&lt;/A&gt; were blocked just fine with a URL filtering ACP rule.&lt;/P&gt;
&lt;P&gt;I noticed the original post had "youtube" application in the policy. When my client was blocked it was categorized as simply "https" application and "ssl client".&lt;/P&gt;
&lt;P&gt;Here're the working policy and results for me:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACP Rule blocking URLs.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/40616i86F33522749000F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="ACP Rule blocking URLs.PNG" alt="ACP Rule blocking URLs.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Block results.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/40617i17B0F5D6CA784022/image-size/large?v=v2&amp;amp;px=999" role="button" title="Block results.PNG" alt="Block results.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 15:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-filtering-on-ssl-ravpn-user-fdm-6-2-3/m-p/3888556#M925438</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-11T15:18:06Z</dc:date>
    </item>
  </channel>
</rss>

