<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco FMC URL Policy Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4020318#M933781</link>
    <description>&lt;P&gt;I'm trying to allow traffic to and from a URL, specifically upgrade.bitdefender.com/av64bit-eps or ip add: 104.18.168.222. I've attached an image of how it's configured on the FMC. Traffic is still not being allowed so I'm trying to confirm what the issue is. I've attached a packet trace as well as some other items&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:52:42 GMT</pubDate>
    <dc:creator>Vic48</dc:creator>
    <dc:date>2020-02-21T17:52:42Z</dc:date>
    <item>
      <title>Cisco FMC URL Policy Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4020318#M933781</link>
      <description>&lt;P&gt;I'm trying to allow traffic to and from a URL, specifically upgrade.bitdefender.com/av64bit-eps or ip add: 104.18.168.222. I've attached an image of how it's configured on the FMC. Traffic is still not being allowed so I'm trying to confirm what the issue is. I've attached a packet trace as well as some other items&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4020318#M933781</guid>
      <dc:creator>Vic48</dc:creator>
      <dc:date>2020-02-21T17:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC URL Policy Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4020319#M933784</link>
      <description>Hi,&lt;BR /&gt;Remove the source portsm change to any and then try again.&lt;BR /&gt;Useful command, try using the "system support firewall-engine-debug" from the CLI of the FTD and then perform a test and observe the output.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 29 Jan 2020 15:57:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4020319#M933784</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-29T15:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC URL Policy Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4021209#M933785</link>
      <description>&lt;P&gt;Thanks again for the reply. I updated the ports to any, but the outcome was still the same. I also tried the suggested command and here's the output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin@firepower:~$ system support firewall-engine-debug&lt;BR /&gt;-sh: system: command not found&lt;BR /&gt;admin@firepower:~$ system ?&lt;BR /&gt;-sh: system: command not found&lt;BR /&gt;admin@firepower:~$&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 18:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4021209#M933785</guid>
      <dc:creator>Vic48</dc:creator>
      <dc:date>2020-01-30T18:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC URL Policy Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4021214#M933787</link>
      <description>That command is run from the FTD and not in expert mode.&lt;BR /&gt;&lt;BR /&gt;What is the configuration of those URLs?</description>
      <pubDate>Thu, 30 Jan 2020 18:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4021214#M933787</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-30T18:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC URL Policy Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4023448#M933796</link>
      <description>&lt;P&gt;I figured out how to run the command, but never got any output from the debug. Does that mean that traffic from PC isn't hitting the FMC?&amp;nbsp; However when I ran a packet trace from the FMC the traffic appears to be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tabs2_section tabs2_section_1 tabs2_section1 tab_section"&gt;&lt;SPAN class="section  sn-stream-section"&gt;&lt;SPAN class="sn-widget-textblock-body sn-widget-textblock-body_formatted"&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 207.225.150.1 using egress ifc OUTSIDE&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip ifc INSIDE any ifc OUTSIDE any rule-id 268434433&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434433: ACCESS POLICY: WILD-VPN - Default&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434433: L7 RULE: Allow All&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 19909447, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Phase: 12&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;BR /&gt;&lt;BR /&gt;Phase: 13&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Packet: TCP, SYN, seq 1044228831&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: starting rule matching, zone 2 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, sgt 65535, username 'No Authentication Required', , icmpType 0, icmpCode 0&lt;BR /&gt;Firewall: pending rule-matching, 'Allow All' , pending URL&lt;BR /&gt;Snort id 2, NAP id 1, IPS id 0, Verdict PASS&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;BR /&gt;&lt;BR /&gt;Phase: 14&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 207.225.150.1 using egress ifc OUTSIDE&lt;BR /&gt;&lt;BR /&gt;Phase: 15&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0000.0c07.ac01 hits 2359096 reference 50&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OUTSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tabs2_section tabs2_section_1 tabs2_section1 tab_section"&gt;The odd thing is that even though the: upgrade.bitdefender.com/av64bit-eps/versions.dat is allowed on the FMC no vmware servers can reach it. The following pic is what would come up if it could be reached. How is it that packet tracer shows it as reachable yet the servers cannot?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tabs2_section tabs2_section_1 tabs2_section1 tab_section"&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (4).png" style="width: 659px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66472iBF1417C09F24BC01/image-size/large?v=v2&amp;amp;px=999" role="button" title="image (4).png" alt="image (4).png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tabs2_section tabs2_section_1 tabs2_section1 tab_section"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2020-02-04_9-56-29.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66473iD1CE3AB26ED97442/image-size/large?v=v2&amp;amp;px=999" role="button" title="2020-02-04_9-56-29.png" alt="2020-02-04_9-56-29.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 15:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-url-policy-issue/m-p/4023448#M933796</guid>
      <dc:creator>Vic48</dc:creator>
      <dc:date>2020-02-04T15:38:45Z</dc:date>
    </item>
  </channel>
</rss>

