<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA with FirePower Services URL Filtering blocks nothing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3361435#M963373</link>
    <description>&lt;P&gt;I'm working on an ASA 5516-X with FirePower Services.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately we don't have a budget for FMC, so the management of the FirePower moduels is done via ASDM. But anyhow, we managed to get it working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the task is to configure a URL filtering policy on the FirePower Module. We have been successful in importing all 4 licenses and updating the Geolocation and IPS databases. So far so good.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But still, I'm not able to get the URL filtering going... It seems like the nothing is matched and the traffc just passes through...&lt;/P&gt;
&lt;P&gt;Here are the specs:&lt;/P&gt;
&lt;P&gt;ASA software version&amp;nbsp;&amp;nbsp;9.8(2)20&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The FirePower module looks fine:&lt;/P&gt;
&lt;P&gt;ciscoasa/act/pri# show module sfr details&lt;BR /&gt;Getting details from the Service Module, please wait...&lt;/P&gt;
&lt;P&gt;Card Type: FirePOWER Services Software Module&lt;BR /&gt;Model: ASA5516&lt;BR /&gt;Hardware version: N/A&lt;BR /&gt;Serial Number: JAD21240FR4&lt;BR /&gt;Firmware version: N/A&lt;BR /&gt;Software version: 6.2.0-362&lt;BR /&gt;MAC Address Range: 7070.8b67.d51b to 7070.8b67.d51b&lt;BR /&gt;App. name: ASA FirePOWER&lt;BR /&gt;App. Status: Up&lt;BR /&gt;App. Status Desc: Normal Operation&lt;BR /&gt;App. version: 6.2.0-362&lt;BR /&gt;Data Plane Status: Up&lt;BR /&gt;Console session: Ready&lt;BR /&gt;Status: Up&lt;BR /&gt;DC addr: No DC Configured&lt;BR /&gt;Mgmt IP addr: 10.11.12.202&lt;BR /&gt;Mgmt Network mask: 255.255.255.0&lt;BR /&gt;Mgmt Gateway: 10.11.12.254&lt;BR /&gt;Mgmt web ports: 443&lt;BR /&gt;Mgmt TLS enabled: true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, here's what we have configured.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. First configure a URL filtering policy on the FirePower module. Check in the attached file.&lt;/P&gt;
&lt;P&gt;2. Than an ACL was created to match traffic from one particular source IP we're testing the policies with. This is attached to a class map and added to the default global_policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list FP_REDIRECT extended permit ip host 10.15.16.11 any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map sfr&lt;BR /&gt; match access-list FP_REDIRECT&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect icmp&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. I also see hits when I check the sfr policy&lt;/P&gt;
&lt;P&gt;ciscoasa/act/pri# show service-policy sfr&lt;/P&gt;
&lt;P&gt;Global policy:&lt;BR /&gt; Service-policy: global_policy&lt;BR /&gt; Class-map: sfr&lt;BR /&gt; SFR: card status Up, mode fail-open&lt;BR /&gt; packet input 486, packet output 486, drop 0, reset-drop 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, it should mean that whenever we generate traffic from the source we're matching, it should get redirected to the FirePower module, where there's a URL filtering policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it does not work!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It does not work even if I put a static URL object...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I cannot understand why this happens?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I further troubleshoot and make sure:&lt;/P&gt;
&lt;P&gt;1. Traffic is properlly redirected to the FirePower module&lt;/P&gt;
&lt;P&gt;2. The URL filtering policy is properly matched&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any hint or idea is appreciated!&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:36:19 GMT</pubDate>
    <dc:creator>Boyan Sotirov</dc:creator>
    <dc:date>2020-02-21T15:36:19Z</dc:date>
    <item>
      <title>ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3361435#M963373</link>
      <description>&lt;P&gt;I'm working on an ASA 5516-X with FirePower Services.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately we don't have a budget for FMC, so the management of the FirePower moduels is done via ASDM. But anyhow, we managed to get it working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the task is to configure a URL filtering policy on the FirePower Module. We have been successful in importing all 4 licenses and updating the Geolocation and IPS databases. So far so good.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But still, I'm not able to get the URL filtering going... It seems like the nothing is matched and the traffc just passes through...&lt;/P&gt;
&lt;P&gt;Here are the specs:&lt;/P&gt;
&lt;P&gt;ASA software version&amp;nbsp;&amp;nbsp;9.8(2)20&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The FirePower module looks fine:&lt;/P&gt;
&lt;P&gt;ciscoasa/act/pri# show module sfr details&lt;BR /&gt;Getting details from the Service Module, please wait...&lt;/P&gt;
&lt;P&gt;Card Type: FirePOWER Services Software Module&lt;BR /&gt;Model: ASA5516&lt;BR /&gt;Hardware version: N/A&lt;BR /&gt;Serial Number: JAD21240FR4&lt;BR /&gt;Firmware version: N/A&lt;BR /&gt;Software version: 6.2.0-362&lt;BR /&gt;MAC Address Range: 7070.8b67.d51b to 7070.8b67.d51b&lt;BR /&gt;App. name: ASA FirePOWER&lt;BR /&gt;App. Status: Up&lt;BR /&gt;App. Status Desc: Normal Operation&lt;BR /&gt;App. version: 6.2.0-362&lt;BR /&gt;Data Plane Status: Up&lt;BR /&gt;Console session: Ready&lt;BR /&gt;Status: Up&lt;BR /&gt;DC addr: No DC Configured&lt;BR /&gt;Mgmt IP addr: 10.11.12.202&lt;BR /&gt;Mgmt Network mask: 255.255.255.0&lt;BR /&gt;Mgmt Gateway: 10.11.12.254&lt;BR /&gt;Mgmt web ports: 443&lt;BR /&gt;Mgmt TLS enabled: true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, here's what we have configured.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. First configure a URL filtering policy on the FirePower module. Check in the attached file.&lt;/P&gt;
&lt;P&gt;2. Than an ACL was created to match traffic from one particular source IP we're testing the policies with. This is attached to a class map and added to the default global_policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list FP_REDIRECT extended permit ip host 10.15.16.11 any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map sfr&lt;BR /&gt; match access-list FP_REDIRECT&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect icmp&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. I also see hits when I check the sfr policy&lt;/P&gt;
&lt;P&gt;ciscoasa/act/pri# show service-policy sfr&lt;/P&gt;
&lt;P&gt;Global policy:&lt;BR /&gt; Service-policy: global_policy&lt;BR /&gt; Class-map: sfr&lt;BR /&gt; SFR: card status Up, mode fail-open&lt;BR /&gt; packet input 486, packet output 486, drop 0, reset-drop 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, it should mean that whenever we generate traffic from the source we're matching, it should get redirected to the FirePower module, where there's a URL filtering policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it does not work!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It does not work even if I put a static URL object...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I cannot understand why this happens?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I further troubleshoot and make sure:&lt;/P&gt;
&lt;P&gt;1. Traffic is properlly redirected to the FirePower module&lt;/P&gt;
&lt;P&gt;2. The URL filtering policy is properly matched&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any hint or idea is appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3361435#M963373</guid>
      <dc:creator>Boyan Sotirov</dc:creator>
      <dc:date>2020-02-21T15:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3361503#M963374</link>
      <description>After ponding around and reading additional materials I think I know where my problem is. &lt;BR /&gt;The URL filtering policy is just no applied. On the picture you could see the status of the policy as "Access Control Policy out of date on device". that's cool, but how to actually apply it? &lt;BR /&gt;I read a book on ASA with Firepower services right now, and there the autor shows a screenshot from ASDM with the policy where there's a button "Apply ASA FirePower Changes". The question is, why I don't have such a button on my device?</description>
      <pubDate>Thu, 05 Apr 2018 21:32:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3361503#M963374</guid>
      <dc:creator>Boyan Sotirov</dc:creator>
      <dc:date>2018-04-05T21:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3361506#M963375</link>
      <description>&lt;P&gt;Attaching the full screenshot&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 21:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3361506#M963375</guid>
      <dc:creator>Boyan Sotirov</dc:creator>
      <dc:date>2018-04-05T21:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366475#M963376</link>
      <description>I found a solution to this problem. &lt;BR /&gt;Indeed the FirePower policy needs to be saved first, and than applied to the device. So, as explained earlier, saving is straight forward. Applying the config to the FirePower module though is not. In older versions there used to be a button "Apply..." right next to the save button. In the newer versions we have to use:&lt;BR /&gt;1. File-&amp;gt;Deploy&lt;BR /&gt;2. Or use the "Deploy" button from the ASDM....in the upper left corner.</description>
      <pubDate>Mon, 16 Apr 2018 05:27:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366475#M963376</guid>
      <dc:creator>Boyan Sotirov</dc:creator>
      <dc:date>2018-04-16T05:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366642#M963377</link>
      <description>I do have a question/curiosity: I have a cluster with firepower module and license. &lt;BR /&gt;Why don't I have the option of configuring the Firepower from ASDM? I have no Configuration\Firepower menu; I can only see the URL to a dedicated server in the Home button/section.&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Mon, 16 Apr 2018 11:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366642#M963377</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-04-16T11:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366647#M963378</link>
      <description>&lt;P&gt;Hello Florin,&lt;/P&gt;
&lt;P&gt;By cluster I guess you mean Active/Standby configuration. But even in a cluster configuration it will still hold true.&lt;/P&gt;
&lt;P&gt;The reason you don't see the menu is most likely because you haven't configured an IP address of your FirePower module.&lt;/P&gt;
&lt;P&gt;You have to do it manually for each an every member of the cluster or Active/Standby setup.&lt;/P&gt;
&lt;P&gt;And depending on the ASA model you have different options on how to connect the FirePower module to your physical network. In high end models you have a dedicated management port. While the lower end models use the dedicated management port of the chassis - it's only one, so you must configure another port on the ASA and use it as a dedicated management port.&lt;/P&gt;
&lt;P&gt;Once you do that and cable the dedicated port properly, your ASDM will establish SSL connection with the ASA first, and from the backplane it will learn the IP address of the FirePower module and it will establish another parallel SSL session to the FirePower module. This is how you will be able to manage both the ASA software and the FirePower module from ASDM. It's convoluted I know! But that's how this product works. Let me know if this helps, I did this recently so details are still fresh in my memory &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Keep in mind that the FirePower module has different management from the ASA, and it's reachable via the dedicated physical port and the IP address configured there. From the ASA software you could communicate to the FirePower module over the data and control plane - internal to the chassis. But over the control plane you could configure only basic things. It's expected that the FirePower module is configured either via ASDM (which by the way is neither preferred, nor the recommended method... well, maybe in very small deployments) or via the FMC software.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 11:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366647#M963378</guid>
      <dc:creator>Boyan Sotirov</dc:creator>
      <dc:date>2018-04-16T11:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366653#M963379</link>
      <description>Ok - that was lengthy. I inherited this config and there's a server Firesight or Firepower Management server that I personally find tough to work with. Not to mention I love ASDM "preview commands" option. &lt;BR /&gt;&lt;BR /&gt;Does Firepower module has CLI? If I SSH to any ASA can I see firepower mgmt. config?&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Mon, 16 Apr 2018 11:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366653#M963379</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-04-16T11:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366655#M963380</link>
      <description>Yes, the FirePower module has a CLI, you can access it via SSH once it has a reachable IP address. &lt;BR /&gt;The initial configuration of the FirePower module is done via ASA CLI. You need "session sfr console" to login with the default username and password (admin, Admin123), accept the EULA and configure the IP address. You could also reach "expert mode" or the CLI of the Linux distro on which the FirePower runs. You also have some show commands within the CLI. Maybe some hidden commands too... of which I'm not aware of.</description>
      <pubDate>Mon, 16 Apr 2018 11:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366655#M963380</guid>
      <dc:creator>Boyan Sotirov</dc:creator>
      <dc:date>2018-04-16T11:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with FirePower Services URL Filtering blocks nothing</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366660#M963381</link>
      <description>Thanks mate! I really need to read more about this.</description>
      <pubDate>Mon, 16 Apr 2018 11:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-firepower-services-url-filtering-blocks-nothing/m-p/3366660#M963381</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-04-16T11:32:48Z</dc:date>
    </item>
  </channel>
</rss>

