<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can not browse after applied sfr service policy in outside and inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752371#M984668</link>
    <description>&lt;P&gt;No, Its permiting all traffic to go via SFR for insoection. You can create block rules in SFR as well . All your other deny rules will work as per the ASA accesslist.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
    <pubDate>Sun, 25 Nov 2018 14:33:43 GMT</pubDate>
    <dc:creator>Abheesh Kumar</dc:creator>
    <dc:date>2018-11-25T14:33:43Z</dc:date>
    <item>
      <title>Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752296#M984602</link>
      <description>&lt;P&gt;ASA only can browse&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but After applied sfr , can not browse&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if it is state firewall , do I need to allow&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from outside port 443 to inside private network or NAT address?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752296#M984602</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2019-03-12T14:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752305#M984624</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Please create the redirection policy like below and try.&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-list sfr_redirect extended permit ip any any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;class-map sfr&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;match access-list sfr_redirect&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;policy-map global_policy&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;class sfr&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;sfr fail-open&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;service-policy global_policy global&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;Abheesh&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Nov 2018 06:37:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752305#M984624</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-11-25T06:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752357#M984641</link>
      <description>&lt;P&gt;This is permit all , will it have security risk ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;because sfr is applying outside too&lt;/P&gt;</description>
      <pubDate>Sun, 25 Nov 2018 12:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752357#M984641</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2018-11-25T12:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752371#M984668</link>
      <description>&lt;P&gt;No, Its permiting all traffic to go via SFR for insoection. You can create block rules in SFR as well . All your other deny rules will work as per the ASA accesslist.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Sun, 25 Nov 2018 14:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752371#M984668</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-11-25T14:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752607#M984676</link>
      <description>&lt;P&gt;You have some very restrictive Deny statements in your Access Control Policy. It's very likely they are blocking the traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 09:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752607#M984676</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-26T09:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752715#M984699</link>
      <description>&lt;P&gt;Can not apply access list in real practice&lt;/P&gt;
&lt;P&gt;attached screen capture&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what should do next?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 12:59:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752715#M984699</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2018-11-26T12:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752717#M984703</link>
      <description>But first two rules allowed traffic first&lt;BR /&gt;The default rule and deny will not apply</description>
      <pubDate>Mon, 26 Nov 2018 13:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3752717#M984703</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2018-11-26T13:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769409#M984705</link>
      <description>&lt;P&gt;I succeed to use firepower to browse web&lt;BR /&gt;After remove ASA accesslist in console config&lt;BR /&gt;Then only apply firepower’s own access list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Country allow United States, United Kingdom , France, Germany, Canada , Japan , Singapore , Taiwan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it seems fulfil requirement of content distribution network&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But I can not access amazon web and amazon console app in iPhone&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Dec 2018 09:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769409#M984705</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2018-12-27T09:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769414#M984708</link>
      <description>Did you configure any block application specific rule in ACP.&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Dec 2018 09:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769414#M984708</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-12-27T09:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769430#M984711</link>
      <description>&lt;P&gt;First allow rule is DNS&lt;/P&gt;&lt;P&gt;second allow rules is http and https&lt;/P&gt;&lt;P&gt;default IPS policy i use security over connectivity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;application allow in second rule are amazon and google&amp;nbsp;&lt;/P&gt;&lt;P&gt;then the rest block&lt;/P&gt;&lt;P&gt;i did not block application deliberately.&lt;/P&gt;&lt;P&gt;i think they are allowed in second rules&lt;/P&gt;</description>
      <pubDate>Thu, 27 Dec 2018 10:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769430#M984711</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2018-12-27T10:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769431#M984714</link>
      <description>can you share a packet tracer output for amazon IP</description>
      <pubDate>Thu, 27 Dec 2018 10:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769431#M984714</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-12-27T10:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769456#M984718</link>
      <description>&lt;P&gt;Amazon use content distribution network&lt;/P&gt;&lt;P&gt;i shutdowned firewall&amp;nbsp;&lt;/P&gt;&lt;P&gt;may be I try it tomorrow&lt;/P&gt;&lt;P&gt;not easy to tune and fit the optimal setting&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there any statistics commands that are for firepower, in ASA console?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when I try to classify traffic into countries&amp;nbsp;&lt;/P&gt;&lt;P&gt;i feel clumsy to create many same rule for just one country.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;where can set maximum connection in Firepower ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to narrow the connection to my current using two applications, chrome and Mstsc Remote Desktop only&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;where can Filter Java in Firepower and will it influence HSBC transaction in iPhone and notebook ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;actually I still have not tested stock trading or transfer money with Firepower , I afraid of failure in part of transactions because application I only choose amazon and google , what should I choose application for banking application?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Dec 2018 12:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3769456#M984718</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2018-12-27T12:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Can not browse after applied sfr service policy in outside and inside</title>
      <link>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3772807#M984721</link>
      <description>&lt;P&gt;Today I tested again&lt;/P&gt;&lt;P&gt;i change to balanced security and connectivity&lt;/P&gt;&lt;P&gt;then I remove all amazon and google applications in access policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I succeed to use amazon console app in iPhone&lt;/P&gt;&lt;P&gt;but can not see the configuration page after login amazon cloud web in notebook&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Succed to remote control window of amazon cloud but have several times of connection cut before succeed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 11:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-not-browse-after-applied-sfr-service-policy-in-outside-and/m-p/3772807#M984721</guid>
      <dc:creator>Maivoko</dc:creator>
      <dc:date>2019-01-04T11:03:01Z</dc:date>
    </item>
  </channel>
</rss>

