<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732797#M994850</link>
    <description>&lt;P&gt;Good timing!&amp;nbsp; I was just forwarded this same link earlier in the week, and just yesterday implemented it.&amp;nbsp; I had planned to post the URL, but you beat me to it! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A caveat for anyone seeking to use this script:&amp;nbsp; Check the pull requests, as the original script imports the URLs with asterisks/wildcards, which don't work in the FMC.&amp;nbsp; The pull update cleans up some of the parsing, and strips the asterisks quite nicely.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The package contains two scripts - one authenticates to the FMC's REST API, the second does the download, parsing and update of the URL and IP objects you create as part of the package.&amp;nbsp; I'm setting up a scheduled task on a management system I have to run this at least once a week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The pull update also adds in a requirements file so you can update your Python installation to the specific package/module versions required for the script to work.&lt;/P&gt;</description>
    <pubDate>Thu, 25 Oct 2018 14:33:13 GMT</pubDate>
    <dc:creator>brian.emil.harris</dc:creator>
    <dc:date>2018-10-25T14:33:13Z</dc:date>
    <item>
      <title>Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3729929#M994840</link>
      <description>&lt;P&gt;I need to create an ACL (or multiple ACLs) on my FTD2130 to allow hosts to the huge list of IPs and URLs required for Office365 (located here: &lt;A href="https://support.content.office.net/en-us/static/O365IPAddresses.xml" target="_blank"&gt;https://support.content.office.net/en-us/static/O365IPAddresses.xml&lt;/A&gt; )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I do this automatically/scriptomatically? I would really prefer not manually entering each IP/range or URL into the ACL(s).&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3729929#M994840</guid>
      <dc:creator>brian.emil.harris</dc:creator>
      <dc:date>2020-02-21T16:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732072#M994843</link>
      <description>&lt;P&gt;I opened a case with TAC on this, and with my VAR. (This very list, actually.) There was no way they could find to script this and have it become a feed into the ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 20:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732072#M994843</guid>
      <dc:creator>MarcHop</dc:creator>
      <dc:date>2018-10-24T20:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732442#M994846</link>
      <description>&lt;P&gt;You can use this:&amp;nbsp;&lt;A href="https://github.com/chrivand/Firepower_O365_Feed_Parser" target="_blank"&gt;https://github.com/chrivand/Firepower_O365_Feed_Parser&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This will fill object groups with the Office 365 URL's and IP's.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 08:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732442#M994846</guid>
      <dc:creator>bart.raat</dc:creator>
      <dc:date>2018-10-25T08:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732797#M994850</link>
      <description>&lt;P&gt;Good timing!&amp;nbsp; I was just forwarded this same link earlier in the week, and just yesterday implemented it.&amp;nbsp; I had planned to post the URL, but you beat me to it! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A caveat for anyone seeking to use this script:&amp;nbsp; Check the pull requests, as the original script imports the URLs with asterisks/wildcards, which don't work in the FMC.&amp;nbsp; The pull update cleans up some of the parsing, and strips the asterisks quite nicely.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The package contains two scripts - one authenticates to the FMC's REST API, the second does the download, parsing and update of the URL and IP objects you create as part of the package.&amp;nbsp; I'm setting up a scheduled task on a management system I have to run this at least once a week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The pull update also adds in a requirements file so you can update your Python installation to the specific package/module versions required for the script to work.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 14:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732797#M994850</guid>
      <dc:creator>brian.emil.harris</dc:creator>
      <dc:date>2018-10-25T14:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732860#M994854</link>
      <description>&lt;P&gt;I am LOVING the fact that the community just proved me wrong! THANK YOU!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 15:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/3732860#M994854</guid>
      <dc:creator>MarcHop</dc:creator>
      <dc:date>2018-10-25T15:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5235437#M1118132</link>
      <description>&lt;P&gt;Just curious,&lt;/P&gt;
&lt;P&gt;Is there a reason you chose to use an external script vs what we currently have now with all our &lt;A title="Office 365 Applications" href="https://appid.cisco.com/home?&amp;amp;appname=&amp;amp;risk=&amp;amp;br=&amp;amp;tags=office%20365&amp;amp;categories=&amp;amp;type=&amp;amp;url=" target="_self"&gt;Office 365&lt;/A&gt; applications or even the "Dynamic Attributes Connector" with the Dynamic Objects that processes and updates all those IP's dynamically?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 13:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5235437#M1118132</guid>
      <dc:creator>ckleopa</dc:creator>
      <dc:date>2024-12-11T13:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5236114#M1118175</link>
      <description>&lt;P&gt;When did this become available?&amp;nbsp; I set up this script something like 6 years ago.&amp;nbsp; The firewall(s) that use it are getting decom'd soon, but I'd be interested in learning about what you're talking about.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 17:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5236114#M1118175</guid>
      <dc:creator>brian.emil.harris</dc:creator>
      <dc:date>2024-12-12T17:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5236124#M1118176</link>
      <description>&lt;P&gt;See our details on the Dynamic Attributes Connector here.&lt;/P&gt;
&lt;P&gt;There is also a table with all the connectors and respective versions for them.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://secure.cisco.com/secure-firewall/docs/cisco-secure-dynamic-attribute-connector" target="_blank"&gt;https://secure.cisco.com/secure-firewall/docs/cisco-secure-dynamic-attribute-connector&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For the Applications based&amp;nbsp;&lt;A href="https://appid.cisco.com/home?&amp;amp;appname=&amp;amp;risk=&amp;amp;br=&amp;amp;tags=office%20365&amp;amp;categories=&amp;amp;type=&amp;amp;url=" target="_blank"&gt;Office 365&lt;/A&gt;&amp;nbsp;controls they have been there for years. It's one of our tags that lists all applications under O365 we support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 17:28:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5236124#M1118176</guid>
      <dc:creator>ckleopa</dc:creator>
      <dc:date>2024-12-12T17:28:28Z</dc:date>
    </item>
    <item>
      <title>Re: Import of Office365 URLs and IPs into FMC/FTD2130 ACL(s)</title>
      <link>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5242105#M1118505</link>
      <description>&lt;P&gt;Probably because Dynamic objects didn't exist when this post was created. Also dynamic objects and applications can't be used in an ACL so neither solves the original problem today.&lt;BR /&gt;&lt;BR /&gt;I've been using &lt;A href="https://github.com/chrivand/Firepower_O365_Feed_Parser" target="_blank" rel="nofollow noopener noreferrer"&gt;https://github.com/chrivand/Firepower_O365_Feed_Parser&lt;/A&gt; about as long as this post for Access Policies and RA VPN split tunneling. Dynamic Objects are great for Access Policies. I found this post again today because I was looking to see if there is a solution for the split tunneling ACL. Looks like the answer is still no.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2024 21:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/import-of-office365-urls-and-ips-into-fmc-ftd2130-acl-s/m-p/5242105#M1118505</guid>
      <dc:creator>c-kn</dc:creator>
      <dc:date>2024-12-30T21:07:45Z</dc:date>
    </item>
  </channel>
</rss>

