01-08-2015 02:46 PM - last edited on 03-25-2019 06:15 PM by ciscomoderator
Prior to implementing blocking (FirePower ASA currently set in passive mode), I need to provide a custom block page. Ideally this would include a company logo and some text indicating why the page was blocked. The documentation is somewhat light on the how of doing this (Firesight System User Guide Version 5-3-1) Chapter "Managing Access Control Policies".
Questions:
- How to include a logo file (if possible).
- Is there a URL on the Firesight Appliance (or elsewhere) to test the Block Response Page or Interactive Block Response Page?
---------------------------------
SourceFire Virtual Defence Center (64bit) version 5.3.1
ASA 5525X's running Firepower 5.3.1
Solved! Go to Solution.
09-20-2016 01:49 AM
Just want to add this feature in future releases.
Also want the same feature for HTTPS.
10-21-2018 12:01 PM
Hello Team,
It's funny as I'm working with this FP Threat Defence in multiple different scenarios (FTD & ASA+FP) the customer wiches everything easy wich is told to work-at-a-glance shiny and CISCO.
The block-page on categorized URL like facebook or guns is not showing up. In the Cisco documentation stands under limitations just everything else but a solution for now a day web traffic.
Best sentence ever:
Neither the file block reasons were showing up!?!? I know it's not a WSA but seriously?
I'm the idiot working for the Cisco Partner not only selling but building the solution on the customer side.
I can explain why some features are not supported on ASA with FP (File based QoS) but the usual are also not supported????
I'm sorry for my anger but at some point.....
You try your best @Aliki
Cheers
11-29-2018 07:36 PM
> "HTTP response pages do not always appear when the system blocks web traffic."
That's funny.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide