cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2612
Views
2
Helpful
34
Replies

access rules firepower 1010

BornJames
Level 1
Level 1

Hi team,

have a question regarding access rules.

how come if any any eveyrhting works fine.

however when i want to allow lets say connect to facebook, and everything else disable 

so i put source(inside) network(any-ipv4) ports(any) destination(outside_zone) network(FQDN facebook.com) ports (any)

so now I should have connection only to facebook, however no connection at all.

 

34 Replies 34

Yes below note to add new NATing 

BornJames_1-1689379911470.png

can you go into expert mode (tye expert at the > prompt), become root user (sudo su -) and then do an nslookup for facebook.com (nslookup facebook.com) and see what result you get.

--
Please remember to select a correct answer and rate helpful posts

You will most likely find that an FQDN object for such a large scale web service will not work for your use-case. That's not the intended use. 

If you configure an FQDN Object such as facebook.com, the FTD device will do a DNS lookup for facebook.com and put that IP address into the Access Control entry, it will repeat that based on the TTL of the DNS query. 
Meanwhile your device behind the firewall is going to do it's own DNS lookup for facebook.com and connect to the IP address. 

Due to the nature of how DNS operates, there is no way to guarantee that the lookup from the firewall and the lookup from the client will always resolve the same IP address. Similarly the client may also navigate to web.facebook.com or www.facebook.com which may resolve to different IP addresses than just facebook.com.

In reality you'd be better served using the Application Visibility and Control capabilities or a URL rule depending on the requirement. In the latter case, you may also want to check out the TLS Server Identity Discover feature. 

facebook was just an example.

I have tried example.com same result

However you are right about using Application option.

I tried google as an application and it worked.

Might have to use the URL option to allow specific websites

alex.fritzsche
Level 4
Level 4

Like the last comments summarize:

the ACL should be on Application, not on FQDN.
generally you FTD should lookup DNS either internally via an internal DNS Server and then the interface you specify is the specific internal interface where the DNS server resides.
OR the Firewall does DNS-lookups to the internet directly, like 8.8.8.8 or 208.67.222.222, then you specify your Outside-Interface as source

alexfritzsche_0-1689333536344.png

Review Cisco Networking for a $25 gift card