Firepower - DNS Inspection for _cisco-uds._tcp.* (Cisco Jabber)
I am trying to filter DNS request from VPN Clients calling for "_cisco-uds._tcp.*" but when I did the obvious from the Connection Events Tab and trying to add the domain to the global blacklist it says that it is an invalid domain.
Priviously on the old ASA there was a an extra policy-map with regex matching on "_cisco-uds._tcp.*" tied to the global policy-map dns inspection that took care of it.
Since I ran into trouble by adding the domaoin to the global DNS blacklist I also tried it with an custom DNS list and DNS policy without luck.
What would be the best solution to drop/filter the DNS requests from the VPN Clients ?
Usually no news means good news in security, but how do you know what is working, what could be better and where you should invest? Introducing the Cisco Security Outcomes Study.
We commissioned an independent survey of 4,800 active security a...
Cisco is happy to announce their Fall release, FTD 6.7/ASA 9.15.1/FXOS 2.9, which consists of 104 features across 24 initiatives, addressing technical debt while staying true to our five core investment areas: Ease of Use and Deployment, Unified Policy an...
Hi Team, I have one exclusion provided by internal team which is Is it right way to exclude ? *\Program Files\XYZ\* , as per Cisco Docs i see its not recommended because it will create performance issue when we use * at starting , So...
Central Log Management using Cisco Security Analytics and Logging, December 2nd at 8am-9:30am PT
Cisco Security Analytics and Logging is Cisco’s Central Log Management solution for Network Operations and Security Outcomes. It is delivered both as a c...