01-02-2016 02:29 PM - edited 03-12-2019 12:05 AM
I'm not sure if this is answered somewhere in the docs that I missed. If it it, I'm sorry.
I have two questions in relation to my ASA5506-x appliance and firepower:
1. I don't currently have the URL license since I'm not interested in the cloud based service. What I would like however is the ability to filter out URLs based on regex or keywords in the URL. Is this possible?
2. On a similar topic, is there a way to see what URLs were accessed?
3. I keep seeing messages in the "Threats" area like "INDICATOR-COMPROMISE Suspicious .pw dns query" but I can't seem to figure out a way to get more information (like the source IP address)
Thanks
01-02-2016 06:31 PM
If you don't want to licence the Firepower module (ps, there is a promo on for three years licences at the moment ...), then could consider doing this purely on the ASA.
You can filter either HTTP (not https) urls, or do DNS filtering, which stops all protocols. I personally prefer the DNS method. Here is a brief example to block logmein.com.
regex domain_logmein.com “\.logmein\.com”
!
class-map type regex match-any DomainBlockList
description Blocked Domains
match regex domain_logmein.com
!
policy-map type inspect dns PM-DNS-inspect
parameters message-length maximum 512
match domain-name regex class DomainBlockList
drop-connection log
!
policy-map global_policy
class inspection_default
inspect dns PM-DNS-inspect
!
service-policy global_policy global
01-03-2016 03:56 AM
I never tested it without a license, but the documentation states that it should work without:
To apply an access control policy that...
|
|
---|---|
01-03-2016 12:51 PM
01-03-2016 07:05 PM
Thanks. I just tried this out and it appears to work. I manually added several URLs in a rule and it successfully blocked them.
Now if I can just figure out the other two questions.
11-11-2019 06:39 AM
Hi,
Regarding your second and third query, you can use connection events on the FMC to check connection attempts against the access rule you have defined. But Remmeber you should have logging enabled against the required access rule. Also for the 3rd question you can use intrusion events.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide