09-06-2023 01:10 AM
URL filtering is not working properly with Cisco ASA5516-FPWR-K9. Not receiving the reset packet for blocked websites or for some blocked website examples gambling sites. Main page allowed, but users are unable to access any contents. Can anyone please help and suggest how to block the website instantly without allowing any packets. So that even main page will not land.
TAC confirmed how it FPWR works and shared the below doc and statements.
As mentioned, this is the expected behavior: https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/best_practices_for_access_control.html#Cisco_Reference.dita_087ea950-fc60-4132-8629-07d0ca682ec3
“Certain features, including URL filtering, application detection, rate limiting, and Intelligent Application Bypass, must allow some packets to pass in order for the system to identify the traffic.”
09-06-2023 09:21 AM
You could blacklist individual URLs altogether, but that would be a very manual process.
09-06-2023 05:46 PM
yes, we have to block the risky url categories. So individual URL blocking doesn’t full fill the requirement . Is there way to achieve this.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide