Solved

Cisco Firepower URL filtering not working

Posted on 2016-07-27
2
89 Views
Last Modified: 2016-08-09
I have a pair of ASA5525's in Active/Standby.  For the past year, I've been running IPS on it, and I have a Virtual Defense Center setup in VMWare.  Last week I got a URL license for both  ASA's.   I installed the license, I assigned the license to my devices, I configured URL filtering, I applied my access control policy, and installed the user agent for AD.  All my AD users show up in the defense center and all looks like it should be working, but its not.  If I block a website or category for a specific user it doesn't block it, it just allows the user to go right through.  I opened a case up with TAC 3 days ago, after trouble shooting for a couple hours, he told me to upgrade to the latest version of 6.0, but I'm still having the problem.  My TAC engineer isn't in today, so we are going to resume working on it tomorrow.  In the mean time, I was wondering if anyone using Firepower URL filtering experienced anything similar and if so how they fixed it?  This doesn't seem like a hard task at all, but it doesn't seem to be working.  Let me know.  Thanks.
0
Comment
Question by:denver218
2 Comments
 
LVL 3

Accepted Solution

by:
Steven Roman earned 500 total points
ID: 41741550
Hello,

Try blocking th website for all users and work backwards to the user.
The URL policies should operate the same as old Cisco ASA firewall rules Top - Down
Also check the logs to see why its going through.

I upgraded to 6.0 it takes a long time as Cisco is making alot changes and the upgrade needs to write the all the snort rules.  So prepare some time.
also make sure your sensors and ASA units are up to date.

Hope this helps

Thanks
0
 
LVL 4

Author Closing Comment

by:denver218
ID: 41748688
So after a few weeks it just started working.  Myself or Cisco TAC don't have an explanation.  I'm glad it works, but its scary not knowing what was wrong.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now