Skip to main content
Cisco Meraki Documentation

Content Filtering Troubleshooting

Cisco Meraki MX security appliances can be configured to block web traffic using content filtering. Content filtering uses URL patterns, predefined categorizations, and other specifications for determining which types of traffic are let through the firewall. It can be set, for example, to block all websites that are known to be categorized as "games" or "social networking." The MX will return a page that displays a message letting the user know their page is being blocked by their administrator so they understand why they cannot reach a blocked site.

This article covers troubleshooting steps for resolving issues that are commonly experienced when using content filtering. For instructions on configuring content filtering based on Active Directory LDAP groups, please refer to the Configuring Active Directory with MX Security Appliances article.

Note: Starting from MX17 and newer, content filtering will use Cisco Talos Intelligence. Brightcloud URL Categories are automatically updated to a corresponding Talos Intelligence URL Category after upgrading. This will be viewable in an informational one-time popup modal. Accepting the modal is not required for the new mapping to take effect

Learn more with these free online training courses on the Meraki Learning Hub:

Sign in with your Cisco SSO or create a free account to start training.

Configuring Content Filtering 

Content filtering can be used to filter content passing through your security appliance based on content known to exist on specified web pages. Content filtering is best used for setting catch-all blocks for certain categories of traffic or for blocking certain URL patterns.

Content filtering settings can be found in the dashboard by navigating to Security & SD-WAN > Configure > Content filtering.

Refer to the article on content filtering for setup instructions, including details about what each section of the page does and how to block all web traffic other than  allow listed pages.

 The content filtering feature is available only with an Advanced Security license.

Troubleshooting Content Filtering

The following sections outline troubleshooting steps for a variety of common issues experienced when using content filtering.

Category Filtering

Category filtering provides a premade, regularly updated list of categories that can be selected to block traffic to sites with content matching that category.

How are categories and/or reputation determined?

Category filtering provides a list of categories that can be selected to block all web traffic destined to a URL/IP that matches with these categories on a hosted list. The list of website categories is hosted by BrightCloud. BrightCloud determines the categorization and reputation of all URLs/IPs that pass through Meraki category filtering. Meraki does not determine the reputation of domains directly; requests for reclassification can be made through BrightCloud's reclassification request tool on their website. 

 

The Meraki dashboard has a URL category lookup tool on the content filtering page, below the "Blocked website categories" box, which can be used to check the category of a website before you decide to block that category. It is highly recommended to check for important URLs before enabling content filtering to ensure something is not accidentally blocked when it should be allowed.

 

NOTE: Due to some limitations, any URLs looked up through the dashboard tool that contain an embedded URL (e.g. www.example.com?url=www.dashboard.meraki.com) will return results for the value that follows the "url=" parameter, not the main URL itself).

This may result in some variations between what the tool reports for such URLs and what the MX will actually classify them as.

 

Upstream Firewall Rules for Content Filtering Categories

In instances where another firewall is positioned upstream from the MX, the following FQDN destinations need to be allowed in order for categorization information traffic to pass successfully to the MX, so it can use the proper category classifications. Keep in mind that the IP addresses these domains resolve to will be different regionally, so ensure you are allowing the correct, current IPs if using IP-based rules instead of FQDN rules on your upstream firewall.
Domain names to add to the allow list on upstream firewall

  • meraki.brightcloud.com (resolves a CNAME to service.brightcloud.com)
  • service2.brightcloud.com

How can I unblock a site that is being blocked?

If a site is being blocked because it matches a certain category you've blocked, but you do not want to disable that category, you can add to the Allow list the URL pattern. This is the easiest way to allow a particular site that may be blocked by a content category. Allow URL list can be found on the content filtering page. Refer to the Content Filtering article for examples of pattern matching and its hierarchy.

If you have a website that you believe is being miscategorized by your security appliance's firewall, you can submit a URL categorization change request here. If you have a website that is marked as malicious when it should not be, you can submit a URL reputation change request and/or an IP reputation change request.

Additionally, you can remove the content filtering category or leave it off the list until Brightcloud is able to process a reputation change.

Why is a site being blocked when it should not be?

Sometimes, sites will be blocked even though their URL category is not blocked. Usually this happens when the IP has a bad reputation but the URL reputation is good. This happens commonly with very large domains like Google that own many IP addresses and sometimes purchase new IP addresses that have not yet been recategorized to take their new owner into consideration. In situations like this, these IPs sometimes have a category of "Phishing and Other Frauds," or various other categories that may actually be blocked:

Screenshot from dashboard that shows an event log entry for a content filtering block for google.com under the category 'Phishing and other frauds'.

This issue can be permanently resolved by upgrading your MX firmware to the latest stable firmware version. In the latest firmware revision, URL reputation is prioritized over IP reputation, as opposed to IP reputation being the deciding factor on previous firmware versions. Firmware can be upgraded by navigating to Organization > Monitor > Firmware upgrades.

If you are on the latest stable firmware version and are still experiencing issues with sites being blocked that should not be, there are a few other factors that could contribute:

  • Group policies: Often, a client will have a group policy applied to it that will override the default category allow list. Group policy rules always take priority over default network rules.
  • Blocked URL patterns: Blocked URL patterns could match with the site you are attempting to reach. Make sure the site is not blocked here.
  • AMP: Sometimes, downloads on a site will be blocked. This can be caused by AMP (threat protection). Make sure the site is on your Threat Protection page Allow list URLs .
  • Upstream Firewall: Try finding the client you are using by navigating to Network-wide > Monitor > Clients, opening their client page, and setting their "Policy" (lower left corner) to add to allow list. If this is done and the client is still blocked, then the MX's firewall is probably not contributing to the block, and an upstream router/firewall could be contributing to this issue. This could also be verified by connecting directly to the upstream modem/router and seeing if the issue persists.

Why is a site NOT being blocked when it should be?

There are several factors that can contribute to a website not being blocked when it should be. Consider the following:

  • When content filtering rules are configured/changed, it can take a while for them to fully take effect. This goes for both blocking and unblocking content. This process can sometimes take up to ten minutes.
  • Make sure that the client you are configuring is not allowed. Try finding the client you are testing with by navigating to Network-wide > Monitor > Clients, opening their client page, and making sure their "Policy" is not set to "Allow list."
  • Additionally, clients can be unintentionally add to the allow list by having group policies applied to them. ALL group policy rules take priority over default network rules unless set to "Use network default" settings.
  • Check to make sure that the URL is not in the Allow URL list on the content filtering page.
  • It is possible that the site does not actually have a good reputation or may be in a different category than it should be. Be sure to check the IP/URL reputation on BrightCloud.
  • In the latest stable firmware version, URL reputation is prioritized over IP reputation, as opposed to IP reputation being the deciding factor on previous firmware versions. If, for some reason, the IP has a different categorization then the URL, the client could be allowed through. Firmware can be upgraded by navigating to Organization > Monitor > Firmware upgrades.

 

How can I tell which policy is blocking a client?

If a client is being blocked from accessing a page, the easiest way to tell whether content filtering is blocking the traffic is to check your event log. When looking at the security appliance network in the dashboard, navigate to Network-wide > Monitor > Event log. To help narrow down the scope, the event type "Content filtering blocked URL" can be included in the "Event type include" field.

Screenshot from dashboard that shows multiple event log entries for content filtering blocks pertaining to google, facebook and pinterest.com.

In the "Details" section, the category will be defined if the traffic was blocked by the content filter. You will also be able to see which IP address and URL are being blocked. This can also be helpful information to use for allowing embedded content on a page.

Why is the Meraki block page not displayed?

If the website you are trying to reach is using HTTPS/SSL (rather than HTTP), the browser will display an error page rather than the Meraki block page. Because HTTPS/SSL traffic is encrypted, the MX cannot decrypt and redirect HTTPS traffic to the block page. Instead, the request will simply time out (as seen in the image below).

Screenshot of blocked page while attempting to go to https://www.facebook.com with a highlight on "https://".

Additionally, if the website/IP is being blocked by any layer 7 firewall rules, these will take effect before the content filtering rules do.

Why is an allowed site loading, but missing images/content?

Sometimes, when a page is allowed through the firewall, the page will load but it will be missing pictures or images. This is usually because there is content on the page that is actually hosted on another domain but displayed on the page, and that hosting domain is being blocked by URL blocking, category filtering, or firewall rules.

Example:
When category filtering for "Social Networking" is turned on, but "twitter.com" is explicitly allowed in the Allow URL list, the page will sometimes load, but not all images and content will appear as seen in the following picture, which is what is displayed when navigating to "twitter.com."

Screenshot from a partially blocked webpage, which in this example is the website "www.twitter.com" (currently known as 'X') showing no images and mostly text data due to the blocked category setting, with the "twitter..com" whitelist.

When the event log is checked, there are entries for "Content filtering blocked URL" for social networking. While "twitter.com" was allowed, the image/content hosting domain "twimg.com" was not.

Screenshot from dashboard that shows multiple event log entries for content filtering blocks pertaining "twimg.com", in the 'Social Networking' category.

In order to display the full page properly, the hosting domain would also need to be allowed.

Why are certain downloads (like PDFs) on a page hanging or not working correctly?

This issue is usually not related to content filtering. This is usually caused by AMP (threat protection) blocking certain hosts from providing downloads. There is a Allow list that can be applied by navigating to Security & SD-WAN > Configure > Threat protection. Both URLs and specific files can be allowed here.

Screenshot from dashboard, showing the AMP config under 'Threat Protection' with two whitelist additions for sourceforge.com and and internal office domain.

Why are pages loading slowly, especially the first time they're visited?

When URL category list size is set to "Full list," it can significantly slow down access to web pages, especially the first time they're visited. If a site is not in the list of "Top sites," the URL will have to be looked up and this will noticeably affect browsing speeds. This value can be changed back to "Top sites" to improve speeds if the "Top sites" list is sufficient. This feature is found on the content filtering page next to Blocked website categories.

Screenshot from dashboard showing the dropdown for types of content filtering available with the 'top sites only' option selected.

Web Search Filtering

Web search filtering is not filtering searches

Web search filtering can be enabled to encourage web searches to be relayed to Safesearch for Google, Yahoo!, and Bing. When the MX sees traffic that contains a web search for these sites, it redirects the content to the Safesearch alternative for the respective site. However, any search that is made through HTTPS/SSL will not be affected by this setting. Due to the fact that the content on an HTTPS/SSL page is encrypted, there is no way for the MX to inspect the traffic. Refer to the article on web search filtering for information.

Hosted email applications are being blocked

Web search filtering can also interfere with some mail applications that go through hosted services, like Office 365. If it is not essential, web search filtering should be disabled when applications like this are having issues.

URL Blocking

Blocked URL patterns are not being blocked

Several factors can contribute to blocked URL patterns not being blocked successfully. If this is occurring, be sure sure to consider each of the following factors:

  • Make sure the syntax for the URL pattern is correct. The more specific/lengthy a URL block entry is, the less likely it is to block the entire website. The more vague a block pattern is, the more likely it is to block the entire domain. Refer to the Content Filtering article for more information on patterns for URL blocking.
  • Make sure the client you are configuring is not in the allow list. Try finding the client you are testing with by navigating to Network-wide > Monitor > Clients, opening their client page, and making sure their "Policy" is not set to "Allow list."
  • Additionally, clients can also be unintentionally allowed by having group policies applied to them. All group policy rules take priority over default network rules, unless set to "Use network default" settings.
  • To ensure that the firewall rules are being applied to the client, the policy on the clients page can be set to "Blocked" to test to make sure the client is actually being blocked. If this works, it is likely that the URL pattern block doesn't match the destination.

Allow URL list patterns are not being allowed

Several factors can contribute to Allow URL list patterns not being allowed through the firewall. If this is occurring, be sure sure to consider each of the following factors:

  • Make sure the syntax for the URL pattern is correct. The more specific/lengthy a URL allow entry is, the less likely it is to allow the intended destination. The more vague a allow pattern is, the more likely it is to allow the entire domain. Refer to the Content Filtering article for more information on patterns for URL allowing.
  • Make sure that the client you are configuring is not blocked. Try finding the client you are testing with by navigating to Network-wide > Monitor > Clients, opening their client page, and making sure their "Policy" is not set to "Blocked."
  • Additionally, clients can also be unintentionally blocked by having group policies applied to them. All group policy rules take priority over default network rules, unless set to "Use network default" settings.
  • Try allowing a client by navigating to Network-wide > Monitor > Clients, opening the client page, and setting the "Policy" to "Allow list." If the client is still blocked, it is likely that the MX is not contributing to the issue and an upstream firewall or ISP is blocking the traffic. This can be verified by connecting directly to the modem/upstream router, if possible.