<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD: Prefilter Rule in both directions required in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871761#M582793</link>
    <description>&lt;P&gt;First respect we try to help you here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second if you dont find my answer help&amp;nbsp; you bypass it.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jul 2023 13:55:22 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-07-11T13:55:22Z</dc:date>
    <item>
      <title>FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871667#M582786</link>
      <description>&lt;P&gt;I want to prefilter Teams media traffic on the Cisco Firepower FTD and i create a corresponing rule that prefilters the affected traffic. But i wonder, what happens to the return traffic from the Microsoft Datacenter to our network? Do i have to create a mirrored rule that prefilters the return traffic as well, or does the FTD work statefull and automatically does fastpath this traffic, too?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 12:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871667#M582786</guid>
      <dc:creator>mario.jost</dc:creator>
      <dc:date>2023-07-11T12:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871672#M582787</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/69223"&gt;@mario.jost&lt;/a&gt; it is stateful, so the return traffic is automatically permitted.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 12:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871672#M582787</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-07-11T12:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871695#M582788</link>
      <description>&lt;P&gt;Zone-A Zone-B&amp;nbsp;&lt;BR /&gt;you config policy from Zone-A as source Zone-B as destination&lt;BR /&gt;if the traffic initiate from Zone-A toward Zone-B then policy above allow this traffic and return back traffic&amp;nbsp;&lt;BR /&gt;if the traffic initiate from Zone-B toward Zone-A then policy above not work and you need additional policy to allow traffic from Zone-B to Zone-A&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 12:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871695#M582788</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-11T12:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871739#M582790</link>
      <description>&lt;P&gt;I know that the traffic is "allowed". My question is: Is the return traffic prefiltered/fastpathed as well? Or do i have to create a seperate rule for that.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 13:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871739#M582790</guid>
      <dc:creator>mario.jost</dc:creator>
      <dc:date>2023-07-11T13:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871742#M582791</link>
      <description>&lt;P&gt;Return not initiate traffic can pass.&lt;/P&gt;
&lt;P&gt;If it initiate not return you need policy.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 13:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871742#M582791</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-11T13:38:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871748#M582792</link>
      <description>&lt;P&gt;i need a translator for this. Again: I am not talking about PASSING traffic, i know it passes. The question has been, if it the return traffic gets &lt;SPAN&gt;prefiltered/&lt;/SPAN&gt;fastpathed as well. Please do not post anything if you do not have to contribute to the answer of the question. People just try to hunt for forum points here in the cisco community, thats why usually you find 1-2 quick answers that totally miss the topic.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 13:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871748#M582792</guid>
      <dc:creator>mario.jost</dc:creator>
      <dc:date>2023-07-11T13:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871761#M582793</link>
      <description>&lt;P&gt;First respect we try to help you here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second if you dont find my answer help&amp;nbsp; you bypass it.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 13:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871761#M582793</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-11T13:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871902#M582802</link>
      <description>&lt;P&gt;As noted by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; the "stateful" nature of a firewall means that it checks all incoming traffic to see if it is part of an existing tcp connection or udp flow (i.e., does it know something about the "state" of the traffic already). If it is found to be a reply to an already-allowed traffic flow, the return traffic is allowed automatically. That is why we don't need to make a given rule for two directions - one suffices.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 17:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871902#M582802</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-07-11T17:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871965#M582808</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;i know you probably mean well and you dont see harm if your answer is not the right one. But i tell you why i am not a fan of wrong answers. Some time in the evening some guy who might now the right answer scrolls past new posts and sees the headline of this one. He sees, that this question has already 4 answers and thinks to himself: probably someone already posted the correct answer and does not open the discussion to read the details in it. If the post would have 0 answers, he probably would open it and answer. I hope you understand.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 20:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871965#M582808</guid>
      <dc:creator>mario.jost</dc:creator>
      <dc:date>2023-07-11T20:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871968#M582809</link>
      <description>&lt;P&gt;I think i finally found the answer in the cisco documentation here: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/prefiltering_and_prefilter_policies.html" target="_self"&gt;Firepower Management Center Configuration Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Under &lt;SPAN&gt;Prefilter Rules it says:&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;STRONG&gt;Unidirectional only (nonconfigurable).&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Prefilter rules match source-to-destination traffic only.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;And further below it says:&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;Prefilter rules are always unidirectional.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;So i think you have to creat a seperate rule in order to &lt;SPAN&gt;prefiltered/fastpath the traffic in the other direction (WAN2LAN) as well. By fastpathing i mean circumvent the DAQ part where lots of things like IP reputation, Domain blocking, URL filtering, decrypting, snort and other stuff takes place that could delay the traffic. So im leaving this anwer if someone in the future is looking for the same question and does not find this in the cisco documentation right away.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 20:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871968#M582809</guid>
      <dc:creator>mario.jost</dc:creator>
      <dc:date>2023-07-11T20:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Prefilter Rule in both directions required</title>
      <link>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871981#M582810</link>
      <description>&lt;P&gt;Dont worry friend be Cool Man,&amp;nbsp;&lt;BR /&gt;NOW regarding your Q,&amp;nbsp;&lt;BR /&gt;cisco have two FastPath, one bypass the Snort other is bypass the prefilter&lt;BR /&gt;first one NO need Conn second one need Conn generate in FPR.&lt;BR /&gt;but here is the other Q appear how FTD know that this Conn need to go to Snort or bypass Snort. here come the flag FTD use for Conn if Conn have flag N1/2 then this traffic need to go to Snort if NOT then this traffic will inspect by Snort.&amp;nbsp;&lt;BR /&gt;you config prefilter with fastpath, traffic initiate and Conn generate and return traffic will use this Conn to&amp;nbsp; bypass prefilter and bypass Snort (since you config prefilter with fastpath).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (58).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/190169iD7E1069D26934CAD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (58).png" alt="Screenshot (58).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (57).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/190168i08D21776AA148B7F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (57).png" alt="Screenshot (57).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 20:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ftd-prefilter-rule-in-both-directions-required/m-p/4871981#M582810</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-11T20:36:40Z</dc:date>
    </item>
  </channel>
</rss>

