<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Snort Dropping Packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712816#M1004032</link>
    <description>&lt;P&gt;Thanks for clearing that up for me, much appreciated!&lt;/P&gt;</description>
    <pubDate>Tue, 25 Sep 2018 13:15:44 GMT</pubDate>
    <dc:creator>SteamCoconut</dc:creator>
    <dc:date>2018-09-25T13:15:44Z</dc:date>
    <item>
      <title>Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3710422#M1003867</link>
      <description>&lt;P&gt;My access control policy has all traffic set to allow, and is then forwarded to my intrusion policy. My intrusion policy is NOT set to drop. Running show asp drop command on my 4110 FTD shows that almost all of the drops are coming from snort-drop. When I run a packet trace from the FMC for an internal IP address, to a public IP address over port 80 on the data port the result ends up in a snort drop, and I am not sure why... Any help would be greatly appreciated.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are outputs for show interface, show asp drop, and a packet trace.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interface Ethernet1/1 "data", is up, line protocol is up&lt;BR /&gt;Hardware is EtherSVI, BW 1000 Mbps, DLY 1000 usec&lt;BR /&gt;MAC address 7070.8bb7.8e4e, MTU 1500&lt;BR /&gt;IPS Interface-Mode: passive&lt;BR /&gt;IP address unassigned&lt;BR /&gt;Traffic Statistics for "data":&lt;BR /&gt;15700519748 packets input, 10991399804502 bytes&lt;BR /&gt;0 packets output, 0 bytes&lt;BR /&gt;15756174740 packets dropped&lt;BR /&gt;1 minute input rate 9708 pkts/sec, 7640212 bytes/sec&lt;BR /&gt;1 minute output rate 0 pkts/sec, 0 bytes/sec&lt;BR /&gt;1 minute drop rate, 9741 pkts/sec&lt;BR /&gt;5 minute input rate 10721 pkts/sec, 8119043 bytes/sec&lt;BR /&gt;5 minute output rate 0 pkts/sec, 0 bytes/sec&lt;BR /&gt;5 minute drop rate, 10754 pkts/sec&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Frame drop:&lt;BR /&gt;Invalid TCP Length (invalid-tcp-hdr-length) 2&lt;BR /&gt;Invalid UDP Length (invalid-udp-length) 2&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 1326&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 42&lt;BR /&gt;Dst MAC L2 Lookup Failed (dst-l2_lookup-fail) 8024996&lt;BR /&gt;Snort requested to drop the frame (snort-drop) 15727665754&lt;BR /&gt;Snort instance is down (snort-down) 1108990&lt;BR /&gt;Snort instance is busy (snort-busy) 128465&lt;BR /&gt;FP L2 rule drop (l2_acl) 3&lt;BR /&gt;Dispatch queue tail drops (dispatch-queue-limit) 1593&lt;BR /&gt;Packets processed in IDS modes (ids-pkts-processed) 11316601&lt;BR /&gt;Not a blocking packet (none) 2&lt;BR /&gt;Blocked or blacklisted by snort (snort-module) 179&lt;BR /&gt;Blocked or blacklisted by the IPS preprocessor (ips-preproc) 102&lt;/P&gt;
&lt;P&gt;Last clearing: Never&lt;/P&gt;
&lt;P&gt;Flow drop:&lt;/P&gt;
&lt;P&gt;Last clearing: Never&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: NGIPS-MODE&lt;BR /&gt;Subtype: ngips-mode&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;The flow ingressed an interface configured for NGIPS mode and NGIPS services will be applied&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268434434 &lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434434: ACCESS POLICY: Inline Active Policy - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434434: L7 RULE: Allow All&lt;BR /&gt;Additional Information:&lt;BR /&gt; This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NGIPS-EGRESS-INTERFACE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Ingress interface data is in NGIPS passive mode.The flow will not egress the device&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 220284463, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Packet: TCP, SYN, seq 705363242&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: allow rule, 'Allow All' , allow&lt;BR /&gt;Snort id 5, NAP id 2, IPS id 1, Verdict PASS&lt;BR /&gt;Snort Verdict: (block-packet) drop this packet&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: data&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (none) Not a blocking packet&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:58:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3710422#M1003867</guid>
      <dc:creator>SteamCoconut</dc:creator>
      <dc:date>2019-03-12T13:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3710962#M1003868</link>
      <description>&lt;P&gt;You can check the details of how Snort is handling your flow with:&lt;/P&gt;
&lt;PRE&gt;system support firewall-engine-debug&lt;/PRE&gt;
&lt;P&gt;Run that in one command window and then open a second window. Re-run the packet tracer command with the same parameters. The debug window should show you exactly which ACP or Intrusion rule is blocking the flow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's an example debug output which highlights the blocking rule:&lt;/P&gt;
&lt;PRE&gt;10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 new firewall session
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 Starting with minimum 17, 'Tagged-GRE', and SrcZone first with zones 1 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, inline sgt tag: untagged, ISE sgt id: 0, svc 617, payload 0, client 2000000617, misc 0, user 9999997, icmpType 0, icmpCode 0
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 no match rule order 19, 'URL Monitor', no url
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 no match rule order 20, 'Inside-Outside', DstZone
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;match rule order 21, id 268434432 action Block&lt;/STRONG&gt;&lt;/FONT&gt;
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 deny action&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 07:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3710962#M1003868</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-21T07:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3710963#M1003869</link>
      <description>&lt;P&gt;You can check the details of how Snort is handling your flow with&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;system support firewall-engine-debug&lt;/PRE&gt;
&lt;P&gt;Run that in one command window and then open a second window. Re-run the packet tracer command with the same parameters. The debug window should show you exactly which ACP or Intrusion rule is blocking the flow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's an example debug output which highlight the blocking rule:&lt;/P&gt;
&lt;PRE&gt;10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 new firewall session
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 Starting with minimum 17, 'Tagged-GRE', and SrcZone first with zones 1 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, inline sgt tag: untagged, ISE sgt id: 0, svc 617, payload 0, client 2000000617, misc 0, user 9999997, icmpType 0, icmpCode 0
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 no match rule order 19, 'URL Monitor', no url
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 no match rule order 20, 'Inside-Outside', DstZone
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;match rule order 21, id 268434432 action Block&lt;/STRONG&gt;&lt;/FONT&gt;
10.4.19.25-58194 &amp;gt; 10.50.59.236-53 17 AS 1 I 4 deny action&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 07:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3710963#M1003869</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-21T07:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712776#M1003870</link>
      <description>&lt;P&gt;I cannot get a prompt when connecting to module 1 console... getting stuck at Close Network Connection to Exit.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 12:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712776#M1003870</guid>
      <dc:creator>SteamCoconut</dc:creator>
      <dc:date>2018-09-25T12:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712779#M1003871</link>
      <description>&lt;P&gt;On a 4110 running FTD, log into the FTD logical device management address. Not the chassis management interface.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 12:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712779#M1003871</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-25T12:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712793#M1003872</link>
      <description>&lt;P&gt;Packet trace is showing drop, while system debug is showing allow. Unless I am reading it wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;10.101.0.132-26485 &amp;gt; 151.101.1.67-443 6 AS 4 I 6 new firewall session&lt;BR /&gt;10.101.0.132-26485 &amp;gt; 151.101.1.67-443 6 AS 4 I 6 using HW or preset rule order 3, 'Allow All', action Allow and prefilter rule 0&lt;BR /&gt;10.101.0.132-26485 &amp;gt; 151.101.1.67-443 6 AS 4 I 6 allow action&lt;BR /&gt;10.101.0.132-26485 &amp;gt; 151.101.1.67-443 6 AS 4 I 6 Got end of flow event from hardware with flags E0000009&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#################################################&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: NGIPS-MODE&lt;BR /&gt;Subtype: ngips-mode&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;The flow ingressed an interface configured for NGIPS mode and NGIPS services will be applied&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268434434 &lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434434: ACCESS POLICY: Inline Active Policy - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434434: L7 RULE: Allow All&lt;BR /&gt;Additional Information:&lt;BR /&gt; This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NGIPS-EGRESS-INTERFACE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Ingress interface data is in NGIPS passive mode.The flow will not egress the device&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 266171670, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Packet: TCP, SYN, seq 273243856&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: allow rule, 'Allow All' , allow&lt;BR /&gt;Snort id 6, NAP id 2, IPS id 1, Verdict PASS&lt;BR /&gt;Snort Verdict: (block-packet) drop this packet&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: data&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (none) Not a blocking packet&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 12:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712793#M1003872</guid>
      <dc:creator>SteamCoconut</dc:creator>
      <dc:date>2018-09-25T12:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712803#M1003873</link>
      <description>&lt;P&gt;I just noticed this (it was in your initial posting as well):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Ingress interface data is in NGIPS passive mode.The flow will not egress the device&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How are your interfaces setup? It doesn't look like there's an egress interface.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 12:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712803#M1003873</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-25T12:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712808#M1004030</link>
      <description>&lt;P&gt;Chassis management port to switch, FTD management port to switch, and data port to Gigamon&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 13:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712808#M1004030</guid>
      <dc:creator>SteamCoconut</dc:creator>
      <dc:date>2018-09-25T13:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712812#M1004031</link>
      <description>&lt;P&gt;So you're just passively mirroring a port into FTD using the Gigamon? In that case the packets will always be dropped after inspection since they have no place to go (no egress interface).&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 13:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712812#M1004031</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-25T13:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712816#M1004032</link>
      <description>&lt;P&gt;Thanks for clearing that up for me, much appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 13:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712816#M1004032</guid>
      <dc:creator>SteamCoconut</dc:creator>
      <dc:date>2018-09-25T13:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712820#M1004033</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I agree the packet-tracer output can be confusing. I had opened a case just last month because it was telling me "blacklist" even though no Security Intelligence blacklist was actually being hit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's why I also advise running the debugs. That's what TAC does to get a more complete picture when you open a case.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 13:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3712820#M1004033</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-25T13:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Dropping Packets</title>
      <link>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3727488#M1004034</link>
      <description>&lt;P&gt;Hi Marvin,&lt;BR /&gt;&lt;BR /&gt;I have the same problem ("My access control policy has all traffic set to allow, and is then forwarded to my intrusion policy. My intrusion policy is NOT set to drop").The snort engine drop my packets&lt;BR /&gt;Could you help me please!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I use inline-tap.IF I disable Inline-Tap , Do I have any problem&amp;nbsp; ?will snort block my packets?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;1) Show inline-set&lt;BR /&gt;&lt;BR /&gt;Inline-set IN_OUT_PAIR&lt;BR /&gt;&amp;nbsp; Mtu is 1500 bytes&lt;BR /&gt;&amp;nbsp; Fail-open for snort down is off&lt;BR /&gt;&amp;nbsp; Fail-open for snort busy is off&lt;BR /&gt;&amp;nbsp; Tap mode is on&lt;BR /&gt;&amp;nbsp; Propagate-link-state option is on&lt;BR /&gt;&amp;nbsp; hardware-bypass mode is standby&lt;BR /&gt;&amp;nbsp; Interface-Pair[1]:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface: Ethernet3/1 "OUT"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Current-Status: UP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface: Ethernet3/2 "IN"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Current-Status: UP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bridge Group ID: 631&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&amp;gt; packet-tracer input OUT tcp 8.8.8.8 65000 10.10.X.1 23 detailed&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: NGIPS-MODE&lt;BR /&gt;Subtype: ngips-mode&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;The flow ingressed an interface configured for NGIPS mode and NGIPS services will be applied&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x2aacdb162280, priority=501, domain=ips-mode, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=67818, user_data=0x2aacdaee4220, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=OUT, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip any4 object-group FMC_INLINE_dst_rule_268434434 rule-id 268434434&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434434: ACCESS POLICY: ACP - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434434: L7 RULE: Inbound Traffic&lt;BR /&gt;object-group network FMC_INLINE_dst_rule_268434434&lt;BR /&gt;&amp;nbsp;network-object object VLAN_52&lt;BR /&gt;&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x2aacdb3ec360, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1963697, user_data=0x2aab952464c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.10.X.0, mask=255.255.255.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NGIPS-EGRESS-INTERFACE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Ingress interface OUT is in NGIPS inline mode.&lt;BR /&gt;Egress interface IN is determined by inline-set configuration&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 843895392, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_ips_tcp_state_track_lite&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_ips_mode_adj&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_ips_done&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_ips_tcp_state_track_lite&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_ips_mode_adj&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_ips_done&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Result: DROP&lt;/FONT&gt;&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Packet: TCP, SYN, seq 1128432634&lt;BR /&gt;Session: simulated packet matches existing snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: allow rule, id 268434434, allow&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Snort id 9, NAP id 1, IPS id 0, Verdict PASS&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Snort Verdict: (block-packet) drop this packet&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: OUT&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Action: Access-list would have dropped,but packet forwarded due to inline-tap&lt;/FONT&gt;&lt;BR /&gt;&amp;gt; show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;&amp;nbsp; Invalid TCP Length (invalid-tcp-hdr-length)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 37&lt;BR /&gt;&amp;nbsp; No route to host (no-route)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;BR /&gt;&amp;nbsp; Flow is denied by configured rule (acl-drop)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10738&lt;BR /&gt;&amp;nbsp; Slowpath security checks failed (sp-security-failed)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20039&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&amp;nbsp; Snort requested to drop the frame (snort-drop)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 71613374683&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp; Snort instance is busy&amp;nbsp; (snort-busy)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 49659661&lt;BR /&gt;&amp;nbsp; FP L2 rule drop (l2_acl)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&lt;BR /&gt;&amp;nbsp; Dispatch queue tail drops (dispatch-queue-limit)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 976&lt;BR /&gt;&amp;nbsp; Packets processed in IDS modes (ids-pkts-processed)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 55091915&lt;BR /&gt;&amp;nbsp; Not a blocking packet (none)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 18&lt;BR /&gt;&amp;nbsp; Blocked or blacklisted by the stream preprocessor (stream)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 51373101&lt;BR /&gt;&amp;nbsp; Blocked or blacklisted by the session preprocessor (session-preproc)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 510&lt;BR /&gt;&amp;nbsp; Blocked or blacklisted by the reputation preprocessor (reputation)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30369&lt;BR /&gt;&lt;BR /&gt;Last clearing: Never&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;&lt;BR /&gt;Last clearing: Never&lt;BR /&gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 23:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-dropping-packets/m-p/3727488#M1004034</guid>
      <dc:creator>cristian.carrion</dc:creator>
      <dc:date>2018-10-17T23:14:56Z</dc:date>
    </item>
  </channel>
</rss>

