<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When you have a host in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041861#M1006241</link>
    <description>&lt;P&gt;When you have a host whitelisted (or blacklisted for that matter), connections to/from it are handled by Security intelligence (SI). SI is a step prior to Access control Policy (ACP) processing.&lt;/P&gt;
&lt;P&gt;If a host is blacklisted, SI will drop the connections and not analyze them further.&lt;/P&gt;
&lt;P&gt;If a host is whitelisted, SI will proceed to evaluate connections for it per any applicable settings in your ACP.&lt;/P&gt;
&lt;P&gt;Reference:&amp;nbsp;http://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Security_Intelligence_Blacklisting.html&lt;/P&gt;</description>
    <pubDate>Sun, 02 Jul 2017 04:12:40 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-07-02T04:12:40Z</dc:date>
    <item>
      <title>FMC Whitelisting</title>
      <link>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041860#M1006240</link>
      <description>&lt;P&gt;Within the FMC i have noticed I can whitelist hosts (by right clicking) when looking at potential threats/compromises.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I whitelist a host, what exactly does this do backend? I'm unclear as to what this achieves ACP wise or how it has any affect&amp;nbsp;at all other than cosmetically during Network Discovery.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does it just stop alerts during network discovery?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041860#M1006240</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2020-02-21T14:12:06Z</dc:date>
    </item>
    <item>
      <title>When you have a host</title>
      <link>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041861#M1006241</link>
      <description>&lt;P&gt;When you have a host whitelisted (or blacklisted for that matter), connections to/from it are handled by Security intelligence (SI). SI is a step prior to Access control Policy (ACP) processing.&lt;/P&gt;
&lt;P&gt;If a host is blacklisted, SI will drop the connections and not analyze them further.&lt;/P&gt;
&lt;P&gt;If a host is whitelisted, SI will proceed to evaluate connections for it per any applicable settings in your ACP.&lt;/P&gt;
&lt;P&gt;Reference:&amp;nbsp;http://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Security_Intelligence_Blacklisting.html&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2017 04:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041861#M1006241</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-02T04:12:40Z</dc:date>
    </item>
    <item>
      <title>Is the white/blacklisting</title>
      <link>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041862#M1006242</link>
      <description>&lt;P&gt;Is the white/blacklisting purely based on IP and nothing more specific higher up the layers?,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When adding hosts to the lists, is this list/SI information pushed to the device regardless of which ACP i deploy? Is it integrated to ACPs or do I have choice of pushing out SI?&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2017 10:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041862#M1006242</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-02T10:29:09Z</dc:date>
    </item>
    <item>
      <title>It's mostly IP layer. You can</title>
      <link>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041863#M1006243</link>
      <description>&lt;P&gt;It's mostly IP layer. You can also blacklilst/whiteelist DNS FQDNs.&lt;/P&gt;
&lt;P&gt;The SI lists are pushed to the devices independent of ACP. I'm not sure of the mechanism but I believe it (including the local lists) happens as part of updating the Cisco feeds.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 09:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-whitelisting/m-p/3041863#M1006243</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-03T09:51:01Z</dc:date>
    </item>
  </channel>
</rss>

