<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Veronike - please correct me in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032762#M1006520</link>
    <description>&lt;P&gt;Veronike - please correct me if I am wrong; but I believe any policy deployment that includes Snort rule updates will require a restart of the Snort engine and thus cause a brief traffic disruption.&lt;/P&gt;</description>
    <pubDate>Sun, 21 May 2017 12:59:13 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-05-21T12:59:13Z</dc:date>
    <item>
      <title>Temporary loss of internet</title>
      <link>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032760#M1006515</link>
      <description>&lt;P&gt;Every so often when we apply SourceFire policies to our firewalls there will be a temporary (approximately 5 minutes) loss of all internet traffic. &amp;nbsp;Does this happen to anyone else? &amp;nbsp;Any idea what could be the cause? &amp;nbsp;I'd say it happens about 10% of the time. &amp;nbsp;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032760#M1006515</guid>
      <dc:creator>darin.gottman1</dc:creator>
      <dc:date>2019-03-12T13:24:22Z</dc:date>
    </item>
    <item>
      <title>Hello Darin,</title>
      <link>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032761#M1006517</link>
      <description>&lt;P&gt;Hello Darin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;from provided description this might be caused by specific configuration change that is done to Access Control Policy bundle. Some configuration settings requires snort/detection engine restart which will cause network disruption, with this in mind temporary network outage can be expected. But there is opportunity to avoid such network interruption by adjusting ACP advance settings tab, there is option "&lt;SPAN&gt;Inspect traffic during policy apply&lt;/SPAN&gt;" that can allow you to say whether traffic should be inspected or not during ACP apply.&lt;/P&gt;
&lt;P&gt;Documentation reference:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/policy_management.html#concept_33516C5D6B574B6888B1A05F956ABDF9&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Veronika&lt;/P&gt;</description>
      <pubDate>Sun, 21 May 2017 11:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032761#M1006517</guid>
      <dc:creator>Veronika Klauzova</dc:creator>
      <dc:date>2017-05-21T11:03:36Z</dc:date>
    </item>
    <item>
      <title>Veronike - please correct me</title>
      <link>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032762#M1006520</link>
      <description>&lt;P&gt;Veronike - please correct me if I am wrong; but I believe any policy deployment that includes Snort rule updates will require a restart of the Snort engine and thus cause a brief traffic disruption.&lt;/P&gt;</description>
      <pubDate>Sun, 21 May 2017 12:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032762#M1006520</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-21T12:59:13Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032763#M1006522</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;that's correct and one of very great example's.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This can be confirmed by performing IPS update along with policy bundle re-apply action in lab. First new SRU will be downloaded from Cisco owned download server, SRU will be installed and afterwards policy reapplied from FMC down to sensor. What we can observe during this process is that whenever detection engine restarts, it's process it will be changed and during this time traffic disruption will be observed, just note that during reload of the detection engine process ID would remain same and traffic will be process without interruption.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Demonstration from lab environment:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&amp;gt; &lt;STRONG&gt;expert&lt;/STRONG&gt;&lt;BR /&gt;sudo admin@fmc:~$ &lt;STRONG&gt;sudo su&lt;/STRONG&gt;&lt;BR /&gt;root@fmc:/Volume/home/admin# &lt;STRONG&gt;head /var/sf/detection_engines/0b93c184-34ad-11e7-ab1b-7f2c11b82031/ngfw.rules&lt;/STRONG&gt;&lt;BR /&gt;#### ngfw.rules&lt;BR /&gt;##############################################################################&lt;BR /&gt;#&lt;BR /&gt;# AC Name : new&lt;BR /&gt;# Policy Exported : Mon May 22 08:19:01 2017 (UTC)&lt;BR /&gt;# File Written : Mon May 22 08:19:37 2017 (UTC)&lt;BR /&gt;#&lt;BR /&gt;# DC Version : 6.2.0&lt;BR /&gt;&lt;STRONG&gt;# SRU : 2016-03-28-001-vrt&lt;/STRONG&gt;&lt;BR /&gt;# VDB : 271&lt;BR /&gt;root@fmc:/Volume/home/admin# &lt;STRONG&gt;pmtool status | grep -i "de,snort"; date&lt;/STRONG&gt; &lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d01 (de,snort) - Running &lt;STRONG&gt;9542 --&amp;gt; process ID of detection engine before any policy changes and before SRU update&lt;/STRONG&gt;&lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d02 (de,snort) - Running &lt;STRONG&gt;9543&lt;/STRONG&gt;&lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d03 (de,snort) - Running &lt;STRONG&gt;9544&lt;/STRONG&gt;&lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d04 (de,snort) - Running &lt;STRONG&gt;9545&lt;/STRONG&gt;&lt;BR /&gt;Mon May 22 08:53:31 UTC 2017&lt;BR /&gt;root@fmc:/Volume/home/admin#&lt;BR /&gt;root@fmc:/Volume/home/admin#&lt;BR /&gt;root@fmc:/Volume/home/admin#&lt;/PRE&gt;
&lt;H5 class="prettyprint"&gt;Outputs&amp;nbsp;after&amp;nbsp;SRU update and policy reapply is being pushed down to sensor:&lt;/H5&gt;
&lt;PRE class="prettyprint"&gt;root@fmc:/Volume/home/admin#&lt;BR /&gt;root@fmc:/Volume/home/admin# &lt;STRONG&gt;pmtool status | grep -i "de,snort"; date&lt;/STRONG&gt;&lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d01 (de,snort) - Running &lt;STRONG&gt;22575 --&amp;gt; process ID changed after detection engine restart&lt;/STRONG&gt;&lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d02 (de,snort) - Running &lt;STRONG&gt;22576&lt;/STRONG&gt;&lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d03 (de,snort) - Running &lt;STRONG&gt;22577&lt;/STRONG&gt;&lt;BR /&gt;0b93c184-34ad-11e7-ab1b-7f2c11b82031-d04 (de,snort) - Running &lt;STRONG&gt;22578&lt;/STRONG&gt;&lt;BR /&gt;Mon May 22 09:29:46 UTC 2017&lt;BR /&gt;root@fmc:/Volume/home/admin# &lt;STRONG&gt;head /var/sf/detection_engines/0b93c184-34ad-11e7-ab1b-7f2c11b82031/ngfw.rules&lt;/STRONG&gt;&lt;BR /&gt;#### ngfw.rules&lt;BR /&gt;##############################################################################&lt;BR /&gt;#&lt;BR /&gt;# AC Name : new&lt;BR /&gt;&lt;STRONG&gt;# Policy Exported : Mon May 22 09:25:27 2017 (UTC)&lt;/STRONG&gt;&lt;BR /&gt;# File Written : Mon May 22 09:26:32 2017 (UTC)&lt;BR /&gt;#&lt;BR /&gt;# DC Version : 6.2.0&lt;BR /&gt;&lt;STRONG&gt;# SRU : 2017-05-18-001-vrt --&amp;gt; new SRU pushed to detection engine&lt;/STRONG&gt;&lt;BR /&gt;# VDB : 271&lt;BR /&gt;root@fmc:/Volume/home/admin#&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Veronika&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2017 09:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/temporary-loss-of-internet/m-p/3032763#M1006522</guid>
      <dc:creator>Veronika Klauzova</dc:creator>
      <dc:date>2017-05-22T09:40:52Z</dc:date>
    </item>
  </channel>
</rss>

