<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Snort Restarts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3207179#M1007006</link>
    <description>&lt;P&gt;&lt;BR /&gt;Thanks Marvin for your reply.&lt;/P&gt;
&lt;P&gt;I want to know if there is any way where we can find out the difference in policies between two deployments ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let say, I login to the FMC and can see that FTDs are having some unsaved/underemployment policies , I would like to know what all the changes that has been configured but not&amp;nbsp; been deployed. This exercise can help us to understand if SNORT requires restart or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I faced some strange issue, last week I pushed the policy and noticed that users lost the access for they needed to reconnect the sessions. later on I found that Signature DB has been updated which has restarted the SNORT or connection table of the firewalls.&lt;/P&gt;
&lt;P&gt;In our deployment, most of the policies are configured for "allow" action which certainly send traffic to the SNORT engine even though you don't an IPS/IDS or file policy associated with it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You thought please.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Oct 2017 00:54:24 GMT</pubDate>
    <dc:creator>prashant dwivedi</dc:creator>
    <dc:date>2017-10-30T00:54:24Z</dc:date>
    <item>
      <title>FTD Snort Fail Open</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077161#M1006999</link>
      <description>&lt;P&gt;According to the configuration guide, if a Threat Defense device is configured with interfaces in either redundant or transparent mode and the Snort process restarts as part of a configuration deployment, packets will be dropped.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, if the interfaces are configured in inline mode, it is possible to set a "Snort Fail Open" setting to enabled, causing packets to instead simply be passed without inspection.&lt;/P&gt;
&lt;P&gt;Is it not possible to have this same fail-open behavior when the interfaces are routed, or is there some other trick that can be used to prevent any Snort restart from killing my traffic?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077161#M1006999</guid>
      <dc:creator>Isaiah</dc:creator>
      <dc:date>2020-02-21T14:02:54Z</dc:date>
    </item>
    <item>
      <title>I don't think you can do that</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077162#M1007000</link>
      <description>&lt;P&gt;I don't think you can do that as of the current FTD 6.2. We'll have to watch for it in a future release.&lt;/P&gt;
&lt;P&gt;If it's important to your use case, please raise it via your Cisco account manager as an enhancement request.&lt;/P&gt;
&lt;P&gt;Routed mode presents a particular challenge since the device may be a gateway or next hop for all traffic so it cannot just be shunted directly to the egress interface.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 03:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077162#M1007000</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-06T03:47:16Z</dc:date>
    </item>
    <item>
      <title>You can enable this feature</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077163#M1007001</link>
      <description>&lt;P&gt;You can enable this feature from the FMC. Specifically, you need to edit the relevant inline interface from the device management page, and set it from the advanced tab.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 21:06:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077163#M1007001</guid>
      <dc:creator>Mehdi Derdouri</dc:creator>
      <dc:date>2017-06-01T21:06:10Z</dc:date>
    </item>
    <item>
      <title>You can only fail open if the</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077164#M1007002</link>
      <description>&lt;P&gt;You can only fail open if the interfaces are in an inline set.&amp;nbsp; It is not possible with routed mode.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 13:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077164#M1007002</guid>
      <dc:creator>Isaiah</dc:creator>
      <dc:date>2017-06-02T13:57:31Z</dc:date>
    </item>
    <item>
      <title>That's correct Isaih - thank</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077165#M1007003</link>
      <description>&lt;P&gt;That's correct Isaih - thank you for pointing that out.&lt;/P&gt;
&lt;P&gt;One of Cisco's design goals going forward is to gretly reduce the number of times (and duration of) Snort restarts during configuration changes / deployments. They realize the current situation is a shortcoming and are endeavoring to remedy it.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 14:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3077165#M1007003</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-02T14:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: That's correct Isaih - thank</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3206233#M1007004</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;Do you know what kind of configuration can lead to the SNORT restart ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We should know this before pushing the policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please confirm on below :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1- whenever we push a new signature database to the FTDs will it surely restart the SNORT and hence there would be an outage for a brief amount ?&lt;/P&gt;
&lt;P&gt;2- We have seen SNORT restart is also resetting the whole connection table hence these changes should be made on an approved outage window.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is really something serious which we should be worrying about.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We should have a checklist stating configuration that can lead to a SNORT restart.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Prashant&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2017 08:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3206233#M1007004</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-10-27T08:16:49Z</dc:date>
    </item>
    <item>
      <title>Snort Restarts</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3206394#M1007005</link>
      <description>&lt;P&gt;Prashant,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This behavior has been one area where Cisco has focused lately. The following is valid as of Release 6.2.2:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In general, routine policy changes do not cause Snort restart by default.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;However some operations require memory reconfiguration and engine reload. Those include:&lt;BR /&gt;- HA, MTU, and other infrequent platform changes&lt;BR /&gt;- Application preprocessor settings in Network Analysis Policy (NAP)&lt;BR /&gt;- URL category/reputation, application detector changes&lt;BR /&gt;- Creating/removing TLS, Network Analysis, File/AMP, and NAP policies&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that VDB updates replace Snort binary and always require a restart&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have an HA pair or a cluster, engines restart on both HA peers and all cluster members together.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should also see that unavoidable restarts and binary changes will now generate warnings prior to committing to deploy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2017 12:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3206394#M1007005</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-27T12:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Restarts</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3207179#M1007006</link>
      <description>&lt;P&gt;&lt;BR /&gt;Thanks Marvin for your reply.&lt;/P&gt;
&lt;P&gt;I want to know if there is any way where we can find out the difference in policies between two deployments ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let say, I login to the FMC and can see that FTDs are having some unsaved/underemployment policies , I would like to know what all the changes that has been configured but not&amp;nbsp; been deployed. This exercise can help us to understand if SNORT requires restart or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I faced some strange issue, last week I pushed the policy and noticed that users lost the access for they needed to reconnect the sessions. later on I found that Signature DB has been updated which has restarted the SNORT or connection table of the firewalls.&lt;/P&gt;
&lt;P&gt;In our deployment, most of the policies are configured for "allow" action which certainly send traffic to the SNORT engine even though you don't an IPS/IDS or file policy associated with it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You thought please.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2017 00:54:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3207179#M1007006</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-10-30T00:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Restarts</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3207474#M1007007</link>
      <description>&lt;P&gt;For all policies EXCEPT the ACP (not sure why that one isn't included), you can select "Compare Policy"and get a report of the delta between the running and chosen policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Procedure&lt;/STRONG&gt;&lt;/P&gt;
&lt;HR noshade="noshade" /&gt;
&lt;TABLE class="stepTable" border="0" width="90%" cellspacing="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="7%" align="left" valign="top" class="td_faq"&gt;&lt;STRONG&gt;Step&amp;nbsp;1&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top" class="td_faq"&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__step_73026B25D68B4AF6803891763CF40AC2" target="_blank"&gt;&lt;/A&gt; &lt;SPAN&gt; Access the management page for the policy you want to compare: &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_451D49F46E7343328A0C31951B101661" target="_blank"&gt;&lt;/A&gt;DNS—&lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;Policies&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Access Control&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;DNS&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_06F119F192E94E52888954E9A28ACD3F" target="_blank"&gt;&lt;/A&gt;File—&lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;Policies&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Access Control&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Malware &amp;amp; File&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_BF400FBB6E284174B8213522FB1448B8" target="_blank"&gt;&lt;/A&gt;Health—&lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;System&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Health&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Policy&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_56931940E6ED4511919FE44CBAE39950" target="_blank"&gt;&lt;/A&gt;Identity—&lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;Policies&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Access Control&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Identity&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_9C5FC653E3624FA2A9A8DB0972AF0967" target="_blank"&gt;&lt;/A&gt;Intrusion—&lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;Policies&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Access Control&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Intrusion&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_D67A4E817A7C413EB7898E1D38CAB258" target="_blank"&gt;&lt;/A&gt;Network Analysis—&lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;Policies&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Access Control&lt;/SPAN&gt;&lt;/SPAN&gt;, then click &lt;SPAN class="uicontrol"&gt;Network Analysis Policy&lt;/SPAN&gt;&lt;/SPAN&gt; or &lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;Policies &lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Access Control&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Intrusion&lt;/SPAN&gt;&lt;/SPAN&gt;, then click &lt;SPAN class="uicontrol"&gt;Network Analysis Policy&lt;/SPAN&gt;&lt;/SPAN&gt;
&lt;TABLE class="olh_note"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="td_faq"&gt;&lt;STRONG&gt;Note&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD class="td_faq"&gt;
&lt;P&gt;If your custom user role limits access to the first path listed here, use the second path to access the policy.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_27B7639E2A1045908A345D4F02F15E25" target="_blank"&gt;&lt;/A&gt;SSL—&lt;SPAN&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;Policies&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Access Control&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;SSL&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="7%" align="left" valign="top" class="td_faq"&gt;&lt;STRONG&gt;Step&amp;nbsp;2&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top" class="td_faq"&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__step_FDB29AD47844487692180F80BFA03C83" target="_blank"&gt;&lt;/A&gt; &lt;SPAN&gt;Click &lt;SPAN class="uicontrol"&gt;Compare Policies&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="7%" align="left" valign="top" class="td_faq"&gt;&lt;STRONG&gt;Step&amp;nbsp;3&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top" class="td_faq"&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__step_E6F0694903F24ED696471483470FABAA" target="_blank"&gt;&lt;/A&gt; &lt;SPAN&gt;From the &lt;SPAN class="uicontrol"&gt;Compare Against&lt;/SPAN&gt; drop-down list, choose the type of comparison you want to make: &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_BAEBB2E9D3E54239AF4BB2C01E5B3374" target="_blank"&gt;&lt;/A&gt;To compare two different policies, choose &lt;SPAN class="uicontrol"&gt;Other Policy&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_671E5A6DA9BE4D329CA88DA71A5849A6" target="_blank"&gt;&lt;/A&gt;To compare two revisions of the same policy, choose &lt;SPAN class="uicontrol"&gt;Other Revision&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_3AD8C4E62A43405E8B5CEEAB13228930" target="_blank"&gt;&lt;/A&gt;To compare another policy to the currently active policy, choose &lt;SPAN class="uicontrol"&gt;Running Configuration&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="7%" align="left" valign="top" class="td_faq"&gt;&lt;STRONG&gt;Step&amp;nbsp;4&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top" class="td_faq"&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__step_C4DE3061E7F74294BC4B8257012E9539" target="_blank"&gt;&lt;/A&gt; &lt;SPAN&gt;Depending on the comparison type you choose, you have the following choices: &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_53599156F25C4FEB854FC21A622B8589" target="_blank"&gt;&lt;/A&gt;If you are comparing two different policies, choose the policies you want to compare from the &lt;SPAN class="uicontrol"&gt;Policy A&lt;/SPAN&gt; and &lt;SPAN class="uicontrol"&gt;Policy B&lt;/SPAN&gt; drop-down lists.&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_7EB790D10C7E46B3821FC389FA27311A" target="_blank"&gt;&lt;/A&gt;If you are comparing the running configuration to another policy, choose the second policy from the &lt;SPAN class="uicontrol"&gt;Policy B&lt;/SPAN&gt; drop-down list.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="7%" align="left" valign="top" class="td_faq"&gt;&lt;STRONG&gt;Step&amp;nbsp;5&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top" class="td_faq"&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__step_B1E1C829926C4D01B000A80E128B38F3" target="_blank"&gt;&lt;/A&gt; &lt;SPAN&gt;Click &lt;SPAN class="uicontrol"&gt;OK&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="7%" align="left" valign="top" class="td_faq"&gt;&lt;STRONG&gt;Step&amp;nbsp;6&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top" class="td_faq"&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__step_0EE821EC416E42F28C19535CDDB7FA40" target="_blank"&gt;&lt;/A&gt; &lt;SPAN&gt;Review the comparison results: &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_EA82271A12734975968B4EC642D0614A" target="_blank"&gt;&lt;/A&gt;Comparison Viewer—To use the comparison viewer to navigate individually through policy differences, click &lt;SPAN class="uicontrol"&gt;Previous&lt;/SPAN&gt; or &lt;SPAN class="uicontrol"&gt;Next&lt;/SPAN&gt; above the title bar.&lt;/LI&gt;
&lt;LI&gt;&lt;A name="task_ABA1FE48DBBB44BC9FF40243FCC58BF6__choice_D73FBA03ECD042C8ABDA5DA1E9762062" target="_blank"&gt;&lt;/A&gt;
&lt;P&gt;Comparison Report—To generate a PDF report that lists the differences between the two policies, click &lt;SPAN class="uicontrol"&gt;Comparison Report&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 30 Oct 2017 12:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3207474#M1007007</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-30T12:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: Snort Restarts</title>
      <link>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3207875#M1007008</link>
      <description>&lt;P&gt;Compare is not availble for ACP, may be Cisco will include this in 6.3 code.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 01:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-snort-fail-open/m-p/3207875#M1007008</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-10-31T01:40:08Z</dc:date>
    </item>
  </channel>
</rss>

