<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If I recall correctly the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074034#M1007329</link>
    <description>&lt;P&gt;The feeds are installed in a couple of files under &lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri',sans-serif;"&gt;/var/sf/iprep_download&lt;/SPAN&gt;. While you can look at them manually, they are updated throughout the day and any manual process would be quickly overwhelmed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might find it easier to just watch connection events for all "Blocked" actions and go from there. If you find a false positive you can whitelist it and report the error to Cisco. For what it's worth I've not had that be a problem in the couple dozen installations I've worked with.&lt;/P&gt;</description>
    <pubDate>Sun, 19 Mar 2017 08:07:27 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-03-19T08:07:27Z</dc:date>
    <item>
      <title>how to view the Security Intelligence feeds</title>
      <link>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074033#M1007328</link>
      <description>&lt;P&gt;Hi Team,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are planning to deploy the security intelligence feeds into the firewall policy. But is there a way we can see the list of IP's in the list to ensure benign IP's are not being blocked.&lt;/P&gt;
&lt;P&gt;Is there a way we can export the SI feeds into a CSV &amp;amp; manually assess the IP's using open source tools ?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074033#M1007328</guid>
      <dc:creator>vaibhav.parlekar1</dc:creator>
      <dc:date>2019-03-12T13:19:56Z</dc:date>
    </item>
    <item>
      <title>If I recall correctly the</title>
      <link>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074034#M1007329</link>
      <description>&lt;P&gt;The feeds are installed in a couple of files under &lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri',sans-serif;"&gt;/var/sf/iprep_download&lt;/SPAN&gt;. While you can look at them manually, they are updated throughout the day and any manual process would be quickly overwhelmed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might find it easier to just watch connection events for all "Blocked" actions and go from there. If you find a false positive you can whitelist it and report the error to Cisco. For what it's worth I've not had that be a problem in the couple dozen installations I've worked with.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2017 08:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074034#M1007329</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-19T08:07:27Z</dc:date>
    </item>
    <item>
      <title>As Marvin said your only</title>
      <link>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074035#M1007330</link>
      <description>&lt;P&gt;As Marvin said your only option would be checking the files at&amp;nbsp;&lt;SPAN&gt;/var/sf/iprep_download. If you want to check the feeds against some other list or check occurrences&amp;nbsp;I would recommend using cron to copy them using scp. Then use whatever you like to analyse the data.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2017 14:27:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074035#M1007330</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2017-03-24T14:27:35Z</dc:date>
    </item>
    <item>
      <title>Is there a Cli guide for the</title>
      <link>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074036#M1007331</link>
      <description>&lt;P&gt;Is there a Cli guide for the FMC to use these commands. I am having a hard time working on the FMC Cli especially since it only supports a linux shell with no help available for commands. The FTD Cli guide is pretty helpful.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 22:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074036#M1007331</guid>
      <dc:creator>vaibhav.parlekar1</dc:creator>
      <dc:date>2017-03-27T22:48:43Z</dc:date>
    </item>
    <item>
      <title>The FMC command line is not</title>
      <link>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074037#M1007332</link>
      <description>&lt;P&gt;The FMC command line is not something Cisco encourages accessing outside the few basic things they document in a couple of tech notes and troubleshooting documents.&lt;/P&gt;
&lt;P&gt;As you noted it's a raw Linux bash shell and one can quite easily make a mistake there that has severe consequences for the overall system.&lt;/P&gt;
&lt;P&gt;If you're not comfortable with basic Linux commands, I recommend opening a TAC case when you have any issues under the hood of the FMC. I have found the team that handles FirePOWER-related issues to be quite knowledgable and helpful.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 02:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-view-the-security-intelligence-feeds/m-p/3074037#M1007332</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-28T02:44:41Z</dc:date>
    </item>
  </channel>
</rss>

