<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The output will shows you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017598#M1008547</link>
    <description>&lt;P&gt;The output will shows you activities when firepower tries to connect to threadgrid and if connection is failure or success. Something like this in case of failure&lt;/P&gt;
&lt;PRE class="con-NoMargin hist-break-word prettyprint"&gt;* Recv failure: Connection reset by peer
* Closing connection 0&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN id="pgMain:mainpaneid"&gt;&lt;SPAN id="pgMain:historyid"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Jan 2017 05:47:26 GMT</pubDate>
    <dc:creator>Pranay Prasoon</dc:creator>
    <dc:date>2017-01-19T05:47:26Z</dc:date>
    <item>
      <title>Submit captured file for dynamic analysis</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017594#M1008543</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I got firepower management center virtual 6.0.1 ,&lt;/P&gt;
&lt;P&gt;and asa with firepower services 5555-x 6.0.0.1.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have malware license.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My question is - which device is submiting the unknown captured file to dynamic analysis (cisco sandbox in the cloud) and where the file is stored?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When I am trying to submit a file to dynamic analysis from the management center manualy, in the capture files analysis page, I see that the Dynamic Analysis Status is 'Device Not Activared'.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Another thing , which is very odd, I can see a Threat Score only for MSOLE2-Office Document.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am also attaching a screen shot of the management center.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017594#M1008543</guid>
      <dc:creator>Kfir Mesika</dc:creator>
      <dc:date>2019-03-12T13:15:30Z</dc:date>
    </item>
    <item>
      <title>In 6.x, ThreatGrid is used</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017595#M1008544</link>
      <description>&lt;P&gt;In 6.x, ThreatGrid is used for Dynamic Analysis:&lt;BR /&gt;&lt;BR /&gt;panacea.threatgrid.com&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Access is needed from both Firepower and Firesight to threadgrid so that the files are sent from Firepower for dynamic analysis. The Firesight Manager then queries the cloud for the results of that analysis so it can populate the database accordingly.&lt;BR /&gt;&lt;BR /&gt;Please make sure firepower can connect to this, you can check this by going to the CLI of the SFR module on your active ASA and from the expert,issue the following command &lt;BR /&gt;&lt;BR /&gt;sudo curl -v panacea.threatgrid.com:443&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 17:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017595#M1008544</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-18T17:25:09Z</dc:date>
    </item>
    <item>
      <title>Thank you very much, I will</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017596#M1008545</link>
      <description>&lt;P&gt;Thank you very much, I will check and update you if the status of dynamic analysis wont be Device not Activated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In addition, I'm trying to enable in the Network Analysis Policy the Rate-Based prevention&amp;nbsp;For simultaneous connection. I want to protect my internal web server from ddos attack, so i configured it for destination rate-based protection and I did not checked the drop option in order to check the operation of this configuration.&lt;/P&gt;
&lt;P&gt;From cisco documentation what i understand is that it will block attacks per source ip individualy.&lt;/P&gt;
&lt;P&gt;I did not enabled the GID"135" from the intrusion policy.&lt;/P&gt;
&lt;P&gt;In the intrusion events we could see alot of events from that rate-based singature.&lt;/P&gt;
&lt;P&gt;One time the rate-based blocked one IP address even though I did not checked the drop option.&lt;/P&gt;
&lt;P&gt;The block event happend for traffic that matched a rule with 'drop when inline' intrusion policy. - I dont know if it is related.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Maybe you can explain to me how to configure it correctly and what are the effects of each configuration?&lt;/P&gt;
&lt;P&gt;One more question - why in the rate based you can only configure how many connections but you do not have the option to configure the time interval?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for the help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 20:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017596#M1008545</guid>
      <dc:creator>Kfir Mesika</dc:creator>
      <dc:date>2017-01-18T20:34:19Z</dc:date>
    </item>
    <item>
      <title>What is the correct output</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017597#M1008546</link>
      <description>&lt;P&gt;What is the correct output that i should see from the command:&lt;/P&gt;
&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;
&lt;DIV class="field-items"&gt;
&lt;DIV class="field-item even" property="content:encoded"&gt;
&lt;P&gt;sudo curl -v panacea.threatgrid.com:443 &amp;nbsp;?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="answer-actions"&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 18 Jan 2017 20:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017597#M1008546</guid>
      <dc:creator>Kfir Mesika</dc:creator>
      <dc:date>2017-01-18T20:40:18Z</dc:date>
    </item>
    <item>
      <title>The output will shows you</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017598#M1008547</link>
      <description>&lt;P&gt;The output will shows you activities when firepower tries to connect to threadgrid and if connection is failure or success. Something like this in case of failure&lt;/P&gt;
&lt;PRE class="con-NoMargin hist-break-word prettyprint"&gt;* Recv failure: Connection reset by peer
* Closing connection 0&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN id="pgMain:mainpaneid"&gt;&lt;SPAN id="pgMain:historyid"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 05:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017598#M1008547</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-19T05:47:26Z</dc:date>
    </item>
    <item>
      <title>* Rebuilt URL to: panacea</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017599#M1008548</link>
      <description>&lt;P&gt;* Rebuilt URL to: panacea.threatgrid.com:443/&lt;BR /&gt;* Trying 199.36.143.68...&lt;BR /&gt;* Connected to panacea.threatgrid.com (199.36.143.68) port 443 (#0)&lt;BR /&gt;&amp;gt; GET / HTTP/1.1&lt;BR /&gt;&amp;gt; Host: panacea.threatgrid.com:443&lt;BR /&gt;&amp;gt; User-Agent: curl/7.42.1&lt;BR /&gt;&amp;gt; Accept: */*&lt;BR /&gt;&amp;gt; &lt;BR /&gt;&amp;lt; HTTP/1.1 400 Bad Request&lt;BR /&gt;&amp;lt; Server: nginx/1.10.0 (Ubuntu)&lt;BR /&gt;&amp;lt; Date: Thu, 19 Jan 2017 06:48:39 GMT&lt;BR /&gt;&amp;lt; Content-Type: text/html&lt;BR /&gt;&amp;lt; Content-Length: 280&lt;BR /&gt;&amp;lt; Connection: close&lt;BR /&gt;&amp;lt; &lt;BR /&gt;&amp;lt;html&amp;gt;&lt;BR /&gt;&amp;lt;head&amp;gt;&amp;lt;title&amp;gt;400 The plain HTTP request was sent to HTTPS port&amp;lt;/title&amp;gt;&amp;lt;/head&amp;gt;&lt;BR /&gt;&amp;lt;body bgcolor="white"&amp;gt;&lt;BR /&gt;&amp;lt;center&amp;gt;&amp;lt;h1&amp;gt;400 Bad Request&amp;lt;/h1&amp;gt;&amp;lt;/center&amp;gt;&lt;BR /&gt;&amp;lt;center&amp;gt;The plain HTTP request was sent to HTTPS port&amp;lt;/center&amp;gt;&lt;BR /&gt;&amp;lt;hr&amp;gt;&amp;lt;center&amp;gt;nginx/1.10.0 (Ubuntu)&amp;lt;/center&amp;gt;&lt;BR /&gt;&amp;lt;/body&amp;gt;&lt;BR /&gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;* Closing connection 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is this ok?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 06:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017599#M1008548</guid>
      <dc:creator>Kfir Mesika</dc:creator>
      <dc:date>2017-01-19T06:49:17Z</dc:date>
    </item>
    <item>
      <title>yes, it can connect. Can you</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017600#M1008549</link>
      <description>&lt;P&gt;yes, it can connect.&amp;nbsp; You did the test on firepower module or FMC?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 06:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017600#M1008549</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-01-19T06:56:18Z</dc:date>
    </item>
    <item>
      <title>Not yet, I will test it next</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017601#M1008550</link>
      <description>&lt;P&gt;Not yet, I will test it next week.&lt;/P&gt;
&lt;P&gt;I will update you/&lt;/P&gt;
&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 07:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3017601#M1008550</guid>
      <dc:creator>Kfir Mesika</dc:creator>
      <dc:date>2017-01-19T07:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: yes, it can connect. Can you</title>
      <link>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3335308#M1008551</link>
      <description>&lt;P&gt;I have the same issue.&amp;nbsp; I have the same result from the curl command.&amp;nbsp; From the Dynamic Analysis Status I see a "Device Not Activated" when I try to analyze the file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;admin@cisco-fmc:~$ sudo curl -v panacea.threatgrid.com:443&lt;BR /&gt;Password:&lt;BR /&gt;* Rebuilt URL to: panacea.threatgrid.com:443/&lt;BR /&gt;*&amp;nbsp;&amp;nbsp; Trying 4.14.36.148...&lt;BR /&gt;* Connected to panacea.threatgrid.com (4.14.36.148) port 443 (#0)&lt;BR /&gt;&amp;gt; GET / HTTP/1.1&lt;BR /&gt;&amp;gt; Host: panacea.threatgrid.com:443&lt;BR /&gt;&amp;gt; User-Agent: curl/7.48.0&lt;BR /&gt;&amp;gt; Accept: */*&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;lt; HTTP/1.1 400 Bad Request&lt;BR /&gt;&amp;lt; Server: nginx/1.10.0 (Ubuntu)&lt;BR /&gt;&amp;lt; Date: Wed, 21 Feb 2018 16:49:55 GMT&lt;BR /&gt;&amp;lt; Content-Type: text/html&lt;BR /&gt;&amp;lt; Content-Length: 280&lt;BR /&gt;&amp;lt; Connection: close&lt;BR /&gt;&amp;lt;&lt;BR /&gt;&amp;lt;html&amp;gt;&lt;BR /&gt;&amp;lt;head&amp;gt;&amp;lt;title&amp;gt;400 The plain HTTP request was sent to HTTPS port&amp;lt;/title&amp;gt;&amp;lt;/head&amp;gt;&lt;BR /&gt;&amp;lt;body bgcolor="white"&amp;gt;&lt;BR /&gt;&amp;lt;center&amp;gt;&amp;lt;h1&amp;gt;400 Bad Request&amp;lt;/h1&amp;gt;&amp;lt;/center&amp;gt;&lt;BR /&gt;&amp;lt;center&amp;gt;The plain HTTP request was sent to HTTPS port&amp;lt;/center&amp;gt;&lt;BR /&gt;&amp;lt;hr&amp;gt;&amp;lt;center&amp;gt;nginx/1.10.0 (Ubuntu)&amp;lt;/center&amp;gt;&lt;BR /&gt;&amp;lt;/body&amp;gt;&lt;BR /&gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;* Closing connection 0&lt;BR /&gt;admin@cisco-fmc:~$&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 17:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/submit-captured-file-for-dynamic-analysis/m-p/3335308#M1008551</guid>
      <dc:creator>mdieken011</dc:creator>
      <dc:date>2018-02-21T17:32:44Z</dc:date>
    </item>
  </channel>
</rss>

