<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Rule Design / Ordering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787331#M1011092</link>
    <description>&lt;P&gt;Yeah, i also prefer 1 in most situations, as an example on datacenter firewalls with 100s of interfaces etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Old School ASA design&amp;nbsp;is still the most favorable, I've also tried to use the new zone feature and created rules which hold multiple source and destination zones etc. but this ended up in a huge mess. This only looks good on marketing slides, but is not really transparent and easy to understand, especially when having a helpdesk behind which only casually takes a look at the system for creating new rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lukas&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jan 2019 14:53:55 GMT</pubDate>
    <dc:creator>Futuristc</dc:creator>
    <dc:date>2019-01-24T14:53:55Z</dc:date>
    <item>
      <title>Firepower Rule Design / Ordering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787248#M1011080</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to know how you guys order and design the FMC Access Control Rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sadly the FMC is not really optimized for a lot of rules, compared to the ASDM or FortiNet etc.. Its really painful in my opinion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently I've went with 2 strategies:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;U&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;U&gt;One Access Control Policy, seperated with Categories for each interface/zone&lt;/U&gt;:&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can compare this setup with the ASA / ASDM, the source zone of the rule defines the categorie. In this setup multiple source zones arent meant to happen.&lt;/P&gt;
&lt;P&gt;I use the default and mandatory category for seperating rules like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;network -&amp;gt; network = &lt;U&gt;default&lt;/U&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;network -&amp;gt; host = &lt;U&gt;mandatory&lt;/U&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;host -&amp;gt; network = &lt;U&gt;mandatory&lt;/U&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;host -&amp;gt; host = &lt;U&gt;mandatory&lt;/U&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this way I cant masquerade host rules, with network rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Mandatory category&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; -&amp;gt; custom category:&amp;nbsp;&lt;FONT size="3"&gt;Inside-Mandatory or Inside-Hosts&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT size="3"&gt; -&amp;gt; sz: inside-zone -&amp;gt; dz: dmz-zone -&amp;gt; sIP: inside host -&amp;gt; dIP: dmz network -&amp;gt; port 443&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; -&amp;gt; custom category: dmz-Mandatory or dmz-Hosts&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT size="3"&gt;-&amp;gt; sz: dmz-zone -&amp;gt; dz: outside-zone and mpls zone -&amp;gt; sIP: dmz host -&amp;gt; dIP: any and mpls locations -&amp;gt; port 443&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Default category&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; -&amp;gt; custom category: Inside or Inside-Network&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;-&amp;gt; sz: inside-zone -&amp;gt; dz: dmz-zone -&amp;gt; sIP: inside network -&amp;gt; dIP: dmz network -&amp;gt; ICMP&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;2.&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;One Access Control Policy per zone with inheritation&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;With this option there is one base ACP and then i create&amp;nbsp;1 ACP for each zone and use the inherit feature. I bind the last ACP to the device and then the inherit feature takes care of the rest. Just like the first design I use categories for each source zone, but with this design only the rules i wanna see are being extended and the other rules will be minimized.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;This design doesnt scale well with many Interfaces though. But the rule are more transparent and doesnt look like a huge mess.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;ACP:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Base ACP&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp;-&amp;gt; Inside Zone ACP&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;FONT size="3"&gt;mandatory category&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&amp;nbsp;-&amp;gt; &lt;/STRONG&gt;sz: inside-zone -&amp;gt; dz: dmz-zone -&amp;gt; sIP: inside host -&amp;gt; dIP: dmz network -&amp;gt; port 443&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;default category&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;-&amp;gt; &lt;/STRONG&gt;sz: inside-zone -&amp;gt; dz: dmz-zone -&amp;gt; sIP: inside network -&amp;gt; dIP: dmz network -&amp;gt; ICMP&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;-&amp;gt; DMZ Zone ACP&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;FONT size="3"&gt;mandatory category&amp;nbsp;-&amp;gt; &lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT size="3"&gt;sz: dmz-zone -&amp;gt; dz: outside-zone and mpls zone -&amp;gt; sIP: dmz host -&amp;gt; dIP: public-any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and mpls locations -&amp;gt; port 22&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;default category-&amp;gt; &lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT size="3"&gt;sz: dmz-zone -&amp;gt; dz: outside-zone -&amp;gt; sIP: dmz network -&amp;gt; dIP: public-any -&amp;gt; 443&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;-&amp;gt; Outside Zone ACP&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;-&amp;gt; DMZ-Web Zone&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;FONT size="3"&gt;Basically these 2 designs all use the old ASDM / ASA scheme, on dCloud Cisco also creates ACP for Services, e.g. SSH or Web. But this is good for couple of rules, but soon as you hit 200 or more rules, nobody will ever really find this useful anymore, since you spend more time searching for rules and where to place them, than really creating rules.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;FONT size="3"&gt;What do you think about these 2 designs?&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;FONT size="3"&gt;Kind regards&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;FONT size="3"&gt;Lukas&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787248#M1011080</guid>
      <dc:creator>Futuristc</dc:creator>
      <dc:date>2019-03-12T14:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Design / Ordering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787255#M1011083</link>
      <description>&lt;P&gt;to be honest it really depends what you after/what you want to achieve. having said that, looking at your rules example its all upto you how to want to implement and how comfortable are you to deal with this in case some thing is not working and to do a tshoot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;personally, i would go for the 1 strategies, as you will acheive same from the rule 2 but again its going up and down. make the rules simplified so you can deal it easily don't do so complex that you struggle with. this is my input.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just make sure you have a intrusion policy in place with your interested subset/file policy etc. also i wanted to add the way i do the ACP is i put block rule on top than permit rule under block., also you need to understand the flow of SFR packet flow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is a useful diagram for you&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acp_policy.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/28644iB08A4059806E4A7B/image-size/large?v=v2&amp;amp;px=999" role="button" title="acp_policy.PNG" alt="acp_policy.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 14:06:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787255#M1011083</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-24T14:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Design / Ordering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787309#M1011086</link>
      <description>&lt;P&gt;Thanks for your input!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So you would go with design 1? Or do you have other preferences? I'm always looking for newer and better solutions, also cherry picking some features or designparts &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lukas&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 14:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787309#M1011086</guid>
      <dc:creator>Futuristc</dc:creator>
      <dc:date>2019-01-24T14:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Design / Ordering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787317#M1011091</link>
      <description>&lt;P&gt;I would go for design 1. however, take the route which ever suit you. as you are a cherry picker and i am old school. I like to do things simple (so in design 1 i shall build my all ACP policy) so i can tshoot in case i need to :).&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 14:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787317#M1011091</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-24T14:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Design / Ordering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787331#M1011092</link>
      <description>&lt;P&gt;Yeah, i also prefer 1 in most situations, as an example on datacenter firewalls with 100s of interfaces etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Old School ASA design&amp;nbsp;is still the most favorable, I've also tried to use the new zone feature and created rules which hold multiple source and destination zones etc. but this ended up in a huge mess. This only looks good on marketing slides, but is not really transparent and easy to understand, especially when having a helpdesk behind which only casually takes a look at the system for creating new rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lukas&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 14:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787331#M1011092</guid>
      <dc:creator>Futuristc</dc:creator>
      <dc:date>2019-01-24T14:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Design / Ordering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787340#M1011093</link>
      <description>&lt;P&gt;I do agree with you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you think i am helpful kindly please do not forget this to mark as answered so other can benefit too.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 14:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-design-ordering/m-p/3787340#M1011093</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-24T14:59:31Z</dc:date>
    </item>
  </channel>
</rss>

