<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Network Discovery Rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763912#M1012084</link>
    <description>&lt;P&gt;Sorry I meant block all as my default action. That packet flow makes sense and answers my question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Dec 2018 17:35:38 GMT</pubDate>
    <dc:creator>dm2020</dc:creator>
    <dc:date>2018-12-14T17:35:38Z</dc:date>
    <item>
      <title>Network Discovery Rules</title>
      <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3761831#M1012079</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have setup a Network Discovery policy to discovery users, host and application for my internal network address range only. Do I now need to create a monitor rule in my ACP for Network Discovery to work correctly, such as permitting all IP traffic from my internal network and setting to monitor, or will it work ok for traffic that I have simply permitted in my rules? I understand that Network Discovery will not match traffic that has been blocked (which is my default rule). Is that correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry if this is a simple question but I'm not sure what the correct approach is to ensure that FMC discovers all of my network assets correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:10:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3761831#M1012079</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2019-03-12T14:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: Network Discovery Rules</title>
      <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3761834#M1012080</link>
      <description>Hi Ciscogeek2017&lt;BR /&gt;&lt;BR /&gt;The Network Discovery function works based on traffic the managed device&lt;BR /&gt;has visibility; so no ACP rule is required.&lt;BR /&gt;&lt;BR /&gt;For example, if you left the default 0.0.0.0/0 rule in, you will get host&lt;BR /&gt;intelligence for external objects that probably aren't configured&lt;BR /&gt;explicitly in an ACP rule.&lt;BR /&gt;&lt;BR /&gt;You can limit what IP ranges are scanned using the exclusion config box.&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Dec 2018 09:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3761834#M1012080</guid>
      <dc:creator>phil.hydea</dc:creator>
      <dc:date>2018-12-12T09:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Network Discovery Rules</title>
      <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3762250#M1012081</link>
      <description>&lt;P&gt;as Phil said, instead of 0.0.0.0 will build and consume all your host limit (by default the limit is 50,000 host)&lt;/P&gt;&lt;P&gt;once you put your interested network to discover than you can build up your security policy ACP, NAP, Intrustion prevision etc.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;remember discovery is the first step/stage to build up your network security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;once your discovery policy in action (also remember discovery policy is a passive) you will see the host (windows,linux etc) with vulnerability (for example FMC learn about windows-7 server pack1) it will give you what vulnerability with server pack 1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope that help you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 18:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3762250#M1012081</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-12T18:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: Network Discovery Rules</title>
      <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763858#M1012082</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You mention that&amp;nbsp;&lt;SPAN&gt;Network Discovery function works based on traffic the managed device&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;has visibility of, so what if the managed device is configured to block all traffic? Will it still have visibility or does traffic need to be permitted though the device using a ACP permit rule for this to work?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 16:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763858#M1012082</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2018-12-14T16:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Network Discovery Rules</title>
      <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763904#M1012083</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;why you want to block all the traffic? any reason?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;if your ACP is setup as block than it will come to decision on default policy (if you have default policy also has block setup) in that case all communication will be drop and you have no connection to FTD/ASA and this also apply to other network internal network/DMZ network. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;see the attachment of the pack flow in firepower.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 17:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763904#M1012083</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-14T17:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Network Discovery Rules</title>
      <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763912#M1012084</link>
      <description>&lt;P&gt;Sorry I meant block all as my default action. That packet flow makes sense and answers my question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 17:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763912#M1012084</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2018-12-14T17:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Network Discovery Rules</title>
      <link>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763920#M1012085</link>
      <description>&lt;P&gt;Thank glad i was help you.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 17:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-discovery-rules/m-p/3763920#M1012085</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-14T17:38:19Z</dc:date>
    </item>
  </channel>
</rss>

