<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower ACP Oddness in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761547#M1012158</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've run a packet trace and it does show it as blocked - Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also if I change the rules to use ports instead of application then the firewall engine debug does report the traffic as denied by firewall and not pass which is what I would expect. Is there any reason for the application inspection to behave like this? Should I be using ports instead of applications in my rules?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Tue, 11 Dec 2018 20:22:36 GMT</pubDate>
    <dc:creator>dm2020</dc:creator>
    <dc:date>2018-12-11T20:22:36Z</dc:date>
    <item>
      <title>Firepower ACP Oddness</title>
      <link>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761175#M1012153</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an issue with a small Firepower deployment. I have a single FTD 2210 appliance that has a simple ACP applied that permits outbound ICMP, DNS and HTTPs traffic using application rules. See attached screenshot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This works ok, however, if I attempt to telnet test to an external IP address on port 3001, which is not permitted by any rules, the firewall-engine-debug appears to match against the 'Permit ICMP' rule with a verdict of pass. I was hoping to see this as a deny so its clear that its being denied by the firewall. Is this a known issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10.1.11.13-62684 - 6.6.6.6-3001 6 Packet: TCP, SYN, seq 3358167107&lt;BR /&gt;10.1.11.13-62684 - 6.6.6.6-3001 6 AppID: service unknown (0), application unknown (0)&lt;BR /&gt;10.1.11.13-62684 &amp;gt; 6.6.6.6-3001 6 AS 1 I 1 Starting with minimum 2, 'Permit ICMP', and SrcZone first with zones 2 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, inline sgt tag: untagged, ISE sgt id: 0, svc 0, payload 0, client 0, misc 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;10.1.11.13-62684 &amp;gt; 6.6.6.6-3001 6 AS 1 I 1 pending rule order 2, 'Permit ICMP', AppID&lt;BR /&gt;10.1.11.13-62684 &amp;gt; 6.6.6.6-3001 6 Firewall: pending rule-matching, 'Permit ICMP', pending AppID&lt;BR /&gt;10.1.11.13-62684 &amp;gt; 6.6.6.6-3001 6 Snort id 1, NAP id 1, IPS id 0, Verdict PASS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761175#M1012153</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2019-03-12T14:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower ACP Oddness</title>
      <link>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761493#M1012156</link>
      <description>Hi,&lt;BR /&gt;Do a packet tracer from FTD and see if that is allowing or not. As per your acp rules ICMP,HTTPS &amp;amp; DNS are only allowed. &lt;BR /&gt;One more suggestion instead of application enter the destination port and do a firewall engine debug, i think that will get block.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Abheesh</description>
      <pubDate>Tue, 11 Dec 2018 18:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761493#M1012156</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-12-11T18:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower ACP Oddness</title>
      <link>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761547#M1012158</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've run a packet trace and it does show it as blocked - Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also if I change the rules to use ports instead of application then the firewall engine debug does report the traffic as denied by firewall and not pass which is what I would expect. Is there any reason for the application inspection to behave like this? Should I be using ports instead of applications in my rules?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 20:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761547#M1012158</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2018-12-11T20:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower ACP Oddness</title>
      <link>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761579#M1012159</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;We have similar kind of issue of TOR connection and opened a ticket with cisco. As per TAC, to identify applications FTD will allow few packets to pass through to look the application payload to detect the application. I think that's why in debug it shows allow. Better do create rule with ports that will be works perfect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope This Helps&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 21:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761579#M1012159</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-12-11T21:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower ACP Oddness</title>
      <link>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761798#M1012162</link>
      <description>&lt;P&gt;Ok that makes sense. Thank you for the reply, very helpful&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 09:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-acp-oddness/m-p/3761798#M1012162</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2018-12-12T09:04:18Z</dc:date>
    </item>
  </channel>
</rss>

