<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have used &amp;quot;Balanced in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074723#M1015654</link>
    <description>&lt;P&gt;I have used "&lt;SPAN&gt;Balanced Security and Connectivity" only and I have still faced that problem.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;In order avoid complete exclusion of monitoring system's IP, I have excluded only icmp related to the monitoring host.&lt;/P&gt;
&lt;P&gt;In this way, I am still protecting monitoring host i.e. its traffic.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list acl_sfr_traffic extended deny icmp object PRTG any &lt;BR /&gt;access-list acl_sfr_traffic extended deny icmp any object PRTG &lt;BR /&gt;access-list acl_sfr_traffic extended permit ip any any&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Jun 2017 11:51:01 GMT</pubDate>
    <dc:creator />
    <dc:date>2017-06-30T11:51:01Z</dc:date>
    <item>
      <title>How to exclude network monitoring system IP in SFR configuration/rules?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074716#M1015636</link>
      <description>&lt;P&gt;Hello experts,&lt;/P&gt;
&lt;P&gt;We have a network monitoring system (PRTG) in our network, which is using pings and other protocols to check some external IPs.&lt;/P&gt;
&lt;P&gt;Till now, we have used FirePower module in monitor mode only. As soon as we try to pass traffic to SFR module, SFR module blocks some (not all) connections from monitoring system. Following could be seen in ASDM log:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;4 May 10 2017 13:03:24 434002 &amp;nbsp;SFR requested to drop ICMP packet from inside:10.x.x.x/2048 to outside:196.x.x.x/0&lt;BR /&gt;4 May 10 2017 13:03:25&amp;nbsp; 434002 &amp;nbsp;SFR requested to drop ICMP packet from inside:10.x.x.x/2048 to outside:77.x.x.x/0&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;Environment:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Cisco ASA 5516 &amp;nbsp;(9.6.1)&lt;/LI&gt;
&lt;LI&gt;SFR module 6.2.0.1&lt;/LI&gt;
&lt;LI&gt;Firepower Center 6.2.0.1&lt;/LI&gt;
&lt;LI&gt;Firepower Center policy: We have configured Allow action in the first rule in Access Control policy to allow ICMP Application (without Intrusion policy).&lt;/LI&gt;
&lt;LI&gt;Logging is turned on for all rules (including Default action), however we cannot see any related Blocked log message in FirePower Center. Apparently there are some mechanisms which are in place which blocks our monitoring system, which I cannot find it.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How/where (in FirePower config) we can exclude our network monitoring system from being blocked?&lt;/LI&gt;
&lt;LI&gt;How to turn additional logging/debugging in FirePower center so to be able to see and trace such blocked connections?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;/P&gt;
&lt;P&gt;Igor VITORAC&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074716#M1015636</guid>
      <dc:creator />
      <dc:date>2019-03-12T13:23:46Z</dc:date>
    </item>
    <item>
      <title>Igor,</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074717#M1015640</link>
      <description>&lt;P&gt;Igor,&lt;/P&gt;
&lt;P&gt;The method you have tried would appear to be correct. It's odd the the policy is causing a block action. Did you check both Connection events and Security Intelligence events in your FirePOWER Management Center to look for the block actions?&lt;/P&gt;
&lt;P&gt;As a work around, you could simply modify your access-list referenced in the ASA class-map to not send the PRTG traffic to FirePOWER for inspection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might also try putting an "allow PRTG-any" ACP rule into FirePOWER to see if that changes the behavior at all.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 13:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074717#M1015640</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-12T13:20:41Z</dc:date>
    </item>
    <item>
      <title>Thank you for the reply.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074718#M1015644</link>
      <description>&lt;P&gt;Thank you for the reply.&lt;/P&gt;
&lt;P&gt;I have tried again and nothing related to the IP of the PRTG&amp;nbsp;IP in the&amp;nbsp;Connection events and Security Intelligence events.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have tried to put&amp;nbsp;allow PRTG any ACP rule into FirePOWER (and re-deployed new policy), and I still receive in ASDM log:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="lit"&gt;34002&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &amp;nbsp;SFR requested to drop ICMP packet &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;from&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; inside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;:&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;10.x&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;x&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;x&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;/&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;2048&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; to outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;:&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;196.x&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;x&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;x&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;/&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;0&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;but without anything in the FirePower events.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The workaround with ACL that excludes PRTG IP is working but in that case nothing is inspected related to PRTG host.&lt;/P&gt;
&lt;P&gt;I have impression that it is somehow related to detection of&amp;nbsp;Rate-Based Attack Prevention:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/detecting_specific_threats.html&lt;/P&gt;
&lt;P&gt;I've tried to make my custom Network Analysis Policy (and linked to Access Policy) where I can exclude PRTG host from port scanning and rate-based attach prevention, but it did not help. Seems that SFR is doing rate-based detection on its own and perform actions on its own without possibility to affect its behavior.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;/P&gt;
&lt;P&gt;Igor Vitorac&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 14:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074718#M1015644</guid>
      <dc:creator />
      <dc:date>2017-05-12T14:33:58Z</dc:date>
    </item>
    <item>
      <title>Your thought are along the</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074719#M1015647</link>
      <description>&lt;P&gt;Your thought are along the same lines as mine. I also thought about a prefilter policy but that would have the same effect as excluding it in the ASA ACL.&lt;/P&gt;
&lt;P&gt;Perhaps TAC would be able to figure out why the Network Analysis Policy isn't working as intended.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 15:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074719#M1015647</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-12T15:00:17Z</dc:date>
    </item>
    <item>
      <title>Any news on this topic? It</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074720#M1015650</link>
      <description>&lt;P&gt;Any news on this topic? It looks like I'm running into the same problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Fixed it by changing the Default Network Analysis policy to "Balanced Security and Connectivity", but this is not a real fix.&lt;/P&gt;
&lt;P&gt;Just wondering if there was a real solution?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2017 13:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074720#M1015650</guid>
      <dc:creator />
      <dc:date>2017-06-26T13:25:53Z</dc:date>
    </item>
    <item>
      <title>Did you use Security over</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074721#M1015652</link>
      <description>&lt;P&gt;Did you use Security over Connectivity before this?&lt;/P&gt;
&lt;P&gt;You should take notes of what changes, when you choose a new Network Analysis Policy, to learn why it is behaving like this. I figure it is "normalisation".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 17:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074721#M1015652</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2017-06-27T17:53:33Z</dc:date>
    </item>
    <item>
      <title>Yes I used Security over</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074722#M1015653</link>
      <description>&lt;P&gt;Yes I used&amp;nbsp;&lt;SPAN&gt;Security over Connectivity.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I ran a compare between the two Nework Analysis Policies and I think it has something to do with&amp;nbsp;Consecutive Small Segments.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Didn't test this yet, but I found this article and hoped that there were some&amp;nbsp;results.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2017 06:51:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074722#M1015653</guid>
      <dc:creator />
      <dc:date>2017-06-28T06:51:15Z</dc:date>
    </item>
    <item>
      <title>I have used "Balanced</title>
      <link>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074723#M1015654</link>
      <description>&lt;P&gt;I have used "&lt;SPAN&gt;Balanced Security and Connectivity" only and I have still faced that problem.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;In order avoid complete exclusion of monitoring system's IP, I have excluded only icmp related to the monitoring host.&lt;/P&gt;
&lt;P&gt;In this way, I am still protecting monitoring host i.e. its traffic.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list acl_sfr_traffic extended deny icmp object PRTG any &lt;BR /&gt;access-list acl_sfr_traffic extended deny icmp any object PRTG &lt;BR /&gt;access-list acl_sfr_traffic extended permit ip any any&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2017 11:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-exclude-network-monitoring-system-ip-in-sfr-configuration/m-p/3074723#M1015654</guid>
      <dc:creator />
      <dc:date>2017-06-30T11:51:01Z</dc:date>
    </item>
  </channel>
</rss>

