<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Examples of creating custom network analysis rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932096#M1029188</link>
    <description>&lt;P&gt;Does anyone have any examples of custom network analysis&amp;nbsp;rules (advanced section of Access control policy). I have tuned the NA policy based on reassembly and fragmentation but I am trying to imagine a scenario where you would need&amp;nbsp;a custom na rule. Please include pics if you can.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 13:11:14 GMT</pubDate>
    <dc:creator>babiojd01</dc:creator>
    <dc:date>2019-03-12T13:11:14Z</dc:date>
    <item>
      <title>Examples of creating custom network analysis rules</title>
      <link>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932096#M1029188</link>
      <description>&lt;P&gt;Does anyone have any examples of custom network analysis&amp;nbsp;rules (advanced section of Access control policy). I have tuned the NA policy based on reassembly and fragmentation but I am trying to imagine a scenario where you would need&amp;nbsp;a custom na rule. Please include pics if you can.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932096#M1029188</guid>
      <dc:creator>babiojd01</dc:creator>
      <dc:date>2019-03-12T13:11:14Z</dc:date>
    </item>
    <item>
      <title>In case you want to tweak</title>
      <link>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932097#M1029189</link>
      <description>&lt;P&gt;In case you want to tweak specific settings for performance/security it does make sense to create a network analysis policy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For example you could ignore ftp transfers to improve performance on ftp data transfers,&amp;nbsp;specify the HTTP methods you wish to inspect using the http pre-processor or enable event triggers for tcp session hijacking etc.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It really depends on what you want to achieve but normally you do not &amp;nbsp;need to edit these settings, just keep them in mind in case you find a corner-case that needs specific tweaks to how traffic is handled.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2016 19:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932097#M1029189</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-11-02T19:20:51Z</dc:date>
    </item>
    <item>
      <title>Yea i agree but in my case i</title>
      <link>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932098#M1029190</link>
      <description>&lt;P&gt;Yea i agree but in my case i have linux servers behind the same IPS. I would edit the reassembly part of the policy and specify the ip address and linux. Same with the fragmentation section.The part i am curious about is creating a special rule in the advanced section of a access control policy. I would be interested to see an example in a scenario where you need custom rules.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/customna.png" class="migrated-markup-image" /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2016 22:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932098#M1029190</guid>
      <dc:creator>babiojd01</dc:creator>
      <dc:date>2016-11-02T22:25:27Z</dc:date>
    </item>
    <item>
      <title>I would consider custom rules</title>
      <link>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932099#M1029191</link>
      <description>&lt;P&gt;I would consider custom rules the equivalent of modular policy framework on asa side. You may change certain processing parameters based on an acl. For example if you do not wish to change network analysis settings globally, you could use a specific custom rule so it only affects certain traffic, you want to treat differently and everything else will be processed using the default rule.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2016 22:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/examples-of-creating-custom-network-analysis-rules/m-p/2932099#M1029191</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-11-02T22:35:33Z</dc:date>
    </item>
  </channel>
</rss>

