<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Jack, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905701#M1031285</link>
    <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes you are right , Firepower will drop the packet if its blocked by firepower rule.&lt;/P&gt;
&lt;P&gt;You have created all block rule and allowed only http etc. , There are apps which use HTTP for torrent. I suggest to create another block rule on top of allow rule matching the app detector for torrent.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Apr 2016 16:58:17 GMT</pubDate>
    <dc:creator>yogdhanu</dc:creator>
    <dc:date>2016-04-11T16:58:17Z</dc:date>
    <item>
      <title>Access Control Policies</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905698#M1031274</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;Please find the attached&lt;/P&gt;
&lt;P&gt;I have&amp;nbsp;some question for the access control policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;i am allowing all traffic to be&amp;nbsp;redirected to&amp;nbsp;firepower,&lt;/P&gt;
&lt;P&gt;If the traffic is allowed by asa access-list but&amp;nbsp;it is blocked by firepower&amp;nbsp;rules it will&amp;nbsp;drop the packet ??? please correct me if I am wrong&lt;/P&gt;
&lt;P&gt;If the traffic is allowed by asa access-list but&amp;nbsp;there is no match in the firepower &amp;nbsp;policies for example traffic from inside to&amp;nbsp;DMZ interface where there is no rule it will fall in default action rule which can be by default a intrusion policy, network discovery, etc etc&lt;/P&gt;
&lt;P&gt;Please tell me the attached snapshot rule&amp;nbsp;created are correct , users will be able to browse the internet and&amp;nbsp;application filter will work&amp;nbsp;by rule 2. ????&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905698#M1031274</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2019-03-12T12:58:20Z</dc:date>
    </item>
    <item>
      <title>Hi Jack,</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905699#M1031279</link>
      <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You are correct. Once the traffic is allowed by ASA , it goes to firepower and action is decided on which rule it matches with. If the traffic doesn't match anything , than it will match the default action with which user should be able to access internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2016 14:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905699#M1031279</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-04-11T14:12:36Z</dc:date>
    </item>
    <item>
      <title>Dear yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905700#M1031282</link>
      <description>&lt;P&gt;Dear yogdhanu,&lt;/P&gt;
&lt;P&gt;Thanks for the reply&lt;/P&gt;
&lt;P&gt;If the traffic is allowed by asa access-list but&amp;nbsp;it is blocked by firepower&amp;nbsp;rules it will&amp;nbsp;drop the packet ??? please correct me if I am wrong&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By the attached snapshot&amp;nbsp;of rule I want to achieve high risk url filter, bittorrent should be block and the http, https, ftp, dns should be only allowed does the attached snapshot&amp;nbsp;configuration meet the &amp;nbsp;rule&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jack&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2016 15:37:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905700#M1031282</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-04-11T15:37:07Z</dc:date>
    </item>
    <item>
      <title>Hi Jack,</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905701#M1031285</link>
      <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes you are right , Firepower will drop the packet if its blocked by firepower rule.&lt;/P&gt;
&lt;P&gt;You have created all block rule and allowed only http etc. , There are apps which use HTTP for torrent. I suggest to create another block rule on top of allow rule matching the app detector for torrent.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2016 16:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905701#M1031285</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-04-11T16:58:17Z</dc:date>
    </item>
    <item>
      <title>Dear yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905702#M1031289</link>
      <description>&lt;P&gt;Dear yogdhanu,&lt;/P&gt;
&lt;P&gt;are you sure the rule which I have created are correct, What I think the rule 1 will match all traffic and it will block all users,???&lt;/P&gt;
&lt;P&gt;OR the rule says&lt;/P&gt;
&lt;P&gt;if a user A&amp;nbsp;browse the internet&amp;nbsp;url which is in high risk he will be blocked by RULE 1 and if the URL is not in high risk he will fall in RULE 3 Please correct me if I am wrong.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 04:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905702#M1031289</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-04-12T04:28:53Z</dc:date>
    </item>
    <item>
      <title>If any user from your inside</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905703#M1031293</link>
      <description>&lt;P&gt;If any user from your inside network access a url that matches the url category you have define in rule 1 it will be blocked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it doesn't it will be allowed as per your rule 3.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2016 15:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905703#M1031293</guid>
      <dc:creator>pr3d4t0r_gr</dc:creator>
      <dc:date>2016-04-20T15:12:59Z</dc:date>
    </item>
    <item>
      <title>Dear Yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905704#M1031299</link>
      <description>&lt;P&gt;Dear Yogdhanu,&lt;/P&gt;
&lt;P&gt;Many times I have issues that I don't see the traffic in the connection events neither in the allow or block action and its simply show me&amp;nbsp; on user desk the webpage cannot be displayed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;is there any CLI traces to be seen or captured &amp;nbsp;so that in which rule the traffic is falling we can come to know.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 21:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905704#M1031299</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-05-06T21:31:08Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905705#M1031302</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;There are 2 ways you can do that.&lt;/P&gt;
&lt;P&gt;In the sensor CLI&lt;/P&gt;
&lt;P&gt;&amp;gt;system support firewall-engine-debug&lt;/P&gt;
&lt;P&gt;It will give you option to choose the inline sets where traffic needs to be captured.&lt;/P&gt;
&lt;P&gt;Select that and then define the source IP or destination as filter (script will ask you that) leave all blank&lt;/P&gt;
&lt;P&gt;This would show you the traffic as it matches the rules. You can probably use putty and save its logs so that you can analyze the traffic and see the traffic trying to match itself with all the rules and which rule it does match.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For regular pcap captures , use this article.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/sourcefire-firepower-8000-series-appliances/117778-technote-sourcefire-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rate if helps.&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 05:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905705#M1031302</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-07T05:42:06Z</dc:date>
    </item>
    <item>
      <title>Dear Yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905706#M1031308</link>
      <description>&lt;P&gt;Dear Yogdhanu,&lt;/P&gt;
&lt;P&gt;I m trying to access one of the FTP site and that is falling in the&amp;nbsp;default action&amp;nbsp;rules, just I want to confirm you that the url categories which are available in the system are only for http and https traffic or for other protocol as well such as ftp etc etc.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 06:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905706#M1031308</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-05-07T06:40:45Z</dc:date>
    </item>
    <item>
      <title>Yes the URL categories apply</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905707#M1031312</link>
      <description>&lt;P&gt;Yes the URL categories apply only to web traffic http and https but not FTP&lt;/P&gt;
&lt;P&gt;Rate if helps.&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 09:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905707#M1031312</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-07T09:17:43Z</dc:date>
    </item>
    <item>
      <title>Dear yogdhanu</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905708#M1031315</link>
      <description>&lt;P&gt;Dear yogdhanu&lt;/P&gt;
&lt;P&gt;So for the ftp protocol I shld create a separate rule on top to match the rule and also I will attached the file policy so if incase they are downloading any file If it contains malware they will be block.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 10:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905708#M1031315</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-05-07T10:19:22Z</dc:date>
    </item>
    <item>
      <title>Correct , or you can just</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905709#M1031319</link>
      <description>&lt;P&gt;Correct , or you can just have 1 last rule where all the traffic will match and have File policy and IPS policy in there.&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 15:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policies/m-p/2905709#M1031319</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-07T15:26:58Z</dc:date>
    </item>
  </channel>
</rss>

