<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Jack, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905602#M1031327</link>
    <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope you can receive my msg and question, My FireSight are using default base policy " Balanced Security and connectivity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But i am thinking to create a separate IPS Policy by copying the existing one.&lt;/P&gt;
&lt;P&gt;Because the the existing one will be automatically updated from the support site from&amp;nbsp;&lt;SPAN&gt;recurring rule update.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can you share more information by using separated custom policy? After copying and applying, it should not affected by auto update?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jul 2017 06:09:36 GMT</pubDate>
    <dc:creator>tsangsl011</dc:creator>
    <dc:date>2017-07-06T06:09:36Z</dc:date>
    <item>
      <title>firepower IPS rules</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905590#M1031284</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;Please find the attached screenshot for an example, there are many rules&amp;nbsp; disabled bydefault how I will know which I have to enable to avoid any attack on the network.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905590#M1031284</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2019-03-12T12:58:17Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905591#M1031291</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That depends on your network. There are too many signatures and Firesight recommendation can help you determine what to enable. It would work based on network discovery which will check the application and host used in your network based on which related rules can be enabled.&lt;/P&gt;
&lt;P&gt;Further , you can have rules enabled in IDS mode (detect only) and see if events are generated and then decide if you want to block or no.&lt;/P&gt;
&lt;P&gt;This will help.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/Intrusion-FireSIGHT-Recs.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2016 14:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905591#M1031291</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-04-11T14:17:50Z</dc:date>
    </item>
    <item>
      <title>Dear yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905592#M1031295</link>
      <description>&lt;P&gt;Dear yogdhanu,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;It would work based on network discovery which will check the application and host used in your network based on which related rules can be enabled.&lt;/P&gt;
&lt;P&gt;as per your above statement this has to be enabled manually or firpower will automatically enabled.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Further , you can have rules enabled in IDS mode (detect only) and see if events are generated and then decide if you want to block or no.&lt;/P&gt;
&lt;P&gt;the hacker will hack the system by this&amp;nbsp; mode if the network administrator is not monitoring the connection logs&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2016 15:59:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905592#M1031295</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-04-11T15:59:49Z</dc:date>
    </item>
    <item>
      <title>Dears,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905593#M1031300</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;what is the best practice for the IPS to be configured in SFR, i have used recommendation but day by day the recommendation are changing sometime it enable 3000 rules with drop&amp;nbsp; and sometimes it enables 2000 rules with drop.&lt;/P&gt;
&lt;P&gt;I am confuse how i can configure that.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2016 19:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905593#M1031300</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-04-18T19:40:39Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905594#M1031303</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You should enable the default base policy as "balanced security and connectivity" with firesight recommendations enabled.&lt;/P&gt;
&lt;P&gt;The rules change dynamically depending on your network host profiles as it takes in to account traffic patterns and other changes and thus change the rule state of some rules&lt;/P&gt;
&lt;P&gt;time to time to avoid illegitimate traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In case by the rule changes, your legitimate traffic is getting dropped you can always open a tac case and provide pcaps of the traffic to us for further investigation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ankita&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2016 17:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905594#M1031303</guid>
      <dc:creator>ankojha</dc:creator>
      <dc:date>2016-05-04T17:54:02Z</dc:date>
    </item>
    <item>
      <title>Dears,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905595#M1031307</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;The rules change dynamically depending on your network host profiles as it takes in to account traffic patterns and other changes and thus change the rule state of some rules&lt;/P&gt;
&lt;P&gt;so time to time I have to always use recommendation and check whether the rule are changing , I think definitely the rules should be changed becz the traffic pattern will change.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In case by the rule changes, your legitimate traffic is getting dropped you can always open a tac case and provide pcaps of the traffic to us for further investigation.&lt;/P&gt;
&lt;P&gt;how can I trace faster which traffic is getting drop till the TAC joins the webex becz I have a critical network with 99.99% uptime.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 19:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905595#M1031307</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-05-06T19:53:53Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905596#M1031311</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;To check which traffic drops , you can rely on intrusion events. There you would see if there is any traffic dropped and if required , you can disable the rule and open TAC case to investigate that if its really false positive&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 20:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905596#M1031311</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-06T20:39:48Z</dc:date>
    </item>
    <item>
      <title>Dear Yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905597#M1031313</link>
      <description>&lt;P&gt;Dear Yogdhanu,&lt;/P&gt;
&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;The Base policy I have selected is security over connectivity which is more secure than the Balanced security and connectivity please correct me if I m wrong.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 21:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905597#M1031313</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-05-06T21:27:28Z</dc:date>
    </item>
    <item>
      <title>Hi Jack,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905598#M1031317</link>
      <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes its more secure but I would suggest to make sure there are not too many rules enabled in there as that could impact performance. All the testing on firepower appliance is done using the balance security and connectivity policy. So using security over connectivity does increase the load on system.&lt;/P&gt;
&lt;P&gt;But as long as the traffic is not oversubscribing the device it should be ok.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 05:36:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905598#M1031317</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-07T05:36:25Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905599#M1031318</link>
      <description>&lt;P&gt;Thanks for the reply&lt;/P&gt;
&lt;P&gt;Yes if it is not affecting the&amp;nbsp;load so I will keep security over connectivity, but incase in future if it impact I will definitely change,&lt;/P&gt;
&lt;P&gt;I have created a separate inline policy&amp;nbsp;by copying the existing one and apart from that I have&amp;nbsp;used recommendation to enable rule&amp;nbsp;I am not sure that this is enough,&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;can you guide what else to be configured&amp;nbsp;in the IPS as a best practice from cisco&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;Please find the attached rule update if I m not wrong it will update the rule automatically @1200 and reapply the policies. I don't have to download them manually is that configuration correct.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 06:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905599#M1031318</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-05-07T06:33:32Z</dc:date>
    </item>
    <item>
      <title>Yes , once you select</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905600#M1031321</link>
      <description>&lt;P&gt;Yes , once you select recurring rule update and apply policies , you don't need to do it manually.&lt;/P&gt;
&lt;P&gt;You can enable network discovery and then run the firesight recommendation in IPS policy which would suggest to enable rules based on the hosts,OS ,protocols being used in your network.&lt;/P&gt;
&lt;P&gt;Check this out from user guide.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/Intrusion-FireSIGHT-Recs.html#62364&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 09:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905600#M1031321</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-05-07T09:22:31Z</dc:date>
    </item>
    <item>
      <title>Dear yogdhanu,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905601#M1031324</link>
      <description>&lt;P&gt;Dear yogdhanu,&lt;/P&gt;
&lt;P&gt;You can enable network discovery and then run the firesight recommendation in IPS policy which would suggest to enable rules based on the hosts,OS ,protocols being used in your network.&lt;/P&gt;
&lt;P&gt;yes I have done the above anything apart from that to make more professional for IPS configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do IPS inspect the HTTPS/SSL traffic for any intrusion prevention ??&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2016 19:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905601#M1031324</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2016-05-07T19:54:03Z</dc:date>
    </item>
    <item>
      <title>Hi Jack,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905602#M1031327</link>
      <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope you can receive my msg and question, My FireSight are using default base policy " Balanced Security and connectivity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But i am thinking to create a separate IPS Policy by copying the existing one.&lt;/P&gt;
&lt;P&gt;Because the the existing one will be automatically updated from the support site from&amp;nbsp;&lt;SPAN&gt;recurring rule update.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can you share more information by using separated custom policy? After copying and applying, it should not affected by auto update?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jul 2017 06:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/2905602#M1031327</guid>
      <dc:creator>tsangsl011</dc:creator>
      <dc:date>2017-07-06T06:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: firepower IPS rules - new April 2019 Cisco recommendation...</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/3846814#M1031329</link>
      <description>&lt;P&gt;Please read this important update so you understand what cisco updates, and what you should do on your firepower IPS system&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.lammle.com/post/which-ips-rules-does-cisco-enable-on-your-firepower-system-think-you-know-youre-probably-wrong/" target="_blank"&gt;https://www.lammle.com/post/which-ips-rules-does-cisco-enable-on-your-firepower-system-think-you-know-youre-probably-wrong/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2019 21:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rules/m-p/3846814#M1031329</guid>
      <dc:creator>toddlammle</dc:creator>
      <dc:date>2019-04-28T21:26:19Z</dc:date>
    </item>
  </channel>
</rss>

