<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If i'm not mistaken one in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888591#M1032065</link>
    <description>&lt;P&gt;If i'm not mistaken one should be really careful when editing variable sets as it could completely remove snort from inspecting certain traffic if you put the wrong information into a variable. Updating your Home_NET to include internal addresses and possibly company owned public ips (?) is what I have seen as recommended.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 02 May 2016 23:58:35 GMT</pubDate>
    <dc:creator>evan.chadwick1</dc:creator>
    <dc:date>2016-05-02T23:58:35Z</dc:date>
    <item>
      <title>Variable Set Failed Validation</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888576#M1032041</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Last Friday I took the time to upgrade our FMC to 6.0 from 5.4.1.5.&amp;nbsp; The SFRs are all still running 5.4.1.5 code.&amp;nbsp; After the upgrade I found the policies had to be reapplied to each of the devices under the "Deploy" button at the top now (this took me a while to figure out).&amp;nbsp; When I tried to apply the policies as they were in 5.4.1.5, I got warnings for each of my rule sets that said "Variable Set Failed Validation".&amp;nbsp; On a 5506 we have in a test environment I was able to push past the warnings and apply the policies anyway.&amp;nbsp; This resulted in all the policies being removed completely.&amp;nbsp; For the production devices (5525, 5545, 5515) I'm not able to push past the warning - FMC wants the issues resolved before it will allow you to reapply the policies.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas on where to look or what may be causing this?&amp;nbsp; We aren't using any custom variables.&amp;nbsp; Filtered screenshot attached from FMC and two of the rules in one policy for one device.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888576#M1032041</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2019-03-12T12:54:33Z</dc:date>
    </item>
    <item>
      <title>Nobody has seen this?</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888577#M1032042</link>
      <description>&lt;P&gt;Nobody has seen this?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2016 16:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888577#M1032042</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2016-02-23T16:19:44Z</dc:date>
    </item>
    <item>
      <title>I haven't seen it.</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888578#M1032044</link>
      <description>&lt;P&gt;I haven't seen it.&lt;/P&gt;
&lt;P&gt;I've done about four upgrades to 6.0 so far, both on-box (ASDM-based) and with FMC.&lt;/P&gt;
&lt;P&gt;I'd open a TAC case - the TAC "Sourcefire" team is really quite good.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 02:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888578#M1032044</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-24T02:52:31Z</dc:date>
    </item>
    <item>
      <title>Issue seen on 6.0.0 , upgrade</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888579#M1032046</link>
      <description>&lt;P&gt;Issue seen on 6.0.0 , upgrade to 6.0.0.1 resolved the issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 19:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888579#M1032046</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2016-02-24T19:04:29Z</dc:date>
    </item>
    <item>
      <title>Thanks Astha, I can confirm</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888580#M1032048</link>
      <description>&lt;P&gt;Thanks Astha, I can confirm that.&amp;nbsp; Thanks for all your help.&amp;nbsp; The problem now is that our IP to username mapping seem to be broken as well.&amp;nbsp; I've restarted the SFUA and that didn't help.&amp;nbsp; I'm wondering if that needs to be upgraded as well?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 19:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888580#M1032048</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2016-02-24T19:59:35Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888581#M1032050</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Most likely you are running into below mentioned bug :&lt;/P&gt;
&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCux39125/?reffering_site=dumpcr&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 20:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888581#M1032050</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2016-02-24T20:03:26Z</dc:date>
    </item>
    <item>
      <title>That didn't help. </title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888582#M1032051</link>
      <description>&lt;P&gt;That didn't help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 20:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888582#M1032051</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2016-02-24T20:48:12Z</dc:date>
    </item>
    <item>
      <title>Just to update this, I've</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888583#M1032053</link>
      <description>&lt;P&gt;Just to update this, I've seen this now in 6.0.0.1 as well now when trying to apply policies.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 18:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888583#M1032053</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2016-02-26T18:05:51Z</dc:date>
    </item>
    <item>
      <title>Does it relate to this?https:</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888584#M1032055</link>
      <description>&lt;P&gt;Does it relate to this?&lt;BR /&gt;https://popravak.wordpress.com/2015/11/23/fixing-error-fetching-groups-after-upgrade-sourcefire-to-6-0/&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 10:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888584#M1032055</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-03-09T10:46:48Z</dc:date>
    </item>
    <item>
      <title>I had actually seen that</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888585#M1032057</link>
      <description>&lt;P&gt;I had actually seen that particular article and that certainly was an issue, but not the issue.&amp;nbsp; Thanks dennisperto.&amp;nbsp; This ended up being a problem with the way the two of the default variable sets were configured after the upgrade.&amp;nbsp; I'm assuming the upgrade process changed them somehow because I've never used custom variable sets.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you go to Objects --&amp;gt; Object Management --&amp;gt; Variable Set and open the default set you will find EXTERNAL_NET and HOME_NET.&amp;nbsp; These two variables were not correctly defined in my default-set.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 13:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888585#M1032057</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2016-03-09T13:13:00Z</dc:date>
    </item>
    <item>
      <title>Seems to be a known issue</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888586#M1032058</link>
      <description>&lt;P&gt;Seems to be a known issue going from 6.0.0.1 to 6.0.1. I encountered the same error and found the following solution from another board just before calling TAC.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"PSA: don't upgrade to 6.0.1 if you're using custom object groups in your variables. You'll wind up with an error "variable set validation failed" in the policy view, and if you try to edit a variable with a custom object group you'll get "Can't use an undefined value as an ARRAY reference at /usr/local/sf/lib/perl/5.10.1/SF/EODataHandler/VariableSet.pm line 1276....".&lt;/P&gt;
&lt;P&gt;The only workaround at this point is to use plain objects in the variables, or make faux object groups by creating a new variable and adding the objects to it, then referencing the faux variable in other variables (confused yet?).&lt;/P&gt;
&lt;P&gt;Cisco's filing a bug on this one."&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 17:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888586#M1032058</guid>
      <dc:creator>cabell911</dc:creator>
      <dc:date>2016-04-12T17:51:17Z</dc:date>
    </item>
    <item>
      <title>That's good info thanks</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888587#M1032059</link>
      <description>&lt;P&gt;That's good info thanks cabell911.&amp;nbsp; I was within 24-48 hours of moving from the bug riddled 6.0.0.1 to 6.0.1.&amp;nbsp; Maybe I'll wait for a patch to hit 6.0.1.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 12:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888587#M1032059</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2016-04-13T12:19:38Z</dc:date>
    </item>
    <item>
      <title>I have a client pushing out 6</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888588#M1032061</link>
      <description>&lt;P&gt;I have a client pushing out 6.0.1 because of this vulnerability in 6.0:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I noticed the mentioned issue and will do the workaround. &amp;nbsp;Glad I could find a fix for it quickly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 19:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888588#M1032061</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2016-04-13T19:51:23Z</dc:date>
    </item>
    <item>
      <title>Actually, how do you NOT have</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888589#M1032063</link>
      <description>&lt;P&gt;Actually, how do you NOT have custom variable sets if you are using the IPS capabilities?&amp;nbsp; You have to define a "HOME" and "EXTERNAL" net don't you?&amp;nbsp; They are listed under customized variables.&amp;nbsp; Are you talking about possibly other customized sets?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 20:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888589#M1032063</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2016-04-13T20:03:13Z</dc:date>
    </item>
    <item>
      <title>I'm under the assumption that</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888590#M1032064</link>
      <description>&lt;P&gt;I'm under the assumption that if the IPS policy is applied with a source zone at a minimum that it would be fine. I could be wrong.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;J&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2016 19:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888590#M1032064</guid>
      <dc:creator>cabell911</dc:creator>
      <dc:date>2016-04-14T19:11:18Z</dc:date>
    </item>
    <item>
      <title>If i'm not mistaken one</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888591#M1032065</link>
      <description>&lt;P&gt;If i'm not mistaken one should be really careful when editing variable sets as it could completely remove snort from inspecting certain traffic if you put the wrong information into a variable. Updating your Home_NET to include internal addresses and possibly company owned public ips (?) is what I have seen as recommended.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2016 23:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888591#M1032065</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2016-05-02T23:58:35Z</dc:date>
    </item>
    <item>
      <title>Evan,</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888592#M1032066</link>
      <description>&lt;P&gt;Evan,&lt;/P&gt;
&lt;P&gt;That's correct.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Most of the shared object rules and standard text rules that the FirePOWER system provides use&amp;nbsp;predefined default variables to define networks and port numbers. For example, the majority&amp;nbsp;of the rules use the variable $HOME_NET to specify the protected network and the variable&amp;nbsp;$EXTERNAL_NET to specify the unprotected (or outside) network.&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2016 00:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888592#M1032066</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-05-03T00:05:13Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin, Would you</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888593#M1032067</link>
      <description>&lt;P&gt;Thanks Marvin, Would you recommend company owned public ips to be put into HOME_NET?&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2016 03:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888593#M1032067</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2016-05-03T03:22:43Z</dc:date>
    </item>
    <item>
      <title>Evan,</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888594#M1032068</link>
      <description>&lt;P&gt;Evan,&lt;/P&gt;
&lt;P&gt;Re the company-owned public IPs it would be a case by case decision depending on where the IPS is architecturally. If they were "inside" the network (from the perspective of the IPS) then yes. If not, then no.&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2016 13:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888594#M1032068</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-05-03T13:54:32Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin, gotcha</title>
      <link>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888595#M1032069</link>
      <description>&lt;P&gt;Thanks Marvin, gotcha&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2016 22:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/variable-set-failed-validation/m-p/2888595#M1032069</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2016-05-04T22:20:17Z</dc:date>
    </item>
  </channel>
</rss>

