<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FMC Tunnel &amp;amp; Prefilter rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-tunnel-amp-prefilter-rules/m-p/3345550#M1033081</link>
    <description>&lt;P&gt;Hi.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe it's a simple topic which has not been explained very clearly. I read about Tunnel &amp;amp; Prefilter rules on Cisco website and even on the books, but none of them was clear enough. So, Would u ask my questions here?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. supposing we have not configured any&amp;nbsp;&lt;SPAN&gt;Tunnel &amp;amp; Prefilter rules on FMC, if device gets a sample non-encrypted tunneled packet, e.g. GRE, what will be the process? Is it goes through normal Access Policies in "decapsulated" form (so access policies analyze only inner header) or in "encapsulated" form (so access policies analyze outer header)?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. If we have configured a tunnel rule with "Analyze" action, will matched packets forwarded to be analyzed by normal access policies?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. supposing we have configured rules as below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fmc5.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8691i458BB858526816E7/image-size/large?v=v2&amp;amp;px=999" role="button" title="fmc5.png" alt="fmc5.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What will happen if we get:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A) a FTP packet encapsulated inside a GRE packet&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;B) a SSH packet encapsulated inside a GRE packet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C) a IPv6 FTP packet encapsulated as IPv6-in-IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;tnx a lot.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:29:51 GMT</pubDate>
    <dc:creator>ciscoworlds</dc:creator>
    <dc:date>2020-02-21T15:29:51Z</dc:date>
    <item>
      <title>FMC Tunnel &amp; Prefilter rules</title>
      <link>https://community.cisco.com/t5/network-security/fmc-tunnel-amp-prefilter-rules/m-p/3345550#M1033081</link>
      <description>&lt;P&gt;Hi.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe it's a simple topic which has not been explained very clearly. I read about Tunnel &amp;amp; Prefilter rules on Cisco website and even on the books, but none of them was clear enough. So, Would u ask my questions here?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. supposing we have not configured any&amp;nbsp;&lt;SPAN&gt;Tunnel &amp;amp; Prefilter rules on FMC, if device gets a sample non-encrypted tunneled packet, e.g. GRE, what will be the process? Is it goes through normal Access Policies in "decapsulated" form (so access policies analyze only inner header) or in "encapsulated" form (so access policies analyze outer header)?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. If we have configured a tunnel rule with "Analyze" action, will matched packets forwarded to be analyzed by normal access policies?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. supposing we have configured rules as below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fmc5.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8691i458BB858526816E7/image-size/large?v=v2&amp;amp;px=999" role="button" title="fmc5.png" alt="fmc5.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What will happen if we get:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A) a FTP packet encapsulated inside a GRE packet&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;B) a SSH packet encapsulated inside a GRE packet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C) a IPv6 FTP packet encapsulated as IPv6-in-IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;tnx a lot.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-tunnel-amp-prefilter-rules/m-p/3345550#M1033081</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2020-02-21T15:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Tunnel &amp; Prefilter rules</title>
      <link>https://community.cisco.com/t5/network-security/fmc-tunnel-amp-prefilter-rules/m-p/5275809#M1120307</link>
      <description>&lt;P&gt;Old topic, STILL relevant though.&amp;nbsp; I have a similar situation regarding pre-filters that I have yet to have had answered as well.&amp;nbsp; Mine deals with WCCP tunneling. How can I create a pre-filter rule that ignores&amp;nbsp; the GRE over WCCP tunnels when running through an FTD between core network where the WSA resides and the firewall that is sandwiched between two IPS that is the WCCP endpoint and 443 redirector?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW thanks to the OP for the information posted. I had assumed that nothing could be added to the policy, turns out just to the default policy.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 15:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-tunnel-amp-prefilter-rules/m-p/5275809#M1120307</guid>
      <dc:creator>tahscolony</dc:creator>
      <dc:date>2025-03-27T15:03:35Z</dc:date>
    </item>
  </channel>
</rss>

