<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can I inspect the same traffic for BOTH intrusion and malware? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3357978#M1041276</link>
    <description>&lt;P&gt;Hi Pat,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would really depend on the content of the packet. If the intrusion and file policy is in same access rule, file policy would be applied only after firepower inspects some portion of stream and calculates the SHA value of the file. If during that time, intrusion rule is able to determine something based on either header info or packet data info, it would be triggered before file policy calculates the SHA and validates if its malicious or not.&lt;/P&gt;
&lt;P&gt;I would suggest to place the intrusion policy in IDS mode (disable drop when inline) for testing and use it in along with file policy rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps,&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
    <pubDate>Fri, 30 Mar 2018 08:24:46 GMT</pubDate>
    <dc:creator>yogdhanu</dc:creator>
    <dc:date>2018-03-30T08:24:46Z</dc:date>
    <item>
      <title>Can I inspect the same traffic for BOTH intrusion and malware?</title>
      <link>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3357854#M1041275</link>
      <description>&lt;P&gt;I am running an ASA5506 with Firepower and FMC 6.2.2.2, and have a question about how rules interact. &amp;nbsp;Please pardon me if this has been asked and answered. &amp;nbsp;I searched through the posts but did not see an answer.&lt;/P&gt;
&lt;P&gt;My question is about inspecting the same traffic for both Intrusion AND File/Malware. &amp;nbsp;If I create two rules (in one access control policy), one a file rule allowing all traffic for file inspection, and a second rule that allows&amp;nbsp;all traffic for Intrusion inspection, it appears that only one is examining traffic. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I put the intrusion rule above the file rule in the access control policy, all of the blocks shown in the Connection Events page are "Intrusion Blocks". If I put the file rule above the intrusion rule, all of the blocks are "File Blocks".&lt;/P&gt;
&lt;P&gt;And if I put both the intrusion and file policies into one rule, I only ever see "Intrusion Blocks". &amp;nbsp;My concern is that traffic is either being inspected for file/malware OR intrusion, but not both.&lt;/P&gt;
&lt;P&gt;Is my concern unfounded, and if so, why do I not see a mix of block types?&lt;/P&gt;
&lt;P&gt;Thanks, in advance for your help.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:34:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3357854#M1041275</guid>
      <dc:creator>Pat Fahey</dc:creator>
      <dc:date>2020-02-21T15:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Can I inspect the same traffic for BOTH intrusion and malware?</title>
      <link>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3357978#M1041276</link>
      <description>&lt;P&gt;Hi Pat,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would really depend on the content of the packet. If the intrusion and file policy is in same access rule, file policy would be applied only after firepower inspects some portion of stream and calculates the SHA value of the file. If during that time, intrusion rule is able to determine something based on either header info or packet data info, it would be triggered before file policy calculates the SHA and validates if its malicious or not.&lt;/P&gt;
&lt;P&gt;I would suggest to place the intrusion policy in IDS mode (disable drop when inline) for testing and use it in along with file policy rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps,&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 08:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3357978#M1041276</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2018-03-30T08:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: Can I inspect the same traffic for BOTH intrusion and malware?</title>
      <link>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3358121#M1041277</link>
      <description>Hi Yogesh.&lt;BR /&gt;&lt;BR /&gt;So if I am understanding you correctly, BOTH Intrusion inspection AND Malware inspection will be performed on traffic with no Malware or Intrusion matches.&lt;BR /&gt;&lt;BR /&gt;On the other hand, if traffic contains BOTH Malware AND an Intrusion signature, it may be dropped for one reason or the other, depending on which abnormality (Malware or Intrusion) is identified first.&lt;BR /&gt;&lt;BR /&gt;My objective is to inspect all traffic for both Malware and Intrusion, and it sounds like that is indeed happening.   Please correct me if I am wrong.&lt;BR /&gt;&lt;BR /&gt;Thanks for your reply.  -Pat&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Mar 2018 15:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3358121#M1041277</guid>
      <dc:creator>Pat Fahey</dc:creator>
      <dc:date>2018-03-30T15:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Can I inspect the same traffic for BOTH intrusion and malware?</title>
      <link>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3358124#M1041278</link>
      <description>Let me chime in, IPS policy is evaluated prior to the Malware policy.&lt;BR /&gt;&lt;BR /&gt;So order of drops is packet first, file second.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Paul&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Mar 2018 15:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3358124#M1041278</guid>
      <dc:creator>pazzi</dc:creator>
      <dc:date>2018-03-30T15:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: Can I inspect the same traffic for BOTH intrusion and malware?</title>
      <link>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3358196#M1041279</link>
      <description>Thanks, Paul.&lt;BR /&gt;&lt;BR /&gt;So if the IPS policy does NOT drop it, Malware WILL inspect it?&lt;BR /&gt;&lt;BR /&gt;Of course if IPS drops it Malware will not inspect it.&lt;BR /&gt;&lt;BR /&gt;My concern was that if the IPS policy allows it to pass, the Malware would never inspect it at all.&lt;BR /&gt;&lt;BR /&gt;-Pat&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Mar 2018 18:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-inspect-the-same-traffic-for-both-intrusion-and-malware/m-p/3358196#M1041279</guid>
      <dc:creator>Pat Fahey</dc:creator>
      <dc:date>2018-03-30T18:18:07Z</dc:date>
    </item>
  </channel>
</rss>

