<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Firepower Management Center - negate object/network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040080#M1067300</link>
    <description>&lt;P&gt;Hi Cristian,&lt;/P&gt;
&lt;P&gt;Can you explain in more detail how to use an excluded list in a network object or object group definition? I don't see that option in my FMC running 6.5.0.2.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC Network Group object.PNG" style="width: 626px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/68424iD61D2E13DF6F57FE/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC Network Group object.PNG" alt="FMC Network Group object.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Mar 2020 11:41:22 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-03-04T11:41:22Z</dc:date>
    <item>
      <title>Cisco Firepower Management Center - negate object/network</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4039985#M1067287</link>
      <description>&lt;P&gt;Hello together,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;does anyone know if it is possible to negate an object or network in the policies?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately I have not found anything for this.&lt;/P&gt;&lt;P&gt;I wanted to create a rule for Internet Access (allow any to "not RFC1918" http and https) just as an example.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone have an idea or is this not possible in the FMC?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 09:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4039985#M1067287</guid>
      <dc:creator>marco.iacono</dc:creator>
      <dc:date>2020-03-04T09:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Management Center - negate object/network</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040009#M1067291</link>
      <description>You'd have to use two entries. 
First entry would to block http and https to RFC 1918 network object.
Second entry to permit http and https to any destination.
Rules are processed from top down with rule processing stopping after first matched entry (with action other than monitor).</description>
      <pubDate>Wed, 04 Mar 2020 09:34:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040009#M1067291</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-04T09:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Management Center - negate object/network</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040031#M1067297</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Yes you can, by using the excluded list in your network object definition.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 10:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040031#M1067297</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-04T10:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Management Center - negate object/network</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040080#M1067300</link>
      <description>&lt;P&gt;Hi Cristian,&lt;/P&gt;
&lt;P&gt;Can you explain in more detail how to use an excluded list in a network object or object group definition? I don't see that option in my FMC running 6.5.0.2.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC Network Group object.PNG" style="width: 626px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/68424iD61D2E13DF6F57FE/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC Network Group object.PNG" alt="FMC Network Group object.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 11:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040080#M1067300</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-04T11:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Management Center - negate object/network</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040115#M1067309</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I meant "network variables". So you define a new network variable set, you include the networks and exclude the specific ranges. You than select in your access-control policy rule the newly defined variable set, from inspection tab. Although the variable set is used for intrusion policies, in the end you attach the intrusion policy to your access-control policy rules. There are some restrictions, read carefully in the Configuration Guide, in the Managing Reusable Objects section, Variable Sets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 12:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040115#M1067309</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-04T12:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Management Center - negate object/network</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040423#M1067350</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt; would excluding the objects from inspection by the IPS policy have the effect of blocking the connections in the associated Access Control Policy rule?&lt;/P&gt;
&lt;P&gt;I would have thought the effect would be to exempt the excluded network(s) from IPS inspection once the associated rule action was determined - but not blocking the TCP connections in the first place.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 19:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040423#M1067350</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-04T19:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Management Center - negate object/network</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040453#M1067352</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;Yes Marvin, that is correct, i read the first questions "which says policies" and i replied, thinking IPS policies. If he needs to "negate networks" for ACP, he actually needs multiple ACP rules; if he needs to "negate networks" for IPS, he needs variable set.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 20:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-management-center-negate-object-network/m-p/4040453#M1067352</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-04T20:43:52Z</dc:date>
    </item>
  </channel>
</rss>

