<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Security intelligence block - how to see at CLI on FTD? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130138#M1072608</link>
    <description>&lt;P&gt;It is normally the Analysis &amp;gt; Connection Events and the system support diagnostic-cli that you would refer to, to view this.&amp;nbsp; You can also setup a capture and export the pcap file and view it in Wireshark.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214852-block-dns-with-security-intelligence-usi.html#anc10" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214852-block-dns-with-security-intelligence-usi.html#anc10&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Aug 2020 13:50:17 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2020-08-04T13:50:17Z</dc:date>
    <item>
      <title>DNS Security intelligence block - how to see at CLI on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130107#M1072604</link>
      <description>&lt;P&gt;How can I see DNS Security Intelligence event for the blocked resolution of a fqdn at CLI of FTD?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Test setup:&lt;/P&gt;&lt;P&gt;I have a static DNS blacklist used for blocking domain &lt;EM&gt;well-known-domain&lt;/EM&gt;.com, let's say cisco.com.&amp;nbsp; Inside hosts trying to browse to cisco.com are being block, as expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, when I use &lt;STRONG&gt;Packet Tracer&lt;/STRONG&gt; and for destination fqdn I put cisco.com, Packet Tracer's verdict is to allow the traffic, because Packet-Tracer resolves the fqdn to an IP address.&amp;nbsp; Since the ip address of cisco.com is not blocked in my configuration, Packet-Tracer allows the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To catch Packet tracer resolving, I thought I could use:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;support firewall-engine-debug&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;to see Packet tracer resolves, but it doesn't show name lookup for cisco.com.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then, I wanted to use &lt;STRONG&gt;&lt;FONT face="courier new, courier"&gt;capture&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;at FTD CLI, but that command uses ip address for source/destination, so I can't put cisco.com.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please tell me where at CLI I can see DNS Security intelligence events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 13:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130107#M1072604</guid>
      <dc:creator>cpaquet</dc:creator>
      <dc:date>2020-08-04T13:09:22Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security intelligence block - how to see at CLI on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130138#M1072608</link>
      <description>&lt;P&gt;It is normally the Analysis &amp;gt; Connection Events and the system support diagnostic-cli that you would refer to, to view this.&amp;nbsp; You can also setup a capture and export the pcap file and view it in Wireshark.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214852-block-dns-with-security-intelligence-usi.html#anc10" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214852-block-dns-with-security-intelligence-usi.html#anc10&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 13:50:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130138#M1072608</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-08-04T13:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security intelligence block - how to see at CLI on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130297#M1072621</link>
      <description>Hi, try to use support trace command with firewall debug enable turned on.&lt;BR /&gt;This should show the results as this command will show you snort inspection&lt;BR /&gt;as well.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2020 17:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130297#M1072621</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-08-04T17:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security intelligence block - how to see at CLI on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130361#M1072630</link>
      <description>&lt;P&gt;Thanks Mohammed, the system support trace did the trick and showed the SI DNS block and which policy blocked it.&lt;/P&gt;&lt;P&gt;Much appreciated.&amp;nbsp; Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;198.19.10.100-49320 - 192.42.93.30-53 17 AS 1-1 CID 0 Packet: UDP&lt;BR /&gt;198.19.10.100-49320 - 192.42.93.30-53 17 AS 1-1 CID 0 Session: new snort session&lt;BR /&gt;198.19.10.100-49320 - 192.42.93.30-53 17 AS 1-1 CID 0 AppID: service DNS (617), application unknown (0)&lt;BR /&gt;198.19.10.100-49320 - 192.42.93.30-53 17 AS 1-1 CID 0 &lt;FONT color="#0000FF"&gt;SI: DNS security intelligence rule, 'NGFW-DNS-Blacklist', drop&lt;/FONT&gt;&lt;BR /&gt;198.19.10.100-49320 - 192.42.93.30-53 17 AS 1-1 CID 0 Snort: processed decoder alerts or actions queue, drop&lt;BR /&gt;198.19.10.100-49320 - 192.42.93.30-53 17 AS 1-1 CID 0 Snort id 0, NAP id 3, IPS id 0, Verdict BLOCK&lt;BR /&gt;198.19.10.100-49320 - 192.42.93.30-53 17 AS 1-1 CID 0 ===&amp;gt; Blocked by SI&lt;BR /&gt;Verdict reason is sent to DAQ&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 19:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-security-intelligence-block-how-to-see-at-cli-on-ftd/m-p/4130361#M1072630</guid>
      <dc:creator>cpaquet</dc:creator>
      <dc:date>2020-08-04T19:16:39Z</dc:date>
    </item>
  </channel>
</rss>

