<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC/FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388075#M1080072</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;When you run the command it prompts you to specify the protocol, source IP, source port, destination IP and destination port (you don't need to specify all options). If you filter on at least specific source IP address of your test machine, then this should have minimal impact.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, CTRL + C stops the command.&lt;/P&gt;</description>
    <pubDate>Fri, 16 Apr 2021 11:29:43 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2021-04-16T11:29:43Z</dc:date>
    <item>
      <title>FMC/FTD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388027#M1080067</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We have FMC 100 and FTD 2130, when I do a packet tracer on the device its saying traffic is allowed but I cant find the ACL on the ACP that would allow this traffic, its almost as though there is an hidden ACL which is allowing certain traffic which it shouldnt be.&lt;/P&gt;&lt;P&gt;any ideas how to find this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 09:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388027#M1080067</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-04-16T09:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388032#M1080068</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you run packet-tracer from the CLI, the section "Type: ACCESS-LIST" indicates the ACP. You can confirm which rule by looking for "L5 RULE: xxxxxx" or L7 RULE: xxxxxx". Where xxxxx is the name of your ACP rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you still cannot determine which rule traffic is hitting please provide the output of the packet-tracer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could also use the command "system support firewall-engine-debug" and generate some real-time traffic, this would also indicate which ACP rule was matched.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 09:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388032#M1080068</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-16T09:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388057#M1080069</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;Some info from PT here,&amp;nbsp; 445 is only allowed on one rule and when I do the PT the rule its hitting isnt the rule I have 445 on.??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; packet-tracer input &amp;nbsp;INSIDE tcp X.X.X.X&amp;nbsp; 23567 X.X.X.X 445 detailed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;access-group CSM_FW_ACL_ global&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;access-list CSM_FW_ACL_ advanced permit ip ifc INSIDE any any rule-id 268438963&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;access-list CSM_FW_ACL_ remark rule-id 268438963: ACCESS POLICY: TREAL-POLICY - Mandatory&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;access-list CSM_FW_ACL_ remark rule-id 268438963: L7 RULE: URL Block #1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;in&amp;nbsp; id=0xffc13dc070, priority=12, domain=permit, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=8345875, user_data=0xff824a3400, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;input-interface: INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;output-interface: OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv0389949408MsoNormal"&gt;&lt;SPAN&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 10:58:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388057#M1080069</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-04-16T10:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388061#M1080070</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess you are using URL filtering is some rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is possibly what is happening... "If early traffic matches all other rule conditions but identification is incomplete, the system allows the packet to pass and the connection to be established (or the &lt;SPAN class="ph"&gt;TLS/SSL&lt;/SPAN&gt; handshake to complete). After the system completes its identification, the system applies the appropriate rule action to the remaining session traffic."&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/url_filtering.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/url_filtering.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Practice is to position URL rules after all other rules that &lt;EM class="ph i"&gt;must&lt;/EM&gt; be hit. So move your specific rule for 445 above the rule that has been matched in the packet-tracer output above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 11:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388061#M1080070</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-16T11:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388072#M1080071</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;Thanks ill read the doc&lt;/P&gt;&lt;P&gt;Does the below affect the performance of live devices at all? should these commands be used out of hours, and is it just a ctrl +c to stop the debug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(You could also use the command "system support firewall-engine-debug" and generate some real-time traffic, this would also indicate which ACP rule was matched.)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 11:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388072#M1080071</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-04-16T11:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388075#M1080072</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;When you run the command it prompts you to specify the protocol, source IP, source port, destination IP and destination port (you don't need to specify all options). If you filter on at least specific source IP address of your test machine, then this should have minimal impact.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, CTRL + C stops the command.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 11:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd/m-p/4388075#M1080072</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-16T11:29:43Z</dc:date>
    </item>
  </channel>
</rss>

