<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Network Analysis and Intrusion Prevention Policy Questions. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409028#M1081069</link>
    <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much for the expert assistance! It really helps!&lt;/P&gt;</description>
    <pubDate>Wed, 26 May 2021 19:52:15 GMT</pubDate>
    <dc:creator>ChristopherCraddock66504</dc:creator>
    <dc:date>2021-05-26T19:52:15Z</dc:date>
    <item>
      <title>Firepower Network Analysis and Intrusion Prevention Policy Questions.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4408916#M1081064</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to implement IPS on some ACP rules but had a few questions before doing so:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) The documentation states the following regarding the Network Analysis Policy: "By default, the system-provided Balanced Security and Connectivity network analysis policy applies to all traffic handled by an access control policy." However, when I go to Policies-&amp;gt;Access Control-&amp;gt;Intrusion-&amp;gt; Network Analysis Policy I do not see any policies defined. I do see the system provided base Network Analysis Policies when creating my own custom policy. Is that what this is referring to?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) I am a little confused by what it means "applies to all traffic handled by an access control policy". Does this mean that all traffic is being inspected by the default&amp;nbsp;Balanced Security and Connectivity network analysis policy even if Inspection is NOT enabled on the ACP rule? Or does the Network Analysis policy only get invoked if Inspection is enabled on the ACP rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) Please let me know if I am understanding the inspection order of operations correctly: Default Intrusion Policy (First few packets allowed through to decide which ACP rule to match them against are inspected) -&amp;gt; ACP Rule (Permit or Deny) -&amp;gt; Intrusion Policy defined in the ACP Rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks so much for any feedback you can provide.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 15:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4408916#M1081064</guid>
      <dc:creator>ChristopherCraddock66504</dc:creator>
      <dc:date>2021-05-26T15:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Network Analysis and Intrusion Prevention Policy Questions.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409000#M1081066</link>
      <description>&lt;P&gt;1. If you haven't created and assigned any custom NAP then the system will use the default one. You can see it in your ACP under the Advanced tab.&lt;/P&gt;
&lt;P&gt;2-3. The NAP with associated IPS policy happens before hitting the ACP rule (referred to as "L7 ACL" in the diagram below).&lt;/P&gt;
&lt;P&gt;Please see the following reference for order-of-operations:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD OOO" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/121284i897BC761AC5349FD/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD OOO reference.PNG" alt="FTD OOO" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD OOO&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 19:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409000#M1081066</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-26T19:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Network Analysis and Intrusion Prevention Policy Questions.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409022#M1081067</link>
      <description>&lt;P&gt;Thanks so much Marvin. I am still a little confused, if you could help me clear up a few things I would be greatly appreciative.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Regarding the "Pre-proc" diamond above, is this referring to the "Default Network Analysis Policy" In the Advanced tab of the ACP?&lt;/P&gt;&lt;P&gt;2) Regarding the "Intrusion Policy (NAP)" diamond above, is this referring to the "Intrusion Policy used before Access Control rule is determined" In the Advanced tab of the ACP?&lt;/P&gt;&lt;P&gt;3) Regarding the "Intrusion Policy" diamond at the very end, is this referring to the Intrusion Policy defined in the "Inspection" setting of the ACP Rule?&lt;/P&gt;&lt;P&gt;4) Regarding the default NAP, does this mean that even if a custom NAP is not defined, that the system will always pre-process all traffic against the Balanced Security and Connectivity NAP before sending the traffic to the ACP for its permit/deny/monitor decision?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks so much for your assistance.&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 19:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409022#M1081067</guid>
      <dc:creator>ChristopherCraddock66504</dc:creator>
      <dc:date>2021-05-26T19:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Network Analysis and Intrusion Prevention Policy Questions.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409024#M1081068</link>
      <description>&lt;P&gt;1-3: Yes.&lt;/P&gt;
&lt;P&gt;4. Pretty much so. See the following guidance from Cisco:&lt;/P&gt;
&lt;ARTICLE id="Cisco_Reference.dita_85aa1563-d727-4aac-9298-3567f5658af2" role="article" aria-labelledby="ariaid-title1"&gt;
&lt;H1 id="ariaid-title1" class="title topictitle1"&gt;Best Practices for Handling Packets That Pass Before Traffic Identification&lt;/H1&gt;
&lt;DIV class="body refbody"&gt;
&lt;SECTION id="Cisco_Reference.dita_85aa1563-d727-4aac-9298-3567f5658af2__d699794e19" class="section"&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;The default action specified for an access control policy is NOT applied to these packets.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Instead, use the following guidelines to choose a value for the &lt;SPAN class="ph uicontrol"&gt;Intrusion Policy used before Access Control rule is determined&lt;/SPAN&gt; setting in the Advanced settings of the access control policy.&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;You can choose a system-created or custom intrusion policy. For example, you can choose &lt;SPAN class="ph uicontrol"&gt;Balanced Security and Connectivity&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;For performance reasons, unless you have good reason to do otherwise, this setting should match the default action set for your access control policy.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;If your system does not perform intrusion inspection (for example, in a discovery-only deployment), select &lt;SPAN class="ph uicontrol"&gt;No Rules Active&lt;/SPAN&gt;. The system will not inspect these initial packets, and they will be allowed to pass.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;By default, this setting uses the default variable set. Ensure that this is suitable for your purposes.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;The network analysis policy associated with the first matching network analysis rule preprocesses traffic for the policy you select. If there are no network analysis rules, or none match, the default network analysis policy is used.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/SECTION&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;</description>
      <pubDate>Wed, 26 May 2021 19:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409024#M1081068</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-26T19:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Network Analysis and Intrusion Prevention Policy Questions.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409028#M1081069</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much for the expert assistance! It really helps!&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 19:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-network-analysis-and-intrusion-prevention-policy/m-p/4409028#M1081069</guid>
      <dc:creator>ChristopherCraddock66504</dc:creator>
      <dc:date>2021-05-26T19:52:15Z</dc:date>
    </item>
  </channel>
</rss>

