<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP whitelisting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4460034#M1083357</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt;&amp;nbsp;Thanks for the document.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 05 Sep 2021 14:13:00 GMT</pubDate>
    <dc:creator>Chess_N</dc:creator>
    <dc:date>2021-09-05T14:13:00Z</dc:date>
    <item>
      <title>IP whitelisting</title>
      <link>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459586#M1083322</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I want to whitelist a scanner host on our network that is triggering lots of intrusion events.&lt;/P&gt;&lt;P&gt;I tried to right-click the IP address and the select "Whitelist IP now",&amp;nbsp; and it puts the IP in the Global-Whitelist, but intrusion events are still getting triggered.&lt;/P&gt;&lt;P&gt;Do I need to do a deploy after adding it to the Whitelist? Also, since the Whitelist seems to be for security Intelligence events and this is an intrusion events, should I use a trust rule in the ACP instead?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 19:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459586#M1083322</guid>
      <dc:creator>Chess_N</dc:creator>
      <dc:date>2021-09-03T19:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: IP whitelisting</title>
      <link>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459783#M1083330</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1211001"&gt;@Chess_N&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Normally, scanners are not meant to be placed behind FW. One of the reason is what you realized yourself - it triggers alarms. Another and very important reason is that scanners are triggering many connections on multiple IPs (depending on scan type), which can impact FW performance (connection table if filling rapidly, CPU is spiking as it has to process more connections). Most (if not all) scanner configuration guides are talking explicitly not to place scanner behind FW.&lt;/P&gt;&lt;P&gt;Now, if you still want to do this, and assuming you are using FTD, I would advise placing this host in Prefilter policy, as it was designed for these use cases - if you need to make decision on L3/L4 level, without deeper inspection. If you are running ASA with Firepower, simply exclude scanner IP from redirected traffic.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 06:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459783#M1083330</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-09-04T06:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: IP whitelisting</title>
      <link>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459816#M1083332</link>
      <description>&lt;P&gt;Thanks you &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt; The host is running a security product called Rapid7 and it's scanning hosts between different security zones. This is a FTD device so I'll have a look at using a Prefilter policy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;/Jorgen&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 09:31:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459816#M1083332</guid>
      <dc:creator>Chess_N</dc:creator>
      <dc:date>2021-09-04T09:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: IP whitelisting</title>
      <link>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459910#M1083342</link>
      <description>&lt;P&gt;Yes, you should deploy it in Prefilter policy then.&lt;/P&gt;&lt;P&gt;However, consider placing scanner in the inside zone. I managed to find &lt;A href="https://docs.rapid7.com/nexpose/planning-your-scan-engine-deployment/" target="_self"&gt;this document&lt;/A&gt; for Rapid7 deployment, in which it states what I already mentioned - you should place scanner so that it doesn't pass firewall. This would potentially save you a headeache.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 20:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4459910#M1083342</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-09-04T20:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: IP whitelisting</title>
      <link>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4460034#M1083357</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt;&amp;nbsp;Thanks for the document.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 14:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-whitelisting/m-p/4460034#M1083357</guid>
      <dc:creator>Chess_N</dc:creator>
      <dc:date>2021-09-05T14:13:00Z</dc:date>
    </item>
  </channel>
</rss>

