<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC Rule Organization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-rule-organization/m-p/4495918#M1084759</link>
    <description>It really depends on your environment.  For example, you can use per VLAN&lt;BR /&gt;category of this is for single site. Otherwise, per port category for&lt;BR /&gt;common ports and one group to catch uncommon ports. For multiple sites or&lt;BR /&gt;multiple units you can use child acp as well.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Mon, 01 Nov 2021 07:36:38 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2021-11-01T07:36:38Z</dc:date>
    <item>
      <title>FMC Rule Organization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-rule-organization/m-p/4495884#M1084752</link>
      <description>&lt;P&gt;I am trying to organize our FMC firewall rules and need a logical way to group them together. I have explored the usage of Categories but it seems I would be creating over 100 "Groups" to clean up the layout of the rules. Is there another option that would make grouping these easier like nested groups or Tags. What are solutions you guys have implemented?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 05:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-rule-organization/m-p/4495884#M1084752</guid>
      <dc:creator>dominic.collins</dc:creator>
      <dc:date>2021-11-01T05:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Rule Organization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-rule-organization/m-p/4495918#M1084759</link>
      <description>It really depends on your environment.  For example, you can use per VLAN&lt;BR /&gt;category of this is for single site. Otherwise, per port category for&lt;BR /&gt;common ports and one group to catch uncommon ports. For multiple sites or&lt;BR /&gt;multiple units you can use child acp as well.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Nov 2021 07:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-rule-organization/m-p/4495918#M1084759</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-11-01T07:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Rule Organization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-rule-organization/m-p/4497281#M1084808</link>
      <description>&lt;P&gt;We too are struggling with this... and trying to have plan as we look to migrate 600+ rules from ASA. Is there any issues performance or usability in using the child acp's as a means to grouping rules by some logical segmentation? IE...below. With the last ACP in the nest applied to the Device..&lt;/P&gt;&lt;P&gt;- BaseACP&lt;/P&gt;&lt;P&gt;&amp;nbsp; - ChildACP-Campus&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - ChildACP-Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - ChildACP-DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - ChildACP-External_Ingress&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Otherwise right now our thought is a BaseACP with a single Child.&lt;/P&gt;&lt;P&gt;- BaseACP - Global Mandatory Rules, SI(IP), Geo Filters in Default Section.&lt;/P&gt;&lt;P&gt;- Child ACP - Contains the Below.&lt;/P&gt;&lt;P&gt;- Mandatory Categories - Applications and Systems that need to override the Default Policies in the Base ACP - Categories are Very Specific.&lt;/P&gt;&lt;P&gt;- Default Categories - Organize by:&lt;/P&gt;&lt;P&gt;1. Application (mail, DNS, AV)&lt;/P&gt;&lt;P&gt;2. System (mainly complex systems to keep rules together and or by heavily used systems IE DomainConrollers.&lt;/P&gt;&lt;P&gt;3. Network Segment (1.Campus, 2.Server, 3.DMZ, 4.External-Ingress) This would cover broader/generic access requirements for each segment.&lt;/P&gt;&lt;P&gt;4. Default Block at the end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 16:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-rule-organization/m-p/4497281#M1084808</guid>
      <dc:creator>dcrichter</dc:creator>
      <dc:date>2021-11-03T16:12:52Z</dc:date>
    </item>
  </channel>
</rss>

