<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 'Action: Allow' Blocks all Traffic, have to use 'Trust' in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/action-allow-blocks-all-traffic-have-to-use-trust/m-p/4496794#M1084791</link>
    <description>&lt;P&gt;We had an ASA fail but had a spare ASA 5508-X running 6.6.1 FTD on the shelf to use as a replacement. The firewall is able to hit the Smart License server, but we don't have Threat, Malware, or URL licenses available for this ASA, and none of these licenses are enabled. Snort blocked all connections that had 'Allow' as action in the ACP, though traffic started to flow when this was changed to 'Trust'. I can kind of understand this behavior with the licenses not being applied, but we've not encountered this at other remote locations. Does this behavior seem odd?&lt;/P&gt;</description>
    <pubDate>Tue, 02 Nov 2021 20:11:01 GMT</pubDate>
    <dc:creator>ABaker94985</dc:creator>
    <dc:date>2021-11-02T20:11:01Z</dc:date>
    <item>
      <title>'Action: Allow' Blocks all Traffic, have to use 'Trust'</title>
      <link>https://community.cisco.com/t5/network-security/action-allow-blocks-all-traffic-have-to-use-trust/m-p/4496794#M1084791</link>
      <description>&lt;P&gt;We had an ASA fail but had a spare ASA 5508-X running 6.6.1 FTD on the shelf to use as a replacement. The firewall is able to hit the Smart License server, but we don't have Threat, Malware, or URL licenses available for this ASA, and none of these licenses are enabled. Snort blocked all connections that had 'Allow' as action in the ACP, though traffic started to flow when this was changed to 'Trust'. I can kind of understand this behavior with the licenses not being applied, but we've not encountered this at other remote locations. Does this behavior seem odd?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 20:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/action-allow-blocks-all-traffic-have-to-use-trust/m-p/4496794#M1084791</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-11-02T20:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: 'Action: Allow' Blocks all Traffic, have to use 'Trust'</title>
      <link>https://community.cisco.com/t5/network-security/action-allow-blocks-all-traffic-have-to-use-trust/m-p/4497717#M1084817</link>
      <description>&lt;P&gt;Do you have IPS configured for the rules? or perhaps any other configuration that would send traffic to Snort?&amp;nbsp; If you have no licenses configured and traffic gets sent to Snort then it would make sense that it will get dropped even though Allow is configured.&amp;nbsp; Trust should not send traffic to Snort, but there are always exceptions to this rule.&amp;nbsp; If I were you, I would place these rules into the pre-filter policy, that is if this device will not have any licenses applied to it before an actual replacement device is put into production.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 09:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/action-allow-blocks-all-traffic-have-to-use-trust/m-p/4497717#M1084817</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-11-04T09:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: 'Action: Allow' Blocks all Traffic, have to use 'Trust'</title>
      <link>https://community.cisco.com/t5/network-security/action-allow-blocks-all-traffic-have-to-use-trust/m-p/4497752#M1084820</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Just adding to &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;, if you don't have the license and you have&lt;BR /&gt;rules configured with snort features (TMC), the deployment will fail. You&lt;BR /&gt;can't deploy rules with features that have no license. So your case seems&lt;BR /&gt;to be odd and I don't think its a license issue.&lt;BR /&gt;&lt;BR /&gt;But it seems to be that snort status is down which is causing this. Can you&lt;BR /&gt;go to expert mode and run pmtool status | grep snort. This will give more&lt;BR /&gt;indication.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Nov 2021 10:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/action-allow-blocks-all-traffic-have-to-use-trust/m-p/4497752#M1084820</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-11-04T10:06:38Z</dc:date>
    </item>
  </channel>
</rss>

