<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Query regarding Snort rule/FMC upgrade against Log4j vulnerability in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518456#M1085778</link>
    <description>&lt;P&gt;Query regarding &lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" target="_blank" rel="noopener"&gt;Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021&lt;/A&gt;&lt;/P&gt;&lt;P&gt;As per the above critical advisory, I was looking at new Intrusion rule in the older FMC&amp;nbsp; that we have (running version 6.1.0.5) and noticed that download of the new rules have been failing due to certificate issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;“Download updates failed: Peer certificate cannot be authenticated with known CA certificates”&lt;/P&gt;&lt;P&gt;Is it possible to download the specific new rules manually, if so how?&lt;/P&gt;&lt;P&gt;If this is not possible, I’ve found that upgrading the FMC to 6.2.0 fixes the certificate issue affecting download from FMC.&lt;/P&gt;&lt;P&gt;In order to upgrade from 6.1.0.5 to 6.2.0, can I double check that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Direct upgrade from 6.1.0.5 to 6.2.0 is supported?&lt;/LI&gt;&lt;LI&gt;Managed ASA5555 FirePOWER module is ver 6.0.1.4 and this is compatible with FMC ver 6.2.0?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We are looking to replace this ASA to FPR2140 which is managed on the newer build FMC so want to spend as little time and effort as possible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;</description>
    <pubDate>Tue, 14 Dec 2021 09:00:24 GMT</pubDate>
    <dc:creator>atsukane</dc:creator>
    <dc:date>2021-12-14T09:00:24Z</dc:date>
    <item>
      <title>Query regarding Snort rule/FMC upgrade against Log4j vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518456#M1085778</link>
      <description>&lt;P&gt;Query regarding &lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" target="_blank" rel="noopener"&gt;Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021&lt;/A&gt;&lt;/P&gt;&lt;P&gt;As per the above critical advisory, I was looking at new Intrusion rule in the older FMC&amp;nbsp; that we have (running version 6.1.0.5) and noticed that download of the new rules have been failing due to certificate issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;“Download updates failed: Peer certificate cannot be authenticated with known CA certificates”&lt;/P&gt;&lt;P&gt;Is it possible to download the specific new rules manually, if so how?&lt;/P&gt;&lt;P&gt;If this is not possible, I’ve found that upgrading the FMC to 6.2.0 fixes the certificate issue affecting download from FMC.&lt;/P&gt;&lt;P&gt;In order to upgrade from 6.1.0.5 to 6.2.0, can I double check that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Direct upgrade from 6.1.0.5 to 6.2.0 is supported?&lt;/LI&gt;&lt;LI&gt;Managed ASA5555 FirePOWER module is ver 6.0.1.4 and this is compatible with FMC ver 6.2.0?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We are looking to replace this ASA to FPR2140 which is managed on the newer build FMC so want to spend as little time and effort as possible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 09:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518456#M1085778</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2021-12-14T09:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Snort rule/FMC upgrade against Log4j vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518462#M1085780</link>
      <description>&lt;P&gt;Ah, I'm guessing 'Update Intrusion Rules' is the bit I need to understand&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/system_software_updates.html#Cisco_Concept.dita_7a4949fd-7dc1-43bc-8187-3124694c7aad" target="_blank" rel="noopener"&gt;Firepower Management Center Configuration Guide, Version 6.4 - System Updates [Cisco Firepower Management Center] - Cisco&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 09:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518462#M1085780</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2021-12-14T09:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Snort rule/FMC upgrade against Log4j vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518572#M1085786</link>
      <description>&lt;P&gt;So updating to the latest Intrusion rules has worked and I can see the Log4j drop rules are in the policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 13:14:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518572#M1085786</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2021-12-14T13:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Snort rule/FMC upgrade against Log4j vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518675#M1085792</link>
      <description>&lt;P&gt;6.1.0.5 to 6.2.0 is a direct upgrade that is supported:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/relnotes/Firepower_System_Release_Notes_Version_620/important_update_notes.html#id_38002" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/relnotes/Firepower_System_Release_Notes_Version_620/important_update_notes.html#id_38002&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FMC 6.2.0 cannot manage an ASA Firepower service module running 6.0.1.4.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepower-compatibility.html#reference_A0CAB7C28A2B440F8F901D316D6684F4" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepower-compatibility.html#reference_A0CAB7C28A2B440F8F901D316D6684F4&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 15:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4518675#M1085792</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-14T15:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Snort rule/FMC upgrade against Log4j vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4519620#M1085823</link>
      <description>&lt;P&gt;hey mate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do you see the events for those "Log4j" logs?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 23:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4519620#M1085823</guid>
      <dc:creator>Heino Human</dc:creator>
      <dc:date>2021-12-15T23:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Snort rule/FMC upgrade against Log4j vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4520463#M1085846</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;Not sure how I missed that 6.2.0 is not compatible with 6.0.1.4!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 11:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4520463#M1085846</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2021-12-17T11:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Snort rule/FMC upgrade against Log4j vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4520465#M1085847</link>
      <description>&lt;P&gt;hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178811"&gt;@Heino Human&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This might be of your interest:&lt;/P&gt;&lt;P&gt;&lt;A href="https://blogs.cisco.com/security/protecting-against-log4j-with-secure-firewall-secure-ips" target="_blank"&gt;https://blogs.cisco.com/security/protecting-against-log4j-with-secure-firewall-secure-ips&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 11:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-snort-rule-fmc-upgrade-against-log4j/m-p/4520465#M1085847</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2021-12-17T11:16:04Z</dc:date>
    </item>
  </channel>
</rss>

