<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSCva10734 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cscva10734/m-p/4542101#M1086889</link>
    <description>&lt;P&gt;I agree, typically I wouldn't want to turn off a security feature on a security device to accommodate some software bugs, however, in this specific case, I think if your endpoints have a solid endpoint protection system, it would be a forced acceptable solution.&lt;/P&gt;</description>
    <pubDate>Sat, 29 Jan 2022 21:40:27 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2022-01-29T21:40:27Z</dc:date>
    <item>
      <title>CSCva10734</title>
      <link>https://community.cisco.com/t5/network-security/cscva10734/m-p/4541541#M1086851</link>
      <description>&lt;P&gt;I am wondering if anyone else is running into this issue where Firepower is blocking archive files. It seems there is a bug that has been around for 10 versions of the software.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;When transmitting an archive (GZ, ZIP, etc.) through a Firepower sensor that contains clear text files, the archive may be blocked with the 'Archive Block (Failed to Inspect) action if the traffic is sent via clear text (such as HTTP). This is due to a known limitation in software used for the inspection.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Conditions:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;This issue may be seen if the FMC File policy rule is configured to "Inspect Archives" along with the "Block Uninspectable Archives" option being enabled. This does NOT affect HTTPS traffic unless decryption is also being performed on the Firepower appliance.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;Disable "Block Uninspectable Archive" from File policy rule Advanced setting. Alternatively, this issue has also been observed when a web server compresses files on-the-fly (such as compressed AXD files from Microsoft IIS). In those scenarios, it may be possible to disable compression on the web server to avoid this scenario.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am wondering what everyone is doing with this. I find that disabling a security feature on the firewall as a solution is not acceptable. Especially if this bug has been around for 10 versions as indicated in the bug report.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 19:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cscva10734/m-p/4541541#M1086851</guid>
      <dc:creator>gcook0001</dc:creator>
      <dc:date>2022-01-28T19:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: CSCva10734</title>
      <link>https://community.cisco.com/t5/network-security/cscva10734/m-p/4542101#M1086889</link>
      <description>&lt;P&gt;I agree, typically I wouldn't want to turn off a security feature on a security device to accommodate some software bugs, however, in this specific case, I think if your endpoints have a solid endpoint protection system, it would be a forced acceptable solution.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2022 21:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cscva10734/m-p/4542101#M1086889</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-01-29T21:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: CSCva10734</title>
      <link>https://community.cisco.com/t5/network-security/cscva10734/m-p/4812216#M1099415</link>
      <description>&lt;P&gt;Are there any software versions for FMC that this issue is not happening on?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2023 21:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cscva10734/m-p/4812216#M1099415</guid>
      <dc:creator>c_s1</dc:creator>
      <dc:date>2023-04-11T21:11:47Z</dc:date>
    </item>
  </channel>
</rss>

