<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: exclude source IP address from IPS inspection on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543870#M1086993</link>
    <description>&lt;P&gt;Unfortunately not &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Feb 2022 08:29:41 GMT</pubDate>
    <dc:creator>borutlape</dc:creator>
    <dc:date>2022-02-02T08:29:41Z</dc:date>
    <item>
      <title>exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530122#M1086356</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need to exclude the source IP address of our external vulnerability scanner, so it will not be blocked by the IPS.&lt;/P&gt;&lt;P&gt;The point is to simulate external attacks without IPS protection.&lt;/P&gt;&lt;P&gt;Adding an access rule on the top with no IPS inspection is not an option, because then the access will not be evaluated against the existing access rules, and there are a lot. We need to scan only existing open ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Previously on ASA with Firepower module, it was done with simply adding deny statement in the sfr access-list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now it seems there is no option to do it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Borut&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 10:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530122#M1086356</guid>
      <dc:creator>borutlape</dc:creator>
      <dc:date>2022-01-12T10:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530127#M1086358</link>
      <description>&lt;P&gt;If you using FMC check below thread :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/td-p/3814519" target="_blank"&gt;https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/td-p/3814519&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 10:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530127#M1086358</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-12T10:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530202#M1086362</link>
      <description>&lt;P&gt;Thanks Balaji,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According these solution we should add it to Whitelist. But according the Cisco documentation it will not exclude it from IPS inspection:&lt;/P&gt;&lt;P&gt;Traffic added to a Do Not Block list or monitored at the Security Intelligence stage is intentionally subject to further analysis with the rest of access control.&lt;BR /&gt;Reference URL: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/security_intelligence_blacklisting.html#ID-2192-00000005" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/security_intelligence_blacklisting.html#ID-2192-00000005&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 13:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530202#M1086362</guid>
      <dc:creator>borutlape</dc:creator>
      <dc:date>2022-01-12T13:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543714#M1086987</link>
      <description>&lt;P&gt;Hi Borut,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you find a solution for your problem? If so, please share it with me since I'm stuck facing the same problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On ASA we simply added the Security-Scanner's IP Address to an "Do not match" extended access list attached to the "default" service-policy. Regular L1-4 ACL's from ASA have applied while the traffic has been explicitly excluded from Snort inspection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately on the FTD I haven't found an elegant solution like on the traditional ASA w/ FirePOWER Services stack. This feature seems to be missing entirely (unfortunately yet another thing to add on why FTD is worse than ASA).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Shadowing" the regular ACP's in the PreFilter is not an option like OP mentioned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 23:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543714#M1086987</guid>
      <dc:creator>1_am_r00t</dc:creator>
      <dc:date>2022-02-01T23:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543791#M1086990</link>
      <description>&lt;P&gt;You can try excluding that ip address on the variable set applied to the access rules you want to exempt&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 05:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543791#M1086990</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2022-02-02T05:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543870#M1086993</link>
      <description>&lt;P&gt;Unfortunately not &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 08:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543870#M1086993</guid>
      <dc:creator>borutlape</dc:creator>
      <dc:date>2022-02-02T08:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543945#M1086996</link>
      <description>&lt;P&gt;How about if you apply a prefilter rule to exclude the scanner IP?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 10:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543945#M1086996</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-02T10:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543995#M1086999</link>
      <description>&lt;P&gt;Both OP and me stated:&lt;/P&gt;&lt;P&gt;"Adding an access rule on the top with no IPS inspection is not an option, because then the access will not be evaluated against the existing access rules, and there are a lot. We need to scan only existing open ports."&lt;/P&gt;&lt;P&gt;"Shadowing" the regular ACP's in the PreFilter is not an option like OP mentioned."&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 11:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4543995#M1086999</guid>
      <dc:creator>1_am_r00t</dc:creator>
      <dc:date>2022-02-02T11:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4544020#M1087000</link>
      <description>&lt;P&gt;I see, thanks for the clarification. Another question, can't we just add that scanner IP to the whitelist in the security intelligence section on the ACP?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 12:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4544020#M1087000</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-02T12:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4547027#M1087143</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/276501"&gt;@borutlape&lt;/a&gt;already mentioned this is no option since adding it to the whitelist will _NOT_ prevent it from further analysis by Snort:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530202/highlight/true#M1086362" target="_blank"&gt;https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530202/highlight/true#M1086362&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 01:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4547027#M1087143</guid>
      <dc:creator>1_am_r00t</dc:creator>
      <dc:date>2022-02-08T01:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4547743#M1087179</link>
      <description>&lt;P&gt;Interesting idea, however this is not what me and OP are trying to accomplish. We're looking for a solution to completely exclude traffic being sent to Snort. Your approach will "just" prevent any alerts being triggered because the traffic will not match any SID pattern - the traffic still needs to traverse through Snort though.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 19:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4547743#M1087179</guid>
      <dc:creator>1_am_r00t</dc:creator>
      <dc:date>2022-02-08T19:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4547825#M1087183</link>
      <description>&lt;P&gt;I'm not mastering snort to such a degree for being able to tell excluding an ip address at variable set level will almost entirely bypass snort for that ip address or simply prevent snort to enforce the rules, in my mind processing a rule when you know you'll never enforce it it's a useless waste of cpu cycles, but real behavior may differ.&lt;/P&gt;&lt;P&gt;The only thing I can tell is that it works and it's the only way I found to accomplish such a goal without disabling other security features.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 20:46:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4547825#M1087183</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2022-02-08T20:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: exclude source IP address from IPS inspection on FTD</title>
      <link>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4953155#M1105560</link>
      <description>&lt;P&gt;Just found your post after posting similar post.&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/cisco-ftd-how-to-bypass-traffic-inspection/m-p/4953134#M1105559" target="_blank"&gt;https://community.cisco.com/t5/network-security/cisco-ftd-how-to-bypass-traffic-inspection/m-p/4953134#M1105559&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you find a solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 10:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4953155#M1105560</guid>
      <dc:creator>goudier2001</dc:creator>
      <dc:date>2023-11-03T10:51:07Z</dc:date>
    </item>
  </channel>
</rss>

