<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Intrusion Event Not Occur in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/intrusion-event-not-occur/m-p/4671451#M1092775</link>
    <description>&lt;P&gt;Sorry for Self-Reply.&lt;/P&gt;&lt;P&gt;I tried to change, Snort3(NG) to revert Snort2(OK), after return to Snort3, it changes OK.&lt;/P&gt;&lt;P&gt;This reason is still unknown.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Aug 2022 07:33:50 GMT</pubDate>
    <dc:creator>usako-san</dc:creator>
    <dc:date>2022-08-18T07:33:50Z</dc:date>
    <item>
      <title>Intrusion Event Not Occur</title>
      <link>https://community.cisco.com/t5/network-security/intrusion-event-not-occur/m-p/4668277#M1092610</link>
      <description>&lt;P&gt;-------------------------------------&lt;BR /&gt;Title:&lt;BR /&gt;"Intrusion Event Not Occur"&lt;BR /&gt;-------------------------------------&lt;BR /&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm having trouble with IPS intrusion events not occurring as expected.&lt;BR /&gt;Test traffic that should be dropped by IPS(Snort 3),&lt;BR /&gt;On the FMC, Not observed as an "Intrusion Event"&lt;BR /&gt;(observed as Connection Event, pasted logging below).&lt;/P&gt;&lt;P&gt;When I did a similar test in the Snort2 environment(Firepower8120 and FMC2000) it was OK.&lt;/P&gt;&lt;P&gt;It is expected that,&lt;BR /&gt;When security violation is detected, FMC catches as "Intrusion Event",&lt;BR /&gt;then create "Correlation Event", finaly send from FMC to External Syslog Server.&lt;/P&gt;&lt;P&gt;Still, I think FTD-FMC(built in different segments) use 8305/tcp for alerting&lt;BR /&gt;like any other communication channel,please point out if wrong.&lt;/P&gt;&lt;P&gt;Do you have any Idea to solve?&lt;BR /&gt;Regards.&lt;/P&gt;&lt;P&gt;------------------------------------&lt;BR /&gt;(Reference: Informations)&lt;/P&gt;&lt;P&gt;FTD: Firepower 2140 with FTD(7.0.1.1)&lt;BR /&gt;FMC: Firepower Management Center 2600(7.0.1.1)&lt;BR /&gt;Test Traffic Route:&lt;BR /&gt;[PC]--(Internet)--&amp;gt; External:G1/1[FTD]G1/2:Internal --&amp;gt; [Test Server]&lt;BR /&gt;G1/1 and G1/2 are configured as Inline Pair.&lt;BR /&gt;Snort: version 3&lt;BR /&gt;ACP(Security Intelligence): Black List is empty&lt;BR /&gt;ACP(NAP): Not Configured(because of not using now)&lt;BR /&gt;Syslog(Policies-Action-Alerts): Configured to send External Syslog Server&lt;BR /&gt;Syslog(Others): Not Configured(because of not using now)&lt;/P&gt;&lt;P&gt;------------------------------------&lt;BR /&gt;(Reference: Logging on FTD)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt; system support trace&lt;/P&gt;&lt;P&gt;Enable firewall-engine-debug too? [n]:&lt;BR /&gt;Please specify an IP protocol: tcp&lt;BR /&gt;Please specify a client IP address:&lt;BR /&gt;Please specify a client port:&lt;BR /&gt;Please specify a server IP address: 10.68.254.159&lt;BR /&gt;Please specify a server port: 80&lt;BR /&gt;Monitoring packet tracer debug messages&lt;/P&gt;&lt;P&gt;MidRecovery data queried. Got session type 2 rule id: 268435459, rule_action:2, rev id:2934359906, ruleMatch flag:0x0&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435459, rule_action:2, rev id:2934359906, ruleMatch flag:0x0&lt;/P&gt;&lt;P&gt;10.68.254.159 80 -&amp;gt; 210.162.186.194 19376 6 AS=4 ID=12 Packet 23699: TCP ***A**S*, 08/10-07:19:30.577393, seq 2407507212, ack 1166866861, dsize 0&lt;BR /&gt;10.68.254.159 80 -&amp;gt; 210.162.186.194 19376 6 AS=4 ID=12 AppID: service: (0), client: (0), payload: (0), misc: (0)&lt;BR /&gt;10.68.254.159 80 -&amp;gt; 210.162.186.194 19376 6 AS=4 ID=12 Firewall: allow rule, 'twa_acr', allow&lt;BR /&gt;10.68.254.159 80 -&amp;gt; 210.162.186.194 19376 6 AS=4 ID=12 Policies: Network 0, Inspection 0, Detection 9&lt;BR /&gt;10.68.254.159 80 -&amp;gt; 210.162.186.194 19376 6 AS=4 ID=12 Verdict: pass&lt;/P&gt;&lt;P&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Packet 23700: TCP ***A****, 08/10-07:19:30.597396, seq 1166866861, ack 2407507213, dsize 0&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 AppID: service: (0), client: (0), payload: (0), misc: (0)&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Firewall: allow rule, 'twa_acr', allow&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Policies: Network 0, Inspection 0, Detection 9&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Verdict: pass&lt;/P&gt;&lt;P&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Packet 23701: TCP ***AP***, 08/10-07:19:30.597396, seq 1166866861, ack 2407507213, dsize 537&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Event: 1:1108:19, Action block&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Stream: pending block, drop&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Policies: Network 0, Inspection 0, Detection 9&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Verdict: blacklist&lt;BR /&gt;210.162.186.194 19376 -&amp;gt; 10.68.254.159 80 6 AS=4 ID=12 Verdict Reason: ips, block&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2022 06:54:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intrusion-event-not-occur/m-p/4668277#M1092610</guid>
      <dc:creator>usako-san</dc:creator>
      <dc:date>2022-08-12T06:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Intrusion Event Not Occur</title>
      <link>https://community.cisco.com/t5/network-security/intrusion-event-not-occur/m-p/4671451#M1092775</link>
      <description>&lt;P&gt;Sorry for Self-Reply.&lt;/P&gt;&lt;P&gt;I tried to change, Snort3(NG) to revert Snort2(OK), after return to Snort3, it changes OK.&lt;/P&gt;&lt;P&gt;This reason is still unknown.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2022 07:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intrusion-event-not-occur/m-p/4671451#M1092775</guid>
      <dc:creator>usako-san</dc:creator>
      <dc:date>2022-08-18T07:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Intrusion Event Not Occur</title>
      <link>https://community.cisco.com/t5/network-security/intrusion-event-not-occur/m-p/4722829#M1095109</link>
      <description>&lt;P&gt;Hello Usako,&lt;/P&gt;
&lt;P&gt;Your understanding is correct&lt;/P&gt;
&lt;P&gt;When security violation is detected, FMC catches as "Intrusion Event",&lt;BR /&gt;It then create "Correlation Event", finally send from FMC to External Syslog Server.&lt;/P&gt;
&lt;P&gt;You can refer following links for better understanding on External alerting, comparing Snort 2 &amp;amp; Snort 3.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/external_alerting_for_intrusion_events.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/external_alerting_for_intrusion_events.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/217617-comparing-snort-2-and-snort-3-on-firepow.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/217617-comparing-snort-2-and-snort-3-on-firepow.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/snort3/config-guide/snort3-configuration-guide-v70/migrating.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/snort3/config-guide/snort3-configuration-guide-v70/migrating.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow word-break-ie11"&gt;You can also learn more about Secure Firewall (formerly known as NGFW) through our live Ask the Experts (ATXs) session. Check out Cisco Network Security ATXs Resources [&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493&lt;/A&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;BR /&gt;&lt;BR /&gt;Please do let me know if you have any question/feedback.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 01:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intrusion-event-not-occur/m-p/4722829#M1095109</guid>
      <dc:creator>urathod</dc:creator>
      <dc:date>2022-11-17T01:58:59Z</dc:date>
    </item>
  </channel>
</rss>

