<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower Dynamic State block IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-dynamic-state-block-ip/m-p/4700566#M1094086</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i want to prevent DoS attack to my server. To do that on firepower, i can use dynamic state rules to block traffic if frequency has been reach. The problem is, i can only block traffic and not the user. So if the user try to do DoS on my server again, they can do it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to make Firepower action to block IP address instead of traffics?&lt;/P&gt;</description>
    <pubDate>Mon, 10 Oct 2022 06:16:04 GMT</pubDate>
    <dc:creator>raymondluis13</dc:creator>
    <dc:date>2022-10-10T06:16:04Z</dc:date>
    <item>
      <title>Firepower Dynamic State block IP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-dynamic-state-block-ip/m-p/4700566#M1094086</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i want to prevent DoS attack to my server. To do that on firepower, i can use dynamic state rules to block traffic if frequency has been reach. The problem is, i can only block traffic and not the user. So if the user try to do DoS on my server again, they can do it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to make Firepower action to block IP address instead of traffics?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2022 06:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-dynamic-state-block-ip/m-p/4700566#M1094086</guid>
      <dc:creator>raymondluis13</dc:creator>
      <dc:date>2022-10-10T06:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Dynamic State block IP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-dynamic-state-block-ip/m-p/4720650#M1095034</link>
      <description>&lt;P&gt;Hi Raymondluis,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In DoS Attack Firepower basically prevents TCP &amp;amp; UDP Connections. In dynamic state rule there is option CONNECTION PER CLIENT so you can set a threshold per client based. Then, there is another option CONNECTION TIMEOUT where you can override a Global Platform setting for Connection timeouts, here you can set time limit in Sec/Min/hourly based connection timeout &amp;nbsp;As you said, &amp;nbsp;if any attacker is trying to attack after timeouts or after connection threshold reduce. Then attacker can generate attacks &amp;nbsp;as well against destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you want to block the source IP, you can write separate ACP rule to block the Attacker IP manually. Below are the URL's for Threat Defense service policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/threat_defense_service_policies.html#id_71090" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/threat_defense_service_policies.html#id_71090&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/threat_defense_service_policies.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/threat_defense_service_policies.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;-----------------------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;If you find my reply solved your question or issue, kindly click the 'Accept as Solution' button and vote it as helpful.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;You can also learn more about Cisco Secure Firewall (formerly known as NGFW) through our live Ask the Experts (ATXs) session. Check out Cisco Network Security ATXs Resources [&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493&lt;/A&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;-----------------------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;Arunkumar&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 08:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-dynamic-state-block-ip/m-p/4720650#M1095034</guid>
      <dc:creator>Arunkumar Sathasivam</dc:creator>
      <dc:date>2022-11-14T08:37:35Z</dc:date>
    </item>
  </channel>
</rss>

