<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTD send RST when dropped by Snort / IPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767538#M1097427</link>
    <description>&lt;P&gt;Your understanding is correct.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Feb 2023 15:33:27 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2023-02-02T15:33:27Z</dc:date>
    <item>
      <title>Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4765258#M1097325</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I understand that in Access Control rules on the FTD, there are "block" and "block with reset" actions, but how does one configure Snort / IPS to send a RST if it's dropping something (traffic that was set to "allow" in the ACP?) Furthermore, if possible, is it or can it be so granular as to allow for the specifying interfaces, zones, or the like?&lt;/P&gt;&lt;P&gt;Long story short, without all of the details, we are doing some testing... When moving a test malware file from zone to another, that is allowed by the ACP, the IPS is dropping the traffic as expected. The lack of a RST is causing the internal process that is moving the file to hang until it times out. I would like to send a RST in this case, but not for something being inspected from the internet. Is it possible?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 14:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4765258#M1097325</guid>
      <dc:creator>brettp</dc:creator>
      <dc:date>2023-01-30T14:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767016#M1097391</link>
      <description>&lt;P&gt;Does anyone have any insight on this? I can find no documentation. Obviously, if it was an access rule dropping the traffic, one could use "Drop with reset" but this is being dropped by IPS. I can find no information or documentation online about sending a RST. I would imagine is has to be possible somehow? Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 20:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767016#M1097391</guid>
      <dc:creator>brettp</dc:creator>
      <dc:date>2023-02-01T20:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767019#M1097392</link>
      <description>&lt;P&gt;the Snort not drop traffic is send verdict to Lina, Lina will drop the traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 20:10:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767019#M1097392</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-01T20:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767026#M1097393</link>
      <description>Thanks for the reply. I understand that LINA ultimately drops the packet , but how can I configure the FTD to send a RST when traffic is getting dropped due to a IPS / intrusion policy rule… and not an access control rule?&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2023 20:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767026#M1097393</guid>
      <dc:creator>brettp</dc:creator>
      <dc:date>2023-02-01T20:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767027#M1097394</link>
      <description>&lt;P&gt;&lt;A href="https://rayka-co.com/lesson/firepower-malware-and-file-policy/" target="_blank"&gt;https://rayka-co.com/lesson/firepower-malware-and-file-policy/&lt;/A&gt;&lt;BR /&gt;check the reset connection in this above link&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 20:40:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767027#M1097394</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-01T20:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767080#M1097396</link>
      <description>&lt;P&gt;If you create a Malware &amp;amp; File policy you can select drop with an option to reset.&amp;nbsp; The Intrusion policy however does not have an option to reset when traffic is blocked.&lt;/P&gt;
&lt;P&gt;This is a screenshot from the Malware &amp;amp; File policy when adding a rule:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-02-01 at 23.10.00.png" style="width: 264px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/175500i6EAD6480ED8CACC4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-02-01 at 23.10.00.png" alt="Screenshot 2023-02-01 at 23.10.00.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 22:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767080#M1097396</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-02-01T22:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767451#M1097421</link>
      <description>Thank you both for the information. Wow, that is interesting that a RST can not be sent if something is dropped due to intrusion rules. Correct me if I am wrong, but with the File &amp;amp; Malware Policy, I can only block filetypes with the Threat license. In order for me to do any type of dynamic file/malware inspection, I would need a Malware license, correct?&lt;BR /&gt;&lt;BR /&gt;For instance… I am doing tests with a simple EICAR text file. If I were using a File &amp;amp; Malware policy, with the threat license only, I would only be able to block .txt for instance. It is unaware that the file is “malicious.” In order for me to scan the .txt and have the FTD determine it is malicious (not taking into account the IPS rules… strictly File &amp;amp; Malware policy,) I would need the Malware license?&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;</description>
      <pubDate>Thu, 02 Feb 2023 13:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767451#M1097421</guid>
      <dc:creator>brettp</dc:creator>
      <dc:date>2023-02-02T13:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767492#M1097423</link>
      <description>&lt;P&gt;I think your are correct&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-guide-v601/Licensing_the_Firepower_System.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-guide-v601/Licensing_the_Firepower_System.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 14:48:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767492#M1097423</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-02T14:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD send RST when dropped by Snort / IPS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767538#M1097427</link>
      <description>&lt;P&gt;Your understanding is correct.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 15:33:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-send-rst-when-dropped-by-snort-ips/m-p/4767538#M1097427</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-02-02T15:33:27Z</dc:date>
    </item>
  </channel>
</rss>

