<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: To add to what Karsten said ( in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/4768699#M1097488</link>
    <description>&lt;P&gt;this is exactly my case, we need to transfer backup/replication data between 2 datacenters and looks like the trust rules would help me out with the single snort instance behavior that limits totalthroughput&lt;/P&gt;</description>
    <pubDate>Sat, 04 Feb 2023 19:01:31 GMT</pubDate>
    <dc:creator>ajc</dc:creator>
    <dc:date>2023-02-04T19:01:31Z</dc:date>
    <item>
      <title>Firesight Allow vs Trust</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/2946024#M43650</link>
      <description>&lt;P&gt;Not understanding the difference for an Access Control Policy if let's say I 'Trust' the facebook application vs 'Allow' the facebook application. &amp;nbsp;Is the only difference the ability to log?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/2946024#M43650</guid>
      <dc:creator>moody</dc:creator>
      <dc:date>2019-03-10T13:39:58Z</dc:date>
    </item>
    <item>
      <title>If you choose the action</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/2946025#M43651</link>
      <description>&lt;P&gt;If you choose the action "Trust", you don't do any more inspection on the traffic. There will be no&amp;nbsp;intrusion protection and also no file-policy on this traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 20:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/2946025#M43651</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-05T20:35:47Z</dc:date>
    </item>
    <item>
      <title>To add to what Karsten said (</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/2946026#M43652</link>
      <description>&lt;P&gt;To add to what Karsten said (+5 from me):&lt;/P&gt;
&lt;P&gt;1. Use this feature when you don't want to tax your Firewall for traffic that does not need inspection. For instance, DB server on dmz_1 doing a backup to a backup server on dmz_2.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. If you are running FirePOWER on the ASAs then instead of using "trust" you should exclude that type of traffic in your sfr redirection policy in the ASA directly.&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Aug 2016 22:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/2946026#M43652</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-08-06T22:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: If you choose the action</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3380331#M43653</link>
      <description>&lt;P&gt;Good advice!&lt;/P&gt;</description>
      <pubDate>Tue, 08 May 2018 20:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3380331#M43653</guid>
      <dc:creator>Joshua Schroth</dc:creator>
      <dc:date>2018-05-08T20:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: To add to what Karsten said (</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3380332#M43654</link>
      <description>This is good advice depending on what you want to accomplish. If you still want to see that traffic in your FirePower Events then you do not want to exclude that traffic on the ASA via Access List. If you don't care about seeing that traffic in FirePower then by all means exclude within the SFR Redirect Access List. If you do want to see that traffic in FirePower, then mark the traffic as "trusted" so that the events will still be logged, but not processed by the IPS.</description>
      <pubDate>Tue, 08 May 2018 20:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3380332#M43654</guid>
      <dc:creator>Joshua Schroth</dc:creator>
      <dc:date>2018-05-08T20:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: If you choose the action</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3918287#M43656</link>
      <description>You would still have SSL inspection with trusting the traffic correct?</description>
      <pubDate>Tue, 03 Sep 2019 16:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3918287#M43656</guid>
      <dc:creator>JohnDenver2135</dc:creator>
      <dc:date>2019-09-03T16:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: If you choose the action</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3920227#M43658</link>
      <description>&lt;P&gt;SSL inspection (and decryption) is processed prior to Access Control Policy (ACP) rules so - yes, it still applies when the ACP action is trust.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 14:26:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3920227#M43658</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-06T14:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: If you choose the action</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3934917#M43660</link>
      <description>&lt;P&gt;Just to add to Karsten's answer: Trust rules are not subject to IPS, AVC and File inspection but are still subject to identity and QoS policies. If you want to completely skip all snort-based inspections then you can utilize pre-filter rules.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2019 19:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3934917#M43660</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2019-10-03T19:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: To add to what Karsten said (</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3959926#M43661</link>
      <description>&lt;P&gt;This interesting. Two week ago FMC was blocking a traffic from amazon cloud we host services on the cloud. in order to fix the issue i created a rule to trust the connection amazon public ip to our dmz server. even though the rule was trust but it was still getting to the default intrusion policy. now again to fix the issue i went to sort rules and disable the rule which was alerts us. my understanding is even trust does not actually trust the traffic and still apply the defaut IPS rules. unless mentioned above to create a access-list on ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Nov 2019 22:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3959926#M43661</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-11-17T22:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: To add to what Karsten said (</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3992157#M43663</link>
      <description>&lt;P&gt;It is also worth bearing in mind that each Access Control policy has a setting in the Advanced tab for '&lt;SPAN&gt;Intrusion Policy used before Access Control rule is determined' where packets are sent through this policy using the default variable set before an action from the access policy can be determined. So it's worth noting that if you change your default action after you create the access control policy, the default intrusion policy does&amp;nbsp;&lt;STRONG&gt;not&lt;/STRONG&gt;&amp;nbsp;automatically change. To change it manually, use the access control policy’s advanced options.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 15:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3992157#M43663</guid>
      <dc:creator>chrischurch</dc:creator>
      <dc:date>2019-12-02T15:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: To add to what Karsten said (</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3998950#M43664</link>
      <description>&lt;P&gt;Trust rules do "trust" the traffic. What you're seeing is due to a setting in the advanced tab of the access control policy. "Intrusion poolicy before Access Control rule is determined".&lt;/P&gt;</description>
      <pubDate>Sat, 14 Dec 2019 20:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/3998950#M43664</guid>
      <dc:creator>miculp</dc:creator>
      <dc:date>2019-12-14T20:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: To add to what Karsten said (</title>
      <link>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/4768699#M1097488</link>
      <description>&lt;P&gt;this is exactly my case, we need to transfer backup/replication data between 2 datacenters and looks like the trust rules would help me out with the single snort instance behavior that limits totalthroughput&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2023 19:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-allow-vs-trust/m-p/4768699#M1097488</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-02-04T19:01:31Z</dc:date>
    </item>
  </channel>
</rss>

