<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Syslog ID 852001 &amp;amp; 852002 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4800822#M1098969</link>
    <description>&lt;P&gt;TAC raised the severity for the issue about not beeing able to rate limit those syslog IDs and just replied and told be that this should be fixed in version 7.4, which will most likely will be released in April. The issue is not only with those specific IDs, but rather for all syslog IDs over &lt;SPAN&gt;805003 (I&lt;/SPAN&gt;n the range&amp;nbsp;&lt;SPAN&gt;805003 -&amp;nbsp;8300006)&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe68840" target="_self"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe68840&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
    <pubDate>Fri, 24 Mar 2023 12:29:36 GMT</pubDate>
    <dc:creator>Chess Norris</dc:creator>
    <dc:date>2023-03-24T12:29:36Z</dc:date>
    <item>
      <title>Syslog ID 852001 &amp; 852002</title>
      <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4760033#M1097081</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I recently observed our FTD is getting flooded with&amp;nbsp; lots of Syslog ID 852001 &amp;amp; 852002 messages.&lt;/P&gt;
&lt;P&gt;It basically hundreds of those messages every minute (example below)&lt;/P&gt;
&lt;P&gt;Jan 23 2023 02:51:59: %FTD-6-852002: Received Full Proxy to Lightweight event from application Snort for TCP flow 10.199.254.162/27607 to 10.10.1.94/47873&lt;BR /&gt;Jan 23 2023 02:51:59: %FTD-6-852001: Received Lightweight to full proxy event from application Snort for TCP flow 10.14.38.1/27789 to 10.20.8.146/8726&lt;BR /&gt;Jan 23 2023 02:51:59: %FTD-6-852002: Received Full Proxy to Lightweight event from application Snort for TCP flow 10.14.38.1/27789 to 10.20.8.146/8726&lt;BR /&gt;Jan 23 2023 02:52:04: %FTD-6-852001: Received Lightweight to full proxy event from application Snort for TCP flow 10.14.38.1/34260 to 10.10.1.101/8726&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I've read the explanation here&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/syslogs10.html#id_122205" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/syslogs10.html#id_122205&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but it's a bit vague and we dont have any SSL policys and I just started to noticed those messages recently.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Does anyone have an idea on what might trigger those messages?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;There is also not possible to filter out those specifik syslog ID's due to a bug, which makes it even more frustrating&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx37329" target="_self"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx37329&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2023 14:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4760033#M1097081</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2023-01-23T14:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog ID 852001 &amp; 852002</title>
      <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4760046#M1097084</link>
      <description>&lt;P&gt;I haven't come across it but, given the BugID you cited, I'd encourage you to open a TAC case.&lt;/P&gt;
&lt;P&gt;Work on ENH (enhancement) bugs gets prioritized that way.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2023 15:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4760046#M1097084</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-01-23T15:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog ID 852001 &amp; 852002</title>
      <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4761805#M1097162</link>
      <description>&lt;P&gt;Thanks. I'll open a case with TAC and see what they say.&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 07:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4761805#M1097162</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2023-01-25T07:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog ID 852001 &amp; 852002</title>
      <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4762053#M1097174</link>
      <description>&lt;P&gt;I will check this Syslog message today.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 13:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4762053#M1097174</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-25T13:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog ID 852001 &amp; 852002</title>
      <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4800822#M1098969</link>
      <description>&lt;P&gt;TAC raised the severity for the issue about not beeing able to rate limit those syslog IDs and just replied and told be that this should be fixed in version 7.4, which will most likely will be released in April. The issue is not only with those specific IDs, but rather for all syslog IDs over &lt;SPAN&gt;805003 (I&lt;/SPAN&gt;n the range&amp;nbsp;&lt;SPAN&gt;805003 -&amp;nbsp;8300006)&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe68840" target="_self"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe68840&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 12:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4800822#M1098969</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2023-03-24T12:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog ID 852001 &amp; 852002</title>
      <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4800826#M1098970</link>
      <description>&lt;P&gt;Thanks alot for your update&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 12:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4800826#M1098970</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-24T12:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog ID 852001 &amp; 852002</title>
      <link>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4864385#M1102117</link>
      <description>&lt;P&gt;Thank you for this - hope this gets fixed in 7.4.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 06:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-id-852001-amp-852002/m-p/4864385#M1102117</guid>
      <dc:creator>adamgerber</dc:creator>
      <dc:date>2023-06-29T06:50:56Z</dc:date>
    </item>
  </channel>
</rss>

