<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD's snort detection engine is going down in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4807206#M1099212</link>
    <description>&lt;P&gt;it was seen some time back on 6.6 there was a bug but on 7.0 we did not notice this issue -&lt;/P&gt;
&lt;P&gt;check any updates pending before you pushing any new policy - still have issue contact TAC&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvz19857?rfs=qvred" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvz19857?rfs=qvred&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Apr 2023 07:03:51 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2023-04-04T07:03:51Z</dc:date>
    <item>
      <title>FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4807132#M1099211</link>
      <description>&lt;P&gt;I have an 4600 FMC (on 7.2.2-54) and three 4125 FTDs as container in a single chassis manager. While integrating those FTDs into the FMC the deployment after registration is always getting failed at 83%. In the health monitor section I can see the snort process is up and goes down when deployment is at 83% and the deployment history shows the below mentioned error - "Timeout to process traffic to snort engine".&lt;/P&gt;&lt;P&gt;Now the weird thing is that when I am integrating the FTD as a native instance by removing all containers the deployment is working fine. I am not getting any idea why the snort is going down while the FTDs are configured as container.&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 06:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4807132#M1099211</guid>
      <dc:creator>koustavb</dc:creator>
      <dc:date>2023-04-04T06:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4807206#M1099212</link>
      <description>&lt;P&gt;it was seen some time back on 6.6 there was a bug but on 7.0 we did not notice this issue -&lt;/P&gt;
&lt;P&gt;check any updates pending before you pushing any new policy - still have issue contact TAC&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvz19857?rfs=qvred" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvz19857?rfs=qvred&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 07:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4807206#M1099212</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-04-04T07:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4808140#M1099251</link>
      <description>&lt;P&gt;Thanks for your response. There is no such pending update. Moreover, as my FMC is on 7.2.2 and said FTD instances are on 7.1.0, I thought this may be happening due to FMC-FTD version mismatch. So I did reconfigure these FTDs with 7.2.2 within the chassis and integrate into FMC (after this community post). But that too did not help. Also, according to your BST reference, it is saying for redeployment which also leads to failure.&lt;/P&gt;&lt;P&gt;FYI, these containerized FTDs were working fine when the FMC was on 7.1.0.1. As long as I can remember, the deployment started to fail after the FMC was upgraded to 7.2.2. Then I disintegrated these FTDs and tried to reintegrate and faced the issue.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 07:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4808140#M1099251</guid>
      <dc:creator>koustavb</dc:creator>
      <dc:date>2023-04-05T07:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4896380#M1103121</link>
      <description>&lt;P&gt;Did you figure out how to fix this issue? I have the same issue occurring now.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2023 21:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4896380#M1103121</guid>
      <dc:creator>c_s1</dc:creator>
      <dc:date>2023-07-31T21:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4896434#M1103124</link>
      <description>&lt;P&gt;I suggest attempting a deploy, wait for the error to pop up while collecting logs from FMC &amp;amp; FTD and take note of the transaction ID that is shown under deployment history on your FMC.&lt;/P&gt;
&lt;P&gt;Log on both FTD and FMC via CLI (command syntax is the same):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;expert&lt;/LI&gt;
&lt;LI&gt;sudo su&lt;/LI&gt;
&lt;LI&gt;&amp;lt;enter your password&amp;gt;&lt;/LI&gt;
&lt;LI&gt;pigtail deploy&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; expert
admin@fmc:~$ sudo su
Password: 
Last login: Tue Aug  1 00:36:41 UTC 2023 on pts/0
root@fmc:/Volume/home/admin# 
root@fmc:/Volume/home/admin# 
root@fmc:/Volume/home/admin# pigtail deploy
&amp;lt;truncated due to log size&amp;gt;
Collated log written to pigtail-deploy-1690850205.log &lt;/LI-CODE&gt;
&lt;UL&gt;
&lt;LI&gt;Now try deploy from FMC to the FTD once you get &lt;STRONG&gt;pigtail deploy&lt;/STRONG&gt; running on both ends.&lt;/LI&gt;
&lt;LI&gt;Wait for the deploy to fail.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Hit CTRL+C to stop the log collection on both FMC and FTD. The log is automatically saved and can be moved to facilitate downloading.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;On FTD: &lt;STRONG&gt;mv &amp;lt;file name&amp;gt; /ngfw/var/common/&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;On FMC: &lt;STRONG&gt;mv &amp;lt;file name&amp;gt; /var/common/&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Now on FMC web interface, browse &lt;STRONG&gt;System &amp;gt; Health &amp;gt; Monitor&lt;/STRONG&gt;. You should see a device list on the left side, click the &lt;STRONG&gt;FTD name &amp;gt; View System &amp;amp; Troubleshoot Details &amp;gt; Advanced Troubleshooting&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Put the name of the file and download it. You can also repeat this step to download the file you saved on your FMC.&lt;/P&gt;
&lt;P&gt;With these files at hand, open a Cisco TAC SR and make sure you provide the transaction ID to the TAC engineer.&lt;/P&gt;
&lt;P&gt;This article contains great information about this subject:&lt;/P&gt;
&lt;DIV data-pm-slice="1 1 []" data-en-clipboard="true"&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw-virtual/215258-troubleshooting-firepower-threat-defense.html" rev="en_rl_none" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw-virtual/215258-troubleshooting-firepower-threat-defense.html&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 01 Aug 2023 00:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4896434#M1103124</guid>
      <dc:creator>rhingel</dc:creator>
      <dc:date>2023-08-01T00:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4899120#M1103260</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I needed to remove the var/cisco/packages/vdb-361.tgz file located on&lt;BR /&gt;Active FMC.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;After removing this file, I tried doing another deployment and deployment&lt;BR /&gt;was completed this time. After successful deployment, the Snort process&lt;BR /&gt;came up on the FTDs where this was failing.&lt;BR /&gt;</description>
      <pubDate>Sat, 05 Aug 2023 06:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4899120#M1103260</guid>
      <dc:creator>koustavb</dc:creator>
      <dc:date>2023-08-05T06:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4899371#M1103266</link>
      <description>&lt;P&gt;Thank you very much!&lt;/P&gt;</description>
      <pubDate>Sat, 05 Aug 2023 19:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4899371#M1103266</guid>
      <dc:creator>c_s1</dc:creator>
      <dc:date>2023-08-05T19:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's snort detection engine is going down</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4899372#M1103267</link>
      <description>&lt;P&gt;Thank you very much, I appreciate your help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Aug 2023 19:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-snort-detection-engine-is-going-down/m-p/4899372#M1103267</guid>
      <dc:creator>c_s1</dc:creator>
      <dc:date>2023-08-05T19:34:39Z</dc:date>
    </item>
  </channel>
</rss>

