<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC not seeing HTTP/HTTPS traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841106#M1100749</link>
    <description>&lt;P&gt;I think the intrusion prevention policy dropped the packet before it hit the access control policy rule. Thank you all&lt;/P&gt;</description>
    <pubDate>Tue, 23 May 2023 19:11:13 GMT</pubDate>
    <dc:creator>Knassi</dc:creator>
    <dc:date>2023-05-23T19:11:13Z</dc:date>
    <item>
      <title>FMC not seeing HTTP/HTTPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841003#M1100734</link>
      <description>&lt;P&gt;So i am trying to find out why i am unable to get on a website. I do not see any blocks in the FMC, i don't even see any traffic related to that IP. But when i try to ping it, i see the ICMP traffic in the FMC. Has anyone seen this kind of problem?&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 16:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841003#M1100734</guid>
      <dc:creator>Knassi</dc:creator>
      <dc:date>2023-05-23T16:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: FMC not seeing HTTP/HTTPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841012#M1100736</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1438518"&gt;@Knassi&lt;/a&gt; are you logging traffic?&lt;/P&gt;
&lt;P&gt;From the CLI of the FTD run "system support firewall-engine-debug" filter on the source ip and/or destination and generate traffic. The output on the console will confirm traffic is passing through the firewall and tell you which rule traffic is matching.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 17:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841012#M1100736</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-23T17:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: FMC not seeing HTTP/HTTPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841093#M1100742</link>
      <description>&lt;P&gt;So i have been able to pull some traffic and there is only one rule match, the very last one that actually allows any any. How can an "allow any any "rule be blocking traffic?&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 19:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841093#M1100742</guid>
      <dc:creator>Knassi</dc:creator>
      <dc:date>2023-05-23T19:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: FMC not seeing HTTP/HTTPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841106#M1100749</link>
      <description>&lt;P&gt;I think the intrusion prevention policy dropped the packet before it hit the access control policy rule. Thank you all&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 19:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841106#M1100749</guid>
      <dc:creator>Knassi</dc:creator>
      <dc:date>2023-05-23T19:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: FMC not seeing HTTP/HTTPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841111#M1100751</link>
      <description>&lt;P&gt;I follow your Q, if am right you run the below&amp;nbsp;&lt;BR /&gt;you make management connect to INside then to FMC ?&amp;nbsp;&lt;BR /&gt;this not recommend from Cisco&amp;nbsp;&lt;BR /&gt;that why your management traffic hit the ACP of FTD&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (468).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/185377i8D353E7988B40BAF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (468).png" alt="Screenshot (468).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 19:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-not-seeing-http-https-traffic/m-p/4841111#M1100751</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-23T19:17:33Z</dc:date>
    </item>
  </channel>
</rss>

