<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic High number of Security-Related Events in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902439#M1103334</link>
    <description>&lt;P&gt;We have very few WAN-facing devices and, for the ones which are accessible from the WAN, traffic to and from those IP's is restricted to specific IP ranges and ports within the access control policy.&lt;/P&gt;&lt;P&gt;However, under 'Security-Related Events' we consistently see a large number of connection attempts to those IP's being blocked.&lt;/P&gt;&lt;P&gt;I assume that this is because the traffic is inspected by Snort before it hits the access control policy. Is this expected or there a better way to configure the FTD policies?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Aug 2023 16:08:11 GMT</pubDate>
    <dc:creator>willb1</dc:creator>
    <dc:date>2023-08-09T16:08:11Z</dc:date>
    <item>
      <title>High number of Security-Related Events</title>
      <link>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902439#M1103334</link>
      <description>&lt;P&gt;We have very few WAN-facing devices and, for the ones which are accessible from the WAN, traffic to and from those IP's is restricted to specific IP ranges and ports within the access control policy.&lt;/P&gt;&lt;P&gt;However, under 'Security-Related Events' we consistently see a large number of connection attempts to those IP's being blocked.&lt;/P&gt;&lt;P&gt;I assume that this is because the traffic is inspected by Snort before it hits the access control policy. Is this expected or there a better way to configure the FTD policies?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 16:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902439#M1103334</guid>
      <dc:creator>willb1</dc:creator>
      <dc:date>2023-08-09T16:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: High number of Security-Related Events</title>
      <link>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902476#M1103335</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/460831"&gt;@willb1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Snort operates at a lower level (deep packet inspection) in the network stack compared to the access control policy in Cisco FTD. This means that Snort inspects incoming traffic before it is subject to any rules defined in the access control policy. If Snort detects traffic that matches patterns of known attacks or malicious behavior, it can block or log that traffic regardless of whether it matches any rules in the access control policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This behavior is generally expected in a security-focused network setup. Snort's primary purpose is to detect and prevent known threats and vulnerabilities, which it does by analyzing traffic patterns and signatures associated with malicious activities. The access control policy, on the other hand, provides additional security by allowing you to define rules that specify which traffic is allowed or denied based on criteria such as source/destination IP addresses, ports, applications, and more.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you're seeing legitimate traffic being blocked by Snort and it's causing issues, you might consider reviewing the Snort rules that are triggering these blocks. You could fine-tune the Snort rules to reduce false positives, and if needed, you can create custom rules to allow specific types of traffic that you know are legitimate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 16:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902476#M1103335</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2023-08-09T16:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: High number of Security-Related Events</title>
      <link>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902486#M1103336</link>
      <description>&lt;P&gt;Thank you, that answered my question. In this instance, Snort isn't blocking legitimate traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 17:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902486#M1103336</guid>
      <dc:creator>willb1</dc:creator>
      <dc:date>2023-08-09T17:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: High number of Security-Related Events</title>
      <link>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902507#M1103337</link>
      <description>&lt;P&gt;You're welcome&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/460831"&gt;@willb1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 18:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-number-of-security-related-events/m-p/4902507#M1103337</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2023-08-09T18:19:45Z</dc:date>
    </item>
  </channel>
</rss>

