<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic showing ID numbers instead of policy name in cisco ftd firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/showing-id-numbers-instead-of-policy-name-in-cisco-ftd-firewall/m-p/4920924#M1104135</link>
    <description>&lt;P&gt;Guys Please help me ..&lt;/P&gt;&lt;P&gt;why showing ID numbers instead of policy name in cisco ftd firewall access policy? also this policy not get&amp;nbsp; hit when access from client pc falcon.crowdstrike.com.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please check below results :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;system support firewall-engine-debug&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;n, dst sgt: 0, dst sgt type: unknown, svc -1, payload -1, client -1, misc -1, user 9999999&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 2, 'Block_URL', app s=-1 c=-1 p=-1 m=-1&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 5, 'Blocked MOI IN to OUT', dst network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 9, 'Block-CCTV-To-Internet &amp;amp; KIN', src network, GEO, FQDN&lt;BR /&gt;&lt;STRONG&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 12, id 268437637 no host&lt;/STRONG&gt;&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 13, 'Servers to CrowdStrike', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 14, 'Servers to CarbonBlack', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 15, 'Servers to SecureWorks', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 16, 'Servers to Windows Update', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 17, 'Servers Without Internet', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 18, 'Block-B1-Archive-PCs-Internet', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 19, 'Block NOC PC Internet', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 20, 'Block-NEW-DMZs-Communication', SrcZone&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 21, 'Block 192.168.20.5 Internet', src network, GEO, FQDN&lt;BR /&gt;&lt;STRONG&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 match rule order 22, 'New_Dmz_to _Outside_No Internet', action Block&lt;/STRONG&gt;&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Got end of flow event from hardware with flags 00006001&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Rule Match Data: rule_id 0, rule_action 0 rev_id 0, rule_flags 0&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Received EOF, deleting the snort session&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Deleting Firewall session&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Sep 2023 08:48:51 GMT</pubDate>
    <dc:creator>ShareefKooliyodan0444</dc:creator>
    <dc:date>2023-09-10T08:48:51Z</dc:date>
    <item>
      <title>showing ID numbers instead of policy name in cisco ftd firewall</title>
      <link>https://community.cisco.com/t5/network-security/showing-id-numbers-instead-of-policy-name-in-cisco-ftd-firewall/m-p/4920924#M1104135</link>
      <description>&lt;P&gt;Guys Please help me ..&lt;/P&gt;&lt;P&gt;why showing ID numbers instead of policy name in cisco ftd firewall access policy? also this policy not get&amp;nbsp; hit when access from client pc falcon.crowdstrike.com.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please check below results :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;system support firewall-engine-debug&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;n, dst sgt: 0, dst sgt type: unknown, svc -1, payload -1, client -1, misc -1, user 9999999&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 2, 'Block_URL', app s=-1 c=-1 p=-1 m=-1&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 5, 'Blocked MOI IN to OUT', dst network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 9, 'Block-CCTV-To-Internet &amp;amp; KIN', src network, GEO, FQDN&lt;BR /&gt;&lt;STRONG&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 12, id 268437637 no host&lt;/STRONG&gt;&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 13, 'Servers to CrowdStrike', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 14, 'Servers to CarbonBlack', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 15, 'Servers to SecureWorks', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 16, 'Servers to Windows Update', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 17, 'Servers Without Internet', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 18, 'Block-B1-Archive-PCs-Internet', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 19, 'Block NOC PC Internet', src network, GEO, FQDN&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 20, 'Block-NEW-DMZs-Communication', SrcZone&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 no match rule order 21, 'Block 192.168.20.5 Internet', src network, GEO, FQDN&lt;BR /&gt;&lt;STRONG&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 match rule order 22, 'New_Dmz_to _Outside_No Internet', action Block&lt;/STRONG&gt;&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Got end of flow event from hardware with flags 00006001&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Rule Match Data: rule_id 0, rule_action 0 rev_id 0, rule_flags 0&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Received EOF, deleting the snort session&lt;BR /&gt;192.168.176.11 443 -&amp;gt; 13.52.93.220 443 6 AS=0 ID=10 GR=1-1 Deleting Firewall session&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 08:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/showing-id-numbers-instead-of-policy-name-in-cisco-ftd-firewall/m-p/4920924#M1104135</guid>
      <dc:creator>ShareefKooliyodan0444</dc:creator>
      <dc:date>2023-09-10T08:48:51Z</dc:date>
    </item>
    <item>
      <title>In Cisco FTD firewall access policies, ID numbers are sho...</title>
      <link>https://community.cisco.com/t5/network-security/showing-id-numbers-instead-of-policy-name-in-cisco-ftd-firewall/m-p/4922006#M1104183</link>
      <description>In Cisco FTD firewall access policies, ID numbers are shown instead of policy names because the firewall uses these IDs to internally identify and track policies and their configurations. Every access policy configured in Cisco FTD is assigned a unique ID number, which is then used for referencing and managing policies within the firewall. &lt;BR /&gt;&lt;BR /&gt;For example, when you configure an access policy, the firewall assigns an ID number. This ID can be used to reference the policy in various commands and configurations. So when you view the access policy, either through the Command Line Interface (CLI) or the graphical user interface, you will see the ID number associated with the policy, not its name.&lt;BR /&gt;&lt;BR /&gt;This use of ID numbers instead of policy names allows for more efficient management of access policies within the firewall. It ensures that each policy can be uniquely identified, eliminating any ambiguity or confusion that might arise from using policy names. &lt;BR /&gt;&lt;BR /&gt;Thus, seeing ID numbers instead of policy names in Cisco FTD firewall access policies is a standard behaviour and does not indicate any issues or problems with the firewall.</description>
      <pubDate>Tue, 12 Sep 2023 11:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/showing-id-numbers-instead-of-policy-name-in-cisco-ftd-firewall/m-p/4922006#M1104183</guid>
      <dc:creator>Cisco_Virtual_Engineer</dc:creator>
      <dc:date>2023-09-12T11:07:18Z</dc:date>
    </item>
  </channel>
</rss>

