<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exclude device from IPS policy? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/4928481#M1104498</link>
    <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;I'm using FMC&amp;nbsp;&lt;SPAN&gt;Version&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;7.2.4.1, I only can see option of Intrusion&amp;nbsp;policy "No Active Rules" is it choose that one? as below, because i want to by pass my source IP being blocked by IPS, because we are currently perform vulnerability&amp;nbsp;assessment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azlanmy07_0-1695627204548.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198130iD50C2E82D677CA70/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Azlanmy07_0-1695627204548.png" alt="Azlanmy07_0-1695627204548.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 25 Sep 2023 07:34:51 GMT</pubDate>
    <dc:creator>Azlan.my07</dc:creator>
    <dc:date>2023-09-25T07:34:51Z</dc:date>
    <item>
      <title>Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814519#M1010710</link>
      <description>&lt;P&gt;Assuming you're using FMC, how would you exclude a given IP address from a specific IPS alert?&amp;nbsp; For example, system traffic was blocked due to a specific malware definition but it was determined that the traffic was legitimate and you only want to exclude that particular system from being blocked?&amp;nbsp; I've looked in several places but cannot figure out how to do this?&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 20:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814519#M1010710</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2019-03-05T20:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814669#M1010711</link>
      <description>&lt;P&gt;Whitelist the address in your Access Control Policy (under Security Intelligence tab).&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 04:06:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814669#M1010711</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-06T04:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814942#M1010712</link>
      <description>&lt;P&gt;Wouldn't that whitelist it for all IPS alerts?&amp;nbsp; I only want to whitelist if for a specific alert, a specific malware alert that it triggered.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 14:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814942#M1010712</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2019-03-06T14:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814993#M1010713</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282485"&gt;@david&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Wouldn't that whitelist it for all IPS alerts?&amp;nbsp; I only want to whitelist if for a specific alert, a specific malware alert that it triggered.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;If the purpose is to suppress &lt;SPAN&gt;intrusion event notification (alert) for a specific host, then it is configured in the Intrusion Policy -&amp;gt; Suppression. It can be based on either source or destination addresses. This suppresses only notification, while the rule itself will be active.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the purpose is to disable only a specific Snort rule (s) for a specific host(s), while leaving other rules enabled, then additional IPS policy with desired configuration can be created and applied in a separate access control rule.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There is one more way to configure dynamic state for an IPS rule, although dynamic state is not strictly for this purpose. It allows to change the state of the rule based on the number of rule matches per time period. The timeout field there defines how long the new state will be in force. If it is 0, then new state will always be in force. Dynamic state requires a rule to be fired at least once.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 15:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3814993#M1010713</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-06T15:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3815071#M1010714</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282485"&gt;@david&lt;/a&gt;&amp;nbsp;yes it would exclude the host for all IPS rules.&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/368590"&gt;@Ilkin&lt;/a&gt;&amp;nbsp;'s solution is the more precise application of policy to achieve your stated goals.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 17:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3815071#M1010714</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-06T17:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3815193#M1010715</link>
      <description>&lt;P&gt;Thanks guys, is this documented anywhere?&amp;nbsp; I see where you're heading, but not sure of the steps to create new IPS policy to be used in access control rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My scenario is this &amp;gt; "&lt;SPAN&gt;If the purpose is to disable only a specific Snort rule (s) for a specific host(s), while leaving other rules enabled, then additional IPS policy with desired configuration can be created and applied in a separate access control rule."&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 20:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3815193#M1010715</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2019-03-06T20:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3815463#M1010716</link>
      <description>&lt;P&gt;First go to Policies &amp;gt; Intrusion Policy &amp;gt; Create a Policy. Create and edit a new one. Disable that one rule for this new policy. (Select the rule, click on Rule State and then Disable). Save the Intrusion Policy.&lt;/P&gt;
&lt;P&gt;Then go into your Access Control Policy. Add a rule there for the host (or modify an existing one if such exists). Under the "Inspection" tab, choose the newly created intrusion policy. Save the ACP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Deploy the changes and test to verify.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 08:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3815463#M1010716</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-07T08:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3816033#M1010717</link>
      <description>&lt;P&gt;Thanks Marvin, that was very helpful!&amp;nbsp; One final question, the alert was triggered by a single host behind a single SFR.&amp;nbsp; The current access control policy targets 100+ devices.&amp;nbsp; Is it cleaner to copy/rename both the current IPS and Access Control Policy, edit the copied IPS policy to disable rule state of offending snort rule, edit copied access control policy with a new rule that references edited IPS policy and then assign (Policy Assignment) only to the offending SFR?&amp;nbsp; or is it cleaner to insert a new access rule into the current Access Control Policy?&amp;nbsp; I'm not clear if doing the later forces me to deploy the change to all 100+ devices vs. deploying to a single device.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 00:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3816033#M1010717</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2019-03-08T00:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3816133#M1010718</link>
      <description>&lt;P&gt;If the ACP is targeting all those devices, any change will show as pending on all of them.&lt;/P&gt;
&lt;P&gt;You can elect to deploy to only the one you need for now, but eventually something else (like Cisco's Snort Rule Update or new VDB) will likely trigger the mass deployment.&lt;/P&gt;
&lt;P&gt;As to which is easier or better, you can make an argument either way. A lot depends on your operational model / practice. I'd definitely make the second IPS policy. If it were me, I would probably edit the overall ACP and just deploy it to the necessary sensor for now.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 07:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/3816133#M1010718</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-08T07:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/4530185#M1086361</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you sure?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need exactly &lt;A href="https://community.cisco.com/t5/network-security/exclude-source-ip-address-from-ips-inspection-on-ftd/m-p/4530122#M1086356" target="_self"&gt;this&lt;/A&gt; but I believe that adding a host to Security intelligence whitelist will not exclude it from IPS inspection.&lt;/P&gt;&lt;P&gt;At least according the documentation:&lt;/P&gt;&lt;P&gt;Traffic added to a Do Not Block list or monitored at the Security Intelligence stage is intentionally subject to further analysis with the rest of access control.&lt;/P&gt;&lt;P&gt;Reference URL: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/security_intelligence_blacklisting.html#ID-2192-00000005" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/security_intelligence_blacklisting.html#ID-2192-00000005&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 13:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/4530185#M1086361</guid>
      <dc:creator>borutlape</dc:creator>
      <dc:date>2022-01-12T13:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/4928481#M1104498</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;I'm using FMC&amp;nbsp;&lt;SPAN&gt;Version&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;7.2.4.1, I only can see option of Intrusion&amp;nbsp;policy "No Active Rules" is it choose that one? as below, because i want to by pass my source IP being blocked by IPS, because we are currently perform vulnerability&amp;nbsp;assessment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azlanmy07_0-1695627204548.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198130iD50C2E82D677CA70/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Azlanmy07_0-1695627204548.png" alt="Azlanmy07_0-1695627204548.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 07:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/4928481#M1104498</guid>
      <dc:creator>Azlan.my07</dc:creator>
      <dc:date>2023-09-25T07:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude device from IPS policy?</title>
      <link>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/4928513#M1104505</link>
      <description>&lt;P&gt;Make a prefilter policy with a rule to fastpath the traffic from your source IP. That will bypass all of the Snort, SI, preprocessor etc. stages in the firewall.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/ngfw-policy-order-of-operations/td-p/3834389" target="_blank"&gt;https://community.cisco.com/t5/network-security/ngfw-policy-order-of-operations/td-p/3834389&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 08:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/exclude-device-from-ips-policy/m-p/4928513#M1104505</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-09-25T08:46:31Z</dc:date>
    </item>
  </channel>
</rss>

