<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Filter Logs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942453#M1105158</link>
    <description>&lt;P&gt;Thank you, similarly of any traffic getting dropped because if IPS rules, it will be listed under&amp;nbsp; "Intrusion" right?&lt;/P&gt;</description>
    <pubDate>Tue, 17 Oct 2023 17:17:42 GMT</pubDate>
    <dc:creator>taro75</dc:creator>
    <dc:date>2023-10-17T17:17:42Z</dc:date>
    <item>
      <title>FTD Filter Logs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942333#M1105147</link>
      <description>&lt;P&gt;I am managing FTD from FDM web console and I need to look for logs for dropped/denied packets. How can I define custom filter for monitoring denied logs?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 14:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942333#M1105147</guid>
      <dc:creator>taro75</dc:creator>
      <dc:date>2023-10-17T14:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Filter Logs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942438#M1105156</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1482645"&gt;@taro75&lt;/a&gt; under Monitoring &amp;gt; Events&amp;gt; Connections, define a filter "Rule Action=Block". Ensure the ACP rules log the traffic.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1697561583568.png" style="width: 667px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/199909iC6CD3C0D3477BC3E/image-dimensions/667x195?v=v2" width="667" height="195" role="button" title="RobIngram_0-1697561583568.png" alt="RobIngram_0-1697561583568.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 16:54:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942438#M1105156</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-17T16:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Filter Logs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942453#M1105158</link>
      <description>&lt;P&gt;Thank you, similarly of any traffic getting dropped because if IPS rules, it will be listed under&amp;nbsp; "Intrusion" right?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 17:17:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942453#M1105158</guid>
      <dc:creator>taro75</dc:creator>
      <dc:date>2023-10-17T17:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Filter Logs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942457#M1105161</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1482645"&gt;@taro75&lt;/a&gt; yes correct&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 17:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-filter-logs/m-p/4942457#M1105161</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-17T17:21:25Z</dc:date>
    </item>
  </channel>
</rss>

