<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet is blocked as requested by snort with Prefilter anyany fast in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954241#M1105604</link>
    <description>&lt;P&gt;It is like &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; noted.&lt;/P&gt;
&lt;P&gt;A properly formed and applied prefilter policy with "clear conn" having been done afterwards will take Snort out of the path altogether.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Nov 2023 13:54:37 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2023-11-06T13:54:37Z</dc:date>
    <item>
      <title>Packet is blocked as requested by snort with Prefilter anyany fastpath</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4953566#M1105573</link>
      <description>&lt;P&gt;Is there any way that Snort can still block or drop a packet/traffic even if i already added a prefilter policy that sets as any any network and with fastpath? Also i have disabled all my access control policy except for default ACP that is set to "Trust All Traffic"&lt;/P&gt;&lt;P&gt;These are the diagnostic data gathered below, random users experienced dropped traffic specifically accesses to cloud servers.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;326: 12:06:43.000030 192.168.7.122.54741 &amp;gt; 20.189.173.14.443: P 1630889135:1630889364(229) ack 3677944706 win 1024&amp;nbsp;&lt;SPAN&gt;Drop-reason: (snort-block) Packet is blocked as requested by snort, Drop-location: frame 0x000055e9e3316112 flow (NA)/NA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;327: 12:06:43.257463 192.168.5.100.56591 &amp;gt; 142.251.221.3.443: P 91537800:91538757(957) ack 1105471243 win 512&amp;nbsp;&lt;SPAN&gt;Drop-reason: (snort-block) Packet is blocked as requested by snort, Drop-location: frame 0x000055e9e3316112 flow (NA)/NA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;328: 12:06:43.305953 192.168.9.102.55730 &amp;gt; 13.107.136.10.443: P 1070331683:1070331874(191) ack 3766062448 win 1024 Drop-reason: (snort-block) Packet is blocked as requested by snort, Drop-location: frame 0x000055e9e3316112 flow (NA)/NA&lt;/P&gt;&lt;P&gt;ASP Drop data below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image001.png" style="width: 967px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201618i32E13E9DC855F71F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image001.png" alt="image001.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image002.png" style="width: 970px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201619i5334CBE14D7C13CA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image002.png" alt="image002.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Are these drop counts normal or expected even after creating a fastpath inf pre filter policy and disabled all ACP rules and just retained the default action which is "TRUST ALL TRAFFIC" &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using FTD7.0.6 and FMC7.3.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Nov 2023 13:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4953566#M1105573</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-04T13:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954033#M1105598</link>
      <description>&lt;P&gt;the fastpath prefilter must allow all traffic pass without inspect via Snort.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;do you clear conn after add prefilter ?&lt;BR /&gt;&lt;BR /&gt;Thanks A Lot &lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 06:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954033#M1105598</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-06T06:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954241#M1105604</link>
      <description>&lt;P&gt;It is like &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; noted.&lt;/P&gt;
&lt;P&gt;A properly formed and applied prefilter policy with "clear conn" having been done afterwards will take Snort out of the path altogether.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 13:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954241#M1105604</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-11-06T13:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954559#M1105620</link>
      <description>&lt;P&gt;The counters have never been cleared, clear the counters and then review the output again to get an accurate picture of what is being dropped.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 22:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954559#M1105620</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-11-06T22:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954766#M1105623</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;&lt;P&gt;i have cleared the counters now and ran some packet capture and from the results i just gather all the data with DROP action. Here are the few of them below:&lt;/P&gt;&lt;P&gt;NOTE: These are the results when i added the pre-filter policy and used the ACP rule with allow all any any. I can see a lot of Phase 5, Access-List and Snort being dropped. Where can i check on these below more further?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;18: 07:37:37.427407 94.102.57.152.49370 &amp;gt; 61.245.4.9.443: S 2333418438:2333418438(0) win 29200 &amp;lt;mss 1460,sackOK,timestamp 1622119284 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;19: 07:37:37.463385 94.102.57.152.49416 &amp;gt; 61.245.4.9.443: S 386166707:386166707(0) win 29200 &amp;lt;mss 1460,sackOK,timestamp 1622119320 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;20: 07:37:37.567567 94.102.57.152.49562 &amp;gt; 61.245.4.9.443: S 1952941204:1952941204(0) win 29200 &amp;lt;mss 1460,sackOK,timestamp 1622119424 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;21: 07:37:38.064526 61.245.4.9.63298 &amp;gt; 188.172.208.139.5938: P 3659605041:3659605097(56) ack 419956790 win 1019&lt;BR /&gt;22: 07:37:38.138603 188.172.208.139.5938 &amp;gt; 61.245.4.9.63298: P 419956790:419956846(56) ack 3659605097 win 10310&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;171: 07:37:41.378734 54.192.150.44.443 &amp;gt; 61.245.4.9.64536: S 1880898966:1880898966(0) ack 379764042 win 65535 &amp;lt;mss 1440,nop,nop,sackOK,nop,wscale 9&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;178: 07:37:41.464773 54.192.150.44.443 &amp;gt; 61.245.4.9.12066: . ack 1165596856 win 65535&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;188: 07:37:41.482991 20.107.224.24.443 &amp;gt; 61.245.4.9.61721: . ack 2573826798 win 16387&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE1_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005623b4b75ccf flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;204: 07:37:41.581360 61.245.4.9.64536 &amp;gt; 54.192.150.44.443: P 379764042:379764359(317) ack 1880898967 win 128&lt;BR /&gt;205: 07:37:41.581512 52.27.216.242.443 &amp;gt; 61.245.4.9.64534: . ack 3247401357 win 110&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the ASP DROP result: No more Snort drop but there are a lot of other drops.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_1-1699345865960.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201827iFC00344F9CB13609/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tritontek_1-1699345865960.png" alt="Tritontek_1-1699345865960.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 08:31:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954766#M1105623</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-07T08:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954786#M1105626</link>
      <description>&lt;P&gt;can you share the packet tracer (after add detail keyword in end) with it result&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks A Lot &lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 08:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954786#M1105626</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-07T08:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954898#M1105632</link>
      <description>&lt;P&gt;You may find it useful to use the command "system support firewall-engine-debug" to troubleshoot a specific source or destination address.&lt;/P&gt;
&lt;P&gt;This article explains its use in detail:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214577-firepower-data-path-troubleshooting-phas.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214577-firepower-data-path-troubleshooting-phas.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 12:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4954898#M1105632</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-11-07T12:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955136#M1105651</link>
      <description>&lt;P&gt;Here are some counters a ran using Packet Tracer detailed and Packet Capture in FMC GUI. I have noticed that if i run some captures in FMC GUI snort drops some packets to an IP but when i run packet tracer detailed in CLI it gives me a pass or allow results which is so confusing and most of these IP adresses are from amazon, cloudfront and i am not sure if these are safe or not.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here are 2 of the few results below:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nslookup 52.222.174.37 - server-52-222-174-37.cdg50.r.cloudfront.net&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FROM FMC GUI PACKCAPTURE:&amp;nbsp;52.222.174.37&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;CAPTURE:&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;50:9A:4C:50:3B:89 -&amp;gt; CC:7F:76:49:EE:66 0800&lt;BR /&gt;172.21.1.10:50538 -&amp;gt; 52.222.174.37:443 proto 6 AS=0 ID=2 GR=1-1&lt;BR /&gt;Packet 1096542: TCP ***AP***, 11/07-18:26:15.709954, seq 1604190099, ack 3647251291, dsize 723&lt;BR /&gt;AppID: service: HTTPS(1122), client: SSL client(1296), payload: Cisco(2655), misc: (0)&lt;BR /&gt;Firewall: allow rule, 'INSIDE-TO-OUTSIDE_RULE' , allow&lt;BR /&gt;Policies: Network 0, Inspection 0, Detection 0&lt;BR /&gt;Verdict: pass&lt;BR /&gt;Snort Verdict: (block-packet) drop this packet&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (none) Not a blocking packet, Drop-location: frame 0x00005623b5a38112 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;108: 18:26:15.712426 52.222.174.37.443 &amp;gt; 172.21.1.10.50538: . ack 1604190822 win 64&lt;BR /&gt;109: 18:26:15.905913 52.222.174.37.443 &amp;gt; 172.21.1.10.50538: P 3647251291:3647251525(234) ack 1604190822 win 131&lt;BR /&gt;110: 18:26:15.906676 172.21.1.10.50538 &amp;gt; 52.222.174.37.443: P 1604190822:1604190886(64) ack 3647251525 win 1023&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FROM FTD CLI PACKET TRACE:&amp;nbsp;52.222.174.37&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input INSIDE_INT tcp 172.21.1.10 443 52.222.174.37 443 detailed&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;00:00:00:00:00:00 -&amp;gt; CC:7F:76:49:EE:66 0800&lt;BR /&gt;172.21.1.10:443 -&amp;gt; 52.222.174.37:443 proto 6 AS=0 ID=0 GR=1-1&lt;BR /&gt;Packet 518990: TCP ******S*, 11/07-18:27:48.479970, seq 1617196482, dsize 0&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service: (0), client: (0), payload: (0), misc: (0)&lt;BR /&gt;Firewall: allow rule, id 268453889, allow&lt;BR /&gt;Policies: Network 0, Inspection 0, Detection 0&lt;BR /&gt;Verdict: pass&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nslookup 44.225.146.46 - ec2-44-225-146-46.us-west-2.compute.amazonaws.com&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FROM FMC GUI PACKCAPTURE:&amp;nbsp;44.225.146.46&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;50:9A:4C:50:3B:89 -&amp;gt; CC:7F:76:49:EE:66 0800&lt;BR /&gt;172.21.1.10:50540 -&amp;gt; 44.225.146.46:443 proto 6 AS=0 ID=2 GR=1-1&lt;BR /&gt;Packet 1096558: TCP ***AP***, 11/07-18:26:21.619963, seq 3630937333, ack 3142007512, dsize 616&lt;BR /&gt;AppID: service: HTTPS(1122), client: SSL client(1296), payload: AppDynamics(7166), misc: (0)&lt;BR /&gt;Firewall: allow rule, 'INSIDE-TO-OUTSIDE_RULE' , allow&lt;BR /&gt;Policies: Network 0, Inspection 0, Detection 0&lt;BR /&gt;Verdict: pass&lt;BR /&gt;Snort Verdict: (block-packet) drop this packet&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE_INT(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (none) Not a blocking packet, Drop-location: frame 0x00005623b5a38112 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;150: 18:26:21.630399 44.225.146.46.443 &amp;gt; 172.21.1.10.50540: . ack 3630937949 win 128&lt;BR /&gt;151: 18:26:21.834002 44.225.146.46.443 &amp;gt; 172.21.1.10.50540: . 3142007512:3142008892(1380) ack 3630937949 win 110&lt;BR /&gt;152: 18:26:21.834032 44.225.146.46.443 &amp;gt; 172.21.1.10.50540: . 3142008892:3142010272(1380) ack 3630937949 win 110&lt;BR /&gt;153: 18:26:21.834490 172.21.1.10.50540 &amp;gt; 44.225.146.46.443: . ack 3142010272 win 1024&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FROM FTD CLI PACKET TRACE: 44.225.146.46&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;00:00:00:00:00:00 -&amp;gt; CC:7F:76:49:EE:66 0800&lt;BR /&gt;172.21.1.10:443 -&amp;gt; 44.225.146.46:443 proto 6 AS=0 ID=1 GR=1-1&lt;BR /&gt;Packet 850434: TCP ******S*, 11/07-18:29:30.859940, seq 1410578557, dsize 0&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service: (0), client: (0), payload: (0), misc: (0)&lt;BR /&gt;Firewall: allow rule, id 268453889, allow&lt;BR /&gt;Policies: Network 0, Inspection 0, Detection 0&lt;BR /&gt;Verdict: pass&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is so confusing, everytime i run trace or capture there will be a new IP that will be blocked or dropped by snort and mostly are from amazon AWS. I dont know where and why snort is blocking this since this is a legit and known IP with proper DNS record.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 18:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955136#M1105651</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-07T18:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955174#M1105655</link>
      <description>&lt;P&gt;do you deploy the ACP after add it?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks A Lot &lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 20:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955174#M1105655</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-07T20:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955239#M1105657</link>
      <description>&lt;P&gt;Yes sir! Definitely! Every changes we make we always deploy it to the device and we only have 1 device.&lt;/P&gt;&lt;P&gt;i am confused already, right now our FTD is connected to an isolated network and am not confident of this is ready for redeployment to the production network. Is this some kind of a bug?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 02:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955239#M1105657</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-08T02:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955378#M1105662</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;&lt;P&gt;may i ask what is the best way to bypass all inspection and just have a straight forward packet in and packet out. i think that is the best way for me to determine where the problem is. i want to disable all inspections first then enable them 1 by 1 to know which one is blocking and which one is not.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 06:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955378#M1105662</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-08T06:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955545#M1105664</link>
      <description>&lt;P&gt;You have not yet shared any screen shot of your prefilter policy or Access Control Policy. Either of those could be affecting your trace results. Otherwise, the title of this thread would generally work and have no issues.&lt;/P&gt;
&lt;P&gt;You also did not try the "system support firewall-engine-debug" and share the output that I suggested earlier.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 07:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955545#M1105664</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-11-08T07:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955610#M1105671</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;&lt;P&gt;Apologies, i forgot to attach the files. Here are the details below sir. I have also attached the debug txt file in this reply.&lt;/P&gt;&lt;P&gt;Here is my Pre-Filter Policy.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_0-1699432264476.png" style="width: 713px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201899iE4DBAF460B592D2F/image-dimensions/713x82?v=v2" width="713" height="82" role="button" title="Tritontek_0-1699432264476.png" alt="Tritontek_0-1699432264476.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here is my ACP, all the blocking rules are currently disabled.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_1-1699432326830.png" style="width: 706px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201900i34050BF5ACBD55FD/image-dimensions/706x270?v=v2" width="706" height="270" role="button" title="Tritontek_1-1699432326830.png" alt="Tritontek_1-1699432326830.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;and the ACP advanced settings i made&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_2-1699432421970.png" style="width: 753px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201901i7322E6B199A59157/image-dimensions/753x547?v=v2" width="753" height="547" role="button" title="Tritontek_2-1699432421970.png" alt="Tritontek_2-1699432421970.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem right now is that our FTD is now running in an isolated network where 1 PC is connected with necessary production apps and websites being used and accessed and whenever we re-integrate the FTD back to the production network that is the time the problem is rampant.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are some errors we had before we isolated the FTD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is Tekla Trimble Model Sharing queuing to cloud servers:&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_5-1699432943675.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201902i644A616496A7F6BE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tritontek_5-1699432943675.png" alt="Tritontek_5-1699432943675.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_6-1699432977114.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201903iF0E42F7C4934FD92/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tritontek_6-1699432977114.png" alt="Tritontek_6-1699432977114.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_8-1699433005207.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201904i06BF242FD6F99E1E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tritontek_8-1699433005207.png" alt="Tritontek_8-1699433005207.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This one is for VMWare Horizon connection to cloud servers:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_9-1699433052659.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201905i003A593BD91DF556/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tritontek_9-1699433052659.png" alt="Tritontek_9-1699433052659.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;right now production network without the FTD is running smoothly but everytime we join the FTD back to the network everyone gets crazy with this cloud server connections being dropped/blocked. This problem has been running for months on/off and randomly.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 08:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955610#M1105671</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-08T08:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955956#M1105675</link>
      <description>&lt;P&gt;The debug.txt doesn't show any drops or blocks so that is inconclusive.&lt;/P&gt;
&lt;P&gt;I notice in your ACP that you appear to have multiple outside interfaces. Are both active and, if so, how do you handle routing to ensure that nothing is ever asymmetric (i.e. outbound traffic goes out one interface while return traffic arrives on a different one)?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 19:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955956#M1105675</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-11-08T19:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955989#M1105679</link>
      <description>&lt;P&gt;Hi Sir, i have ran a new packet trace without pre-filter policy and i can see a lot of Snort drop and acl-drop including our Amazon and Azure cloud servers. that is the main concern we are facing that Snort is blocking our production servers from the cloud. i have attached the CLI log file and packet capture.&lt;/P&gt;&lt;P&gt;Regarding the 2 outside interface, as of now only 1 is active since it is in isolated network but when we integrate the FTD to the production 2 Outside interfaces will be utilized, I use metric 1 for my outside 1 and metric 2 for my outside2 and they are assigned into 2 different zones and i also have a PBR flexconfig so that i can distribute the internet usage into 2 depending on what vlans the users belong. see images below.&lt;/P&gt;&lt;P&gt;Hi Sir&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;i have posted it here everything including the system support logs&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_0-1699471852581.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201937i0C82FC4F831DD5E8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_0-1699471852581.png" alt="Tritontek_0-1699471852581.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_1-1699471873210.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201938i529DF9ABA8B98EC9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_1-1699471873210.png" alt="Tritontek_1-1699471873210.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_2-1699471901039.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201939i8EBA4FD3FB5DCB57/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_2-1699471901039.png" alt="Tritontek_2-1699471901039.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_3-1699471927446.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201940i17BD74FBE0168502/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_3-1699471927446.png" alt="Tritontek_3-1699471927446.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;see log files attached. this log files were captured while pre-filter policy, service policy was removed, ACP allow rule is active and ACP default action was set to Balanced Connectivity and Security. I am confused on how to deal with this one because i cannot afford to run a network with Pre-filter any any and fastpath since it is very vurnerable and it is also hard to add all our amazon cloud server IPs because some of our client's cloud server IP are in multi region and it changes from time to time. i dont know what really happend to this FTD but the issue just suddenly came out without doing anything. Maybe this is a bug? snort should only block/drop unregistered/broken/malicious packets but why block/drop amazon/azure IP packets?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 04:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4955989#M1105679</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-09T04:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956036#M1105681</link>
      <description>&lt;P&gt;I suppose you have the relevant NAT rules configured for this traffic flow?&lt;/P&gt;
&lt;P&gt;Could you do a "system support trace" from the&amp;nbsp; &amp;gt; prompt and then send some test traffic that is being dropped and post complete output here.&lt;/P&gt;
&lt;P&gt;When entering the values for the trace only enter the client and server IPs, leave everything else blank.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 21:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956036#M1105681</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-11-08T21:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956082#M1105690</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;BR /&gt;I make deep dive check all info you provide&lt;BR /&gt;rule 9 of ACP this in Lina permit any any but in Snort application opera VPN opera is Block.&lt;BR /&gt;can you remove it and but in end of ACP.&lt;/P&gt;
&lt;P&gt;Thanks A Lot &lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 23:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956082#M1105690</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-08T23:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956259#M1105699</link>
      <description>&lt;P&gt;Hi Sirs,&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;Here are the latest logs and setting made below:&lt;/DIV&gt;&lt;DIV class=""&gt;During the log capture these are the current settings on our FTD&lt;/DIV&gt;&lt;DIV class=""&gt;1) i removed all unecessary ACP rule and left only 1 allow rule with in to out zone any any&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_0-1699509781907.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201988i80587862B197562C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_0-1699509781907.png" alt="Tritontek_0-1699509781907.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) in ACP advanced tab, i set TLS = enabled, Pre-Filter Polic = Default Pre-filter, Intrusion Policy&amp;amp; Network analysis = Balanced Security and Connectivity with default set, Removed FTD Service Policy = 0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_1-1699509832663.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201989iC4F7E830D1A4AE96/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_1-1699509832663.png" alt="Tritontek_1-1699509832663.png" /&gt;&lt;/span&gt;&lt;P&gt;default pre-filter policy is empty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_2-1699509965347.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201990i62F8C3502AE8ADAF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_2-1699509965347.png" alt="Tritontek_2-1699509965347.png" /&gt;&lt;/span&gt;&lt;P&gt;3) removed the unused OUTSIDE2 interface, removed routing for OUTSIDE2, removed routing for OUTSIDE2, removed NAT for OUTSIDE2 and VPNs, since we are using OUTSIDE1 and INSIDE for now,&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_3-1699510041490.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201991i1FBA0055CE7F31C5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_3-1699510041490.png" alt="Tritontek_3-1699510041490.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_4-1699510094571.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201992i309958F39DD142A8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_4-1699510094571.png" alt="Tritontek_4-1699510094571.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_5-1699510136943.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201993iB843A0F61346C47A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_5-1699510136943.png" alt="Tritontek_5-1699510136943.png" /&gt;&lt;/span&gt;&lt;P&gt;and removed OUTSIDE2 in the platfrom settings DNS and ICMP.&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_6-1699510216321.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201994iF365E039F4CF483D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_6-1699510216321.png" alt="Tritontek_6-1699510216321.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tritontek_7-1699510247134.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/201995i4A2061FFEBCBA903/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tritontek_7-1699510247134.png" alt="Tritontek_7-1699510247134.png" /&gt;&lt;/span&gt;&lt;P&gt;4) removed RAVPN and S2S VPN confiurations to completely isolate the issue&lt;/P&gt;&lt;P&gt;5) removed OUTSIDE2 Zone and SLA MOnitor&amp;nbsp; to completely isolate the issue&lt;/P&gt;&lt;P&gt;So overall the traffic will just pass between INSIDE - OUTSIDE1 for now to see more clear troubleshooting.&lt;/P&gt;&lt;P&gt;Here are the logs from the system support trace and debug attached.&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: Prefilter policy, Service Policy removed, ACP rule allow all from in to out with default action balanced security and connectivity were set during the capture of these logs.&lt;/P&gt;&lt;P&gt;i have attached Packet Capture from FMC UI and Putty logs via FTD CLI. i have noticed a lot of snort drop and acl drop from these captures and i also noticed that it drops several amazon and azure ip addresses which is very odd.&lt;/P&gt;&lt;P&gt;Thank YOu So Much&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 09 Nov 2023 06:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956259#M1105699</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-09T06:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956428#M1105703</link>
      <description>&lt;P&gt;I suggest not remove ACP but remove application rule check connection&amp;nbsp;&lt;BR /&gt;then add it if the connection is success.&lt;BR /&gt;&lt;BR /&gt;Thanks A Lot &lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 13:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956428#M1105703</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-09T13:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: Packet is blocked as requested by snort with Prefilter anyany fast</title>
      <link>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956431#M1105704</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;If the poster is giving us the whole picture then there are no active rules with application defined.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 14:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-is-blocked-as-requested-by-snort-with-prefilter-anyany/m-p/4956431#M1105704</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-11-09T14:04:09Z</dc:date>
    </item>
  </channel>
</rss>

