<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft Updates File Resume Block in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959406#M1105844</link>
    <description>&lt;P&gt;Can you show the ACP rules created if possible? Can you run show asp drop from the ftd cli? Also can you check if TLS in advanced tab under ACP is enabled? (&lt;SPAN&gt;This is done under Access Control Policy &amp;gt; Advanced &amp;gt; TLS Server Identity Discovery &amp;gt; Early Application Detection&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Nov 2023 18:43:04 GMT</pubDate>
    <dc:creator>Tritontek</dc:creator>
    <dc:date>2023-11-14T18:43:04Z</dc:date>
    <item>
      <title>Microsoft Updates File Resume Block</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959126#M1105836</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;We recently upgraded our FMC and a few of our FTDs to version 7.0.5. Since then, those FTDs have been blocking Microsoft Updates with the reason "File Resume Block" even though they're trusted. Has anyone else experienced this? We have a few FTDs still on 6.6.x and they aren't blocking the updates. I tried adding an ACL rule to allow the URLs and the application type of "Microsoft" and "Microsoft Update" but that didn't work.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 14:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959126#M1105836</guid>
      <dc:creator>Cole Riese</dc:creator>
      <dc:date>2023-11-14T14:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Updates File Resume Block</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959406#M1105844</link>
      <description>&lt;P&gt;Can you show the ACP rules created if possible? Can you run show asp drop from the ftd cli? Also can you check if TLS in advanced tab under ACP is enabled? (&lt;SPAN&gt;This is done under Access Control Policy &amp;gt; Advanced &amp;gt; TLS Server Identity Discovery &amp;gt; Early Application Detection&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 18:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959406#M1105844</guid>
      <dc:creator>Tritontek</dc:creator>
      <dc:date>2023-11-14T18:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Updates File Resume Block</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959420#M1105846</link>
      <description>&lt;P&gt;Here is the ACP rule:&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ColeRiese_0-1699988227182.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202445iAA346A1BDB3D731B/image-size/large?v=v2&amp;amp;px=999" role="button" title="ColeRiese_0-1699988227182.png" alt="ColeRiese_0-1699988227182.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here is the output of show asp drop:&lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;Flow is being freed (flow-being-freed) 63186&lt;BR /&gt;Invalid TCP Length (invalid-tcp-hdr-length) 45&lt;BR /&gt;No route to host (no-route) 573&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 3481486&lt;BR /&gt;Invalid SPI (np-sp-invalid-spi) 4&lt;BR /&gt;First TCP packet not SYN (tcp-not-syn) 348913&lt;BR /&gt;Bad TCP flags (bad-tcp-flags) 9&lt;BR /&gt;TCP failed 3 way handshake (tcp-3whs-failed) 149439&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 1391071&lt;BR /&gt;TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff) 4529&lt;BR /&gt;TCP ACK in SYNACK invalid (tcp-ack-syn-diff) 9&lt;BR /&gt;TCP SYNACK on established conn (tcp-synack-ooo) 290&lt;BR /&gt;TCP packet SEQ past window (tcp-seq-past-win) 8050&lt;BR /&gt;TCP invalid ACK (tcp-invalid-ack) 3043&lt;BR /&gt;TCP RST/SYN in window (tcp-rst-syn-in-win) 884&lt;BR /&gt;TCP packet failed PAWS test (tcp-paws-fail) 20&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 14667&lt;BR /&gt;ICMP Inspect bad icmp code (inspect-icmp-bad-code) 1&lt;BR /&gt;ICMP Inspect seq num not matched (inspect-icmp-seq-num-not-matched) 11&lt;BR /&gt;DNS Inspect invalid domain label (inspect-dns-invalid-domain-label) 1411&lt;BR /&gt;DNS Inspect id not matched (inspect-dns-id-not-matched) 542&lt;BR /&gt;Snort requested to drop the frame (snort-drop) 149350&lt;BR /&gt;Snort instance is busy (snort-busy) 4581&lt;BR /&gt;FP L2 rule drop (l2_acl) 6229&lt;BR /&gt;Dropped pending packets in a closed socket (np-socket-closed) 894104&lt;BR /&gt;Async lock queue limit exceeded (async-lock-queue-limit) 72&lt;BR /&gt;NAT failed (nat-xlate-failed) 294&lt;BR /&gt;TCP Proxy retransmited packet drop (tcp-proxy-retransmit-drop) 171004&lt;BR /&gt;TCP Proxy FP2LW enqueue limit reached (tcp-proxy-fp2lw-enqueue-limit-drop) 7&lt;BR /&gt;TCP Proxy invalid TCP checksum drop (tcp-proxy-invalid-tcp-checksum-drop) 22&lt;BR /&gt;Packet is unknown or traced (a-module) 1&lt;BR /&gt;Blocked or blacklisted by the firewall preprocessor (firewall) 2534080&lt;BR /&gt;Blocked or blacklisted by the stream preprocessor (stream) 878&lt;BR /&gt;Blocked or blacklisted by the reputation preprocessor (reputation) 69&lt;BR /&gt;Blocked or blacklisted by the file process preprocessor (file-process) 35202&lt;BR /&gt;Packet is blacklisted by snort (snort-blacklist) 27911652&lt;BR /&gt;Packet is blocked as requested by snort (snort-block) 15519861&lt;BR /&gt;Packet is dropped silently as requested by snort (snort-silent-drop) 822035&lt;BR /&gt;Dispatch queue tail drops (dispatch-queue-limit) 177745&lt;/P&gt;&lt;P&gt;Last clearing: 19:19:37 UTC Aug 17 2023 by enable_15&lt;/P&gt;&lt;P&gt;Flow drop:&lt;BR /&gt;Inspection failure (inspect-fail) 13418&lt;/P&gt;&lt;P&gt;Last clearing: 19:19:37 UTC Aug 17 2023 by enable_15&lt;/P&gt;&lt;P&gt;Yes, TLS is enabled.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 18:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959420#M1105846</guid>
      <dc:creator>Cole Riese</dc:creator>
      <dc:date>2023-11-14T18:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Updates File Resume Block</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959751#M1105857</link>
      <description>&lt;P&gt;check this out. ---&amp;gt;&amp;nbsp;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwf35573" target="_blank" rel="noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCwf35573&lt;/A&gt;&lt;/P&gt;&lt;P&gt;try disabling TLS and rerun the updates. If still having issues try to check the block rules you created above that rule # 12 maybe there is a conflicting block rule that may affect your allow rule.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 08:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-updates-file-resume-block/m-p/4959751#M1105857</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2023-11-15T08:57:50Z</dc:date>
    </item>
  </channel>
</rss>

