<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD/FMC - Question about PREFILTER and ACP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006964#M1108484</link>
    <description>&lt;P&gt;I understand what you are trying to say and that someone reading this discussion might be mislead when reading that.&amp;nbsp; The fact of the matter is that&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;'s statement is not entirely incorrect.&amp;nbsp; The trick is that you need to understand what is enabled on your firewall and how the firewall works in different situations, and if you do not know, then start reading and learning.&lt;/P&gt;
&lt;P&gt;Here is a link to a document that explains a little on packet flow through the FTD when using the Trust action.&amp;nbsp; Pay attention to scenario 2 under ACP Trust Action.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html#anc19" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html#anc19&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 27 Jan 2024 09:59:34 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2024-01-27T09:59:34Z</dc:date>
    <item>
      <title>FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005471#M1108397</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;
&lt;P&gt;I have this confusion about FTD regarding actions in ACP and PREFILTER...&lt;/P&gt;
&lt;P&gt;Starting from the idea that:&lt;BR /&gt;In ACP action Trust= bypass any inspection/snort and is permited&lt;BR /&gt;In ACP action allow= permit but is passed to inspection/snort for further analysis&lt;/P&gt;
&lt;P&gt;Questions:&lt;BR /&gt;1- If my FTD does not do any inspection (has only Base license) what would be the difference between actions trust and allow in ACP?&lt;BR /&gt;I mean for example when I want to permit some traffic is it better to always use Trust or Allow?&lt;/P&gt;
&lt;P&gt;2-what would be the difference between Action Trust in ACP and action FastPath in PREFILTER ? I mean both bypass the inspection and permits traffic.&lt;/P&gt;
&lt;P&gt;I mean, If I do not use any inspection/snort/firepower , only L4 FW rules because I have only Base license for example is it better to only use PREFILTER rules and not using ACP at all?&lt;/P&gt;
&lt;P&gt;I understand that PREFILTER uses much less resources than ACP. Is this true even if I not use any inspection in ACP?&lt;/P&gt;
&lt;P&gt;Thank you in advance!&lt;BR /&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 13:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005471#M1108397</guid>
      <dc:creator>babalao</dc:creator>
      <dc:date>2024-01-25T13:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005540#M1108401</link>
      <description>&lt;P&gt;both FastPath and ACP filter L3/L4 traffic but the key is&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Cisco FTD Prefilter Policy is the first level of access control and&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;gives the capability to allow or filter a specific traffic at L3/L4 without the need to be forwarded to &lt;U&gt;CPU&lt;/U&gt; &lt;U&gt;intensive&lt;/U&gt; access control policy&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;. It is also known as “fastpath” because it quickly allows or denies traffic.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;the fastpath is filter traffic no in CPU the ACP filter it in CPU&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 14:07:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005540#M1108401</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-25T14:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005725#M1108409</link>
      <description>&lt;P&gt;Even if you only have base license on FTD you can still use few intelligent features, e.g. matching by application in ACP, which is very commonly used. If you don't want to use this feature, e.g. if you want to allow or block traffic by IP/ports only, you can configure either prefilter rules or regular ACP rules. This is your choice. In fact, it is never ever recommended to use application names when allowing or blocking traffic coming from the Internet to your DMZ or inside. The reason is: matching by application requires few packets to pass, until AppID is determined. This basically means that *all* of your TCP ports will appear open for the outside world and anyone on the Internet will be able to send you any number of SYN requests over all of 64K ports.&lt;/P&gt;&lt;P&gt;When it comes to performance/load, nobody actually knows the difference between prefilter and ACP rules, because there are to many factors to take into account: whether you use Snort2 or Snort3, the platform, traffic volume, etc. Both prefilter and ACP rules use CPU, but platform support varies. E.g. 4100/9300 dedicate few (many) CPU cores to Snort/AppID functions and the like, thus reducing the number of CPU cores used by Lina datapath and hence reducing overall throughput even if Snort/AppID functions are not used. On 2100 we have completely independent CPUs for Lina and Snort. This doesn't however mean that performance is not reduced when traffic is sent through the Lina-Snort queues for ACP processing: throughput can still be affected or those queues can get wedged or Snort process or thread can hang, etc.&lt;/P&gt;&lt;P&gt;So, while prefilter rules can be preferred if traffic/conn rate is high (e.g. for backups, bulk file transfers, etc.) many people don't bother and put everything into ACP as this simplifies rule management and logic.&lt;/P&gt;&lt;P&gt;Sorry, for not helping you )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 16:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005725#M1108409</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-25T16:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005735#M1108411</link>
      <description>&lt;P&gt;ACP l3/l4 and fastpath is available in base license.&lt;/P&gt;
&lt;P&gt;There is different between ACP and SI' SI netowrk need license but ACP is standard.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 16:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005735#M1108411</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-25T16:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005754#M1108412</link>
      <description>&lt;P&gt;&lt;EM&gt;2-what would be the difference between Action Trust in ACP and action FastPath in PREFILTER ? I mean both bypass the inspection and permits traffic&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Good question. I guess you may still need to disable Security Intelligence in the ACP, even if you only have Base license, to prevent packets from being sent to Snort for SI processing for ACP rules with "trust" action configured. But I'm not sure. Hopefully other members will comment.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 16:35:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005754#M1108412</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-25T16:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005987#M1108433</link>
      <description>&lt;P&gt;The Trust action can be a little misleading.&amp;nbsp; Though it does skip inspection and discovery, it is still subject to be sent to SNORT for QoS, Identity authentication, SSL decryption, etc.&amp;nbsp; However, in prefilter Fastpath the packet skips all SNORT inspections and just L3-L4 are considered.&amp;nbsp; If you are 100% sure you will not use any functions such as URL, QoS, User identity, etc. then putting everything in the prefilter would be an acceptable strategy.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html&lt;/A&gt;&lt;/P&gt;
&lt;TABLE id="id_29862__table_ack_bsj_3w" class="table frame-all table--pgwide-1" border="1" width="100%"&gt;
&lt;TBODY class="tbody"&gt;
&lt;TR&gt;
&lt;TD class="entry colsep-1 rowsep-1"&gt;
&lt;P class="p"&gt;Bypass capability&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry colsep-1 rowsep-1"&gt;
&lt;P class="p"&gt;Fastpath rule action.&lt;/P&gt;
&lt;P class="p"&gt;Fastpathing traffic in the prefilter stage bypasses all further inspection and handling, including:&lt;/P&gt;
&lt;UL id="id_29862__ul_nkv_ddk_3w" class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Security Intelligence&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;authentication requirements imposed by an identity policy&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;SSL decryption&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;access control rules&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;deep inspection of packet payloads&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;discovery&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;rate limiting&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD class="entry colsep-1 rowsep-1"&gt;
&lt;P class="p"&gt;Trust rule action.&lt;/P&gt;
&lt;P class="p"&gt;Traffic trusted by access control rules is only exempt from deep inspection and discovery.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 25 Jan 2024 22:59:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5005987#M1108433</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-25T22:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006607#M1108462</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;for example if my FTD is having resource problems and I am sure I am not going to use inspection/snort in the future, would it be beneficial if I would do all the filtering in PREFILTER instead of ACP? I mean I would migrate all the rules in ACP to PREFILTER...&lt;/P&gt;
&lt;P&gt;Another question, what king of traffic you would ALWAYS put in PREFILTER?&lt;/P&gt;
&lt;P&gt;I have heard about , large backups,things you always want to block,and VoIP traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you all.&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 18:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006607#M1108462</guid>
      <dc:creator>babalao</dc:creator>
      <dc:date>2024-01-26T18:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006622#M1108463</link>
      <description>&lt;P&gt;for example if my FTD is having resource problems and I am sure I am not going to use inspection/snort in the future, would it be beneficial if I would do all the filtering in PREFILTER instead of ACP? I mean I would migrate all the rules in ACP to PREFILTER...&lt;/P&gt;
&lt;P&gt;both ACP and Prefilter is done in LINA not in Snort, you can use both if you dont want to use Snort&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another question, what king of traffic you would ALWAYS put in PREFILTER?&lt;/P&gt;
&lt;P&gt;Elephant traffic, need fastpath (prefilter)&lt;/P&gt;
&lt;P&gt;I have heard about , large backups,things you always want to block,and VoIP traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; correct backup is Elephant and VoIP is need low jitter delay so prefilter fastpath these traffic is recommend&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 19:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006622#M1108463</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-26T19:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006637#M1108466</link>
      <description>&lt;P&gt;Basically any traffic that you trust 100% can go into prefilter Fastpath.&amp;nbsp; This type of traffic would include scheduled backups, periodic file transfer between servers, and vulnerability scans (such as Qualys) which can degrade the network performance.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 19:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006637#M1108466</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-26T19:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006685#M1108469</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;so if for example I have hundreds of ACP rules witch action ALLOW (which I understand passes through snort), to lessen the system resources of the FTD, would be a good idea to migrate all this rules to PREFILTER with action FASTPATH ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thnak you!&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 21:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006685#M1108469</guid>
      <dc:creator>babalao</dc:creator>
      <dc:date>2024-01-26T21:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006946#M1108477</link>
      <description>&lt;P&gt;&lt;EM&gt;both ACP and Prefilter is done in LINA not in Snort, you can use both if you dont want to use Snort&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;This is absolutely not correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 09:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006946#M1108477</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-27T09:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006949#M1108478</link>
      <description>&lt;P&gt;This is partially correct.&amp;nbsp; If you use ACP the traffic can still be subject to being sent to SNORT even if you have the Trust action applied.&amp;nbsp; It doesn't have to be an intrusion policy or file / malware policy.&amp;nbsp; If you want to use URL filtering or QoS for example, this traffic will be sent to the SNORT process for further processing.&amp;nbsp; The only way to truly not send traffic to SNORT is through prefilter.&lt;/P&gt;
&lt;P&gt;However, if the ACP rule only references IPs and ports, and nothing else, and the Trust action is applied, traffic will bypass the SNORT process.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 09:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006949#M1108478</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-27T09:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006955#M1108479</link>
      <description>&lt;P&gt;Right. But I insist that "&lt;EM&gt;both ACP and Prefilter is done in LINA not in Snort, you can use both if you dont want to use Snort"&lt;/EM&gt; is totally incorrect as it says that &lt;U&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;/U&gt; ACP policy is evaluated by Lina and not by Snort. Think of other not so experienced engineers who might read this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 09:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006955#M1108479</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-27T09:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006956#M1108480</link>
      <description>&lt;P&gt;This depends on your company's security policies and if they permit such a move.&amp;nbsp; I would not recommend moving ALL traffic to prefilter.&amp;nbsp; If anything I would suggest only moving traffic that flows between servers, MGMT traffic (I.E. syslog, SNMP, Netflow, etc).&amp;nbsp; traffic from clients should always be subject to inspection in SNORT.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also enable Elephant flow remediation if your FTD device supports it (not supported on FTD 2100 devices).&amp;nbsp; This will also help in reducing the strain on the FTD device.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 09:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006956#M1108480</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-27T09:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006961#M1108482</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD OOO reference.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/208886i5E95A84984857057/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD OOO reference.PNG" alt="FTD OOO reference.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp;all your info is little go learn new info about new FW and then talk&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 09:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006961#M1108482</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-27T09:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006963#M1108483</link>
      <description>&lt;P&gt;if you have firepower then making all traffic bypass Snort making FW dont have any rule to secure your network.&lt;BR /&gt;start classify your traffic&amp;nbsp;&lt;BR /&gt;so NO&amp;nbsp;&lt;BR /&gt;making all traffic fastpath not good idea&amp;nbsp;&lt;BR /&gt;thanks&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 09:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006963#M1108483</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-27T09:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006964#M1108484</link>
      <description>&lt;P&gt;I understand what you are trying to say and that someone reading this discussion might be mislead when reading that.&amp;nbsp; The fact of the matter is that&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;'s statement is not entirely incorrect.&amp;nbsp; The trick is that you need to understand what is enabled on your firewall and how the firewall works in different situations, and if you do not know, then start reading and learning.&lt;/P&gt;
&lt;P&gt;Here is a link to a document that explains a little on packet flow through the FTD when using the Trust action.&amp;nbsp; Pay attention to scenario 2 under ACP Trust Action.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html#anc19" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html#anc19&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 09:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006964#M1108484</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-27T09:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/FMC - Question about PREFILTER and ACP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006974#M1108488</link>
      <description>&lt;P&gt;Yeah,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;, "not entirely incorrect" is more close to reality than "partially correct". I agree.&lt;/P&gt;&lt;P&gt;I know all this stuff, but thank you for the link anyway. What I don't know and this document doesn't explain is whether ACP "trust" action in L3/L4 ACP rule is still programmed as "permit" to Lina due to SI black list applied to ACP by default, resulting in SYN packets being sent to Snort for processing, provided that customer has &lt;U&gt;base license only&lt;/U&gt; and didn't configure other policies or features, such as identity policy, etc. (of course such things as URLF, AMP, etc cannot be configured in case of base license by definition).&lt;/P&gt;&lt;P&gt;Note that "base license" was mentioned in the initial question, but nobody addressed this concern yet.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;PRE&gt;&lt;EM&gt;2-what would be the difference between Action Trust in ACP and action FastPath in PREFILTER ?&lt;BR /&gt;I mean both bypass the inspection and permits traffic&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;Good question. I guess you may still need to disable Security Intelligence in the ACP, even if you only have Base license,&lt;BR /&gt;to prevent packets from being sent to Snort for SI processing for ACP rules with "trust" action configured. But I'm not sure.&lt;BR /&gt;Hopefully other members will comment.&lt;/PRE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 10:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-question-about-prefilter-and-acp/m-p/5006974#M1108488</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-27T10:40:35Z</dc:date>
    </item>
  </channel>
</rss>

