<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Prefilter Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009459#M1108620</link>
    <description>&lt;P&gt;maybe this will be helpful. The CLI shows the following rules are being allowed. I don't have any rules like this configured in my fastpath and so they must be defaults. I've read a few other posts on this topic but don't believe I saw any definitive answers. I'm trying to determine if this type of traffic is actually getting through or if its only a few packets before the IPS blocks it. Either way how can I determine this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dcanady55_0-1706650669387.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209230i02E9642408AEA5BE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dcanady55_0-1706650669387.png" alt="dcanady55_0-1706650669387.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2024 21:40:22 GMT</pubDate>
    <dc:creator>dcanady55</dc:creator>
    <dc:date>2024-01-30T21:40:22Z</dc:date>
    <item>
      <title>FTD Prefilter Question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009151#M1108599</link>
      <description>&lt;P&gt;FTD &amp;amp; FMC 7.3&lt;/P&gt;&lt;P&gt;Inside my prefilter policy, I have a few prefilter rules and no tunnel rules, but my default action under tunnel traffic is to analyze all tunnel traffic. The CLI shows there are hits for this traffic, but I'm assuming if there are no rules in my ACP, this traffic would be dropped. How can I prove that's the case? The logging icon next to the default action is grayed out and won't let me log anything, which makes me think you cannot log anything unless you have a tunnel rule. If I grab the rule ID off the CLI and filter for this under unified events, nothing gets returned.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 15:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009151#M1108599</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2024-01-30T15:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Prefilter Question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009236#M1108604</link>
      <description>&lt;P&gt;FTD&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Outer header check by prefilter (you can fastpath it)&lt;/P&gt;
&lt;P&gt;Inner header check by ACP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Inner header check by Snort&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seem to me that inner header is allow by ACP.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 16:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009236#M1108604</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-30T16:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Prefilter Question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009379#M1108611</link>
      <description>&lt;P&gt;Is there away to verify the packets are being dropped?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 20:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009379#M1108611</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2024-01-30T20:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Prefilter Question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009436#M1108617</link>
      <description>&lt;P&gt;sorry I dont get last reply,&amp;nbsp;&lt;BR /&gt;we talking about tunnel traffic, which tunnel we talk about GRE or other tunnel ?&lt;BR /&gt;thanks&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 21:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009436#M1108617</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-30T21:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Prefilter Question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009459#M1108620</link>
      <description>&lt;P&gt;maybe this will be helpful. The CLI shows the following rules are being allowed. I don't have any rules like this configured in my fastpath and so they must be defaults. I've read a few other posts on this topic but don't believe I saw any definitive answers. I'm trying to determine if this type of traffic is actually getting through or if its only a few packets before the IPS blocks it. Either way how can I determine this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dcanady55_0-1706650669387.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209230i02E9642408AEA5BE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dcanady55_0-1706650669387.png" alt="dcanady55_0-1706650669387.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 21:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009459#M1108620</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2024-01-30T21:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Prefilter Question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009472#M1108621</link>
      <description>&lt;P&gt;Prefilter tunnel allow traffic and as I mention the outer IP header is allow by prefilter.&lt;/P&gt;
&lt;P&gt;I See GRE so it not encrypt can you check the inner IP header&amp;nbsp; if you can add ACP rule drop inner ip head (drop with log) and you will see how ACP filter tunnel traffic.&lt;/P&gt;
&lt;P&gt;Note:- Ypu can use capture to see inner ip header&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 22:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009472#M1108621</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-30T22:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Prefilter Question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009500#M1108624</link>
      <description>&lt;P&gt;You could run&amp;nbsp; &lt;STRONG&gt;system support trace&lt;/STRONG&gt; and enable firewall-engine-debug in the CLI.&amp;nbsp; This should show all actions taken by both LINA and SNORT.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 23:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-prefilter-question/m-p/5009500#M1108624</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-30T23:03:41Z</dc:date>
    </item>
  </channel>
</rss>

