<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet being dropped by Snort in FTD despite hitting valid policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010350#M1108660</link>
    <description>&lt;P&gt;I now see that SYN packet generated by packet-tracer hits "test-acp-rule", but this rule is not hit in Snort. FQDN is used by both of you, &lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97213" target="_blank"&gt;@atsukane&lt;/A&gt; and &lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1674667" target="_blank"&gt;@Shomi&lt;/A&gt; , not sure about GEO. Get rid of FQDN for test?&lt;/P&gt;&lt;PRE&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 Starting AC with minimum 1670, 'test-acp-rule', and SrcZone first with zones 24 -&amp;gt; 28, geo 0 -&amp;gt; 0, vlan 0, source sgt type: 0, source sgt tag: 0, ISE sgt id: 0, dest sgt type: 0, ISE dest sgt tag: 0, svc 0, payload 0, client 0, misc 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1670, 'test-acp-rule', src network, FQDN and GEO&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2024 14:37:47 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2024-01-31T14:37:47Z</dc:date>
    <item>
      <title>Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010292#M1108652</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I'm fairly new to Cisco FTD so I'm wondering if anyone here can help me with an issue I'm currently having on my network. I can't seem to be able to reach a server via port 80/HTTP and I can see the traffic hitting my firewall rule &lt;STRONG&gt;"test-acp-rule"&lt;/STRONG&gt; but Snort is dropping it for some reason (see packet tracer result below). I run a debug and issued the packet tracer again but can't seem to figure out what the issue is from the output of the debug (see the debug output further down). At this stage I don't want to bypass Snort so I'm wondering if anyone can help. Many thanks in advance.&lt;/P&gt;&lt;P&gt;packet-tracer input cloud-1 tcp 172.16.10.1 1234 192.168.100.10 80 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 30726 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside-1,cloud-1) source static local-range-grp local-range-grp destination static CLOUD_PCS-GRP CLOUD_PCS-GRP description NONAT FOR VPNS to Outside&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside-1(vrfid:0)&lt;BR /&gt;Untranslate 192.168.100.10/80 to 192.168.100.10/80&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 27&lt;BR /&gt;Destination Object Group Match Count: 10&lt;BR /&gt;Object Group Search: 270&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 341 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group LAB_FW_ACL_ global&lt;BR /&gt;access-list LAB_FW_ACL_ advanced permit tcp ifc cloud-1 object-group FMC_INLINE_src_rule_111111111 ifc inside-1 object-group FMC_INLINE_dst_rule_111111111 object-group HTTP rule-id 111111111&lt;BR /&gt;access-list LAB_FW_ACL_ remark rule-id 111111111: ACCESS POLICY: LAB-TEST-ACP - Default&lt;BR /&gt;access-list LAB_FW_ACL_ remark rule-id 111111111: L7 RULE: test-acp-rule&lt;BR /&gt;object-group network FMC_INLINE_src_rule_111111111(hitcnt=0)&lt;BR /&gt;network-object object lab-pc-1(hitcnt=0)&lt;BR /&gt;network-object object lab-pc-2(hitcnt=0)&lt;BR /&gt;network-object object lab-pc-3(hitcnt=0)&lt;BR /&gt;object-group network FMC_INLINE_dst_rule_111111111(hitcnt=175)&lt;BR /&gt;network-object object cloud-pc-1(hitcnt=95)&lt;BR /&gt;network-object object cloud-pc-2(hitcnt=80)&lt;BR /&gt;object-group service HTTP tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 341 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 341 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside-1,cloud-1) source static local-range-grp local-range-grp destination static CLOUD_PCS-GRP CLOUD_PCS-GRP description NONAT FOR VPNS to Outside&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.10.1/1234 to 172.16.10.1/1234&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 341 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 341 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 29019 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 2845 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 11380 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside-1,cloud-1) source static local-range-grp local-range-grp destination static CLOUD_PCS-GRP CLOUD_PCS-GRP description NONAT FOR VPNS to Outside&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 41537 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 1707 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 48934 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 442007830, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13087 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 1097601 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Packet: TCP, SYN, seq 33333333&lt;BR /&gt;Session: deleting snort session, reason: stale and not cleaned&lt;BR /&gt;Session: deleted snort session using 0 bytes; protocol id:(5) : LWstate 0x0 LWFlags 0x0&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: block rule, id 222222222, drop&lt;BR /&gt;Snort: processed decoder alerts or actions queue, drop&lt;BR /&gt;Snort id 9, NAP id 2, IPS id 0, Verdict BLOCKFLOW, Blocked by Firewall&lt;BR /&gt;Snort Verdict: (black-list) black list this flow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: cloud-1(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside-1(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 1278541 ns&lt;BR /&gt;Drop-reason: (firewall) Blocked or blacklisted by the firewall preprocessor, Drop-location: frame 0x000000aaae0c1ff0 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;system support trace&lt;BR /&gt;Enable firewall-engine-debug too? [n]: y&lt;BR /&gt;Please specify an IP protocol: tcp&lt;BR /&gt;Please specify a client IP address: 172.16.10.1&lt;BR /&gt;Please specify a client port:&lt;BR /&gt;Please specify a server IP address: 192.168.100.10&lt;BR /&gt;Please specify a server port: 80&lt;BR /&gt;WARNING: Running trace with generic filters might cause CPU spike&lt;BR /&gt;Monitoring packet tracer and firewall debug messages&lt;/P&gt;&lt;P&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 Packet: TCP, SYN, seq 33333333&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 Session: deleting snort session, reason: stale and not cleaned&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 Session: deleted snort session using 0 bytes; protocol id:(5) : LWstate 0x0 LWFlags 0x0&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 Session: new snort session&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 AppID: service unknown (0), application unknown (0)&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 new firewall session&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 Starting AC with minimum 1670, 'test-acp-rule', and SrcZone first with zones 24 -&amp;gt; 28, geo 0 -&amp;gt; 0, vlan 0, source sgt type: 0, source sgt tag: 0, ISE sgt id: 0, dest sgt type: 0, ISE dest sgt tag: 0, svc 0, payload 0, client 0, misc 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1670, 'test-acp-rule', src network, FQDN and GEO&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1671, 'inside_access_out_#123', IPProto&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1673, 'Security_Servers_access_~#37-2', DstPort&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1674, 'Any_Block&amp;gt;IS_TestBox', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1676, 'Any_Block&amp;gt;'Security_Servers', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1710, 'dmz_zone_out_#3-1003 #06', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1748, 'Deny_Any&amp;gt;DMZ1', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1750, 'Deny_Any&amp;gt;DMZ2', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1752, 'Deny_Any&amp;gt;Outside', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 match rule order 1753, 'Default Action', action Block&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 Logging SOF with rule_id = 222222222 ruleAction = 4 ruleReason = 0&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 MidRecovery data sent for rule id: 222222222,rule_action:4, rev id:674019941, rule_match flag:0x2&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 HitCount data sent for rule id: 222222222,&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 deny action&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 Firewall: block rule, 'Default Action', drop&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 Snort: processed decoder alerts or actions queue, drop&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 Deleting session&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 deleting firewall session flags = 0x28003, fwFlags = 0x80, session-&amp;gt;logFlags = 8002e7e008c0&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 Snort id 9, NAP id 2, IPS id 0, Verdict BLOCKFLOW&lt;BR /&gt;172.16.10.1-1234 - 192.168.100.10-80 6 AS 1-1 CID 0 ===&amp;gt; Blocked by Firewall&lt;BR /&gt;Trace buffer and verdict reason are sent to DAQ&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 13:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010292#M1108652</guid>
      <dc:creator>Shomi</dc:creator>
      <dc:date>2024-01-31T13:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010312#M1108653</link>
      <description>&lt;P&gt;As I get you have server in Inside and you want to access from cloud interface.&lt;/P&gt;
&lt;P&gt;Points net to clarify&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1- un-NAT is remarking as VPN&lt;/P&gt;
&lt;P&gt;2- what IP you use in packet tracer'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input cloud-1 tcp 172.16.10.1 &amp;lt;this IP reachable via cloud &amp;gt; 1234 192.168.100.10 &amp;lt;this real or mapped IP&amp;gt; 80 detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 13:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010312#M1108653</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-31T13:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010343#M1108658</link>
      <description>&lt;P&gt;What's going on guys? This is a second post with exactly same problem and symptoms? &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97213"&gt;@atsukane&lt;/a&gt; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1674667"&gt;@Shomi&lt;/a&gt; which versions do you use?&lt;/P&gt;&lt;P&gt;We need to correlate the two outputs by rule-id to understand why Snort drops down to default ACP action instead of matching correct Snort rule. What was the real rule-id in the packet-tracer output? Also, can you find the rule shown by packet-tracer by rule-id in the /var/sf/detection_engines/&amp;lt;UUID&amp;gt;/ngfw.rules file?&lt;/P&gt;&lt;PRE&gt;access-group LAB_FW_ACL_ global&lt;BR /&gt;access-list LAB_FW_ACL_ advanced permit tcp ifc cloud-1 object-group FMC_INLINE_src_rule_111111111 ifc inside-1 object-group FMC_INLINE_dst_rule_111111111 object-group HTTP rule-id 111111111&lt;BR /&gt;access-list LAB_FW_ACL_ remark rule-id 111111111: ACCESS POLICY: LAB-TEST-ACP - Default&lt;BR /&gt;access-list LAB_FW_ACL_ remark rule-id 111111111: L7 RULE: test-acp-rule&lt;BR /&gt;object-group network FMC_INLINE_src_rule_111111111(hitcnt=0)&lt;BR /&gt;network-object object lab-pc-1(hitcnt=0)&lt;BR /&gt;network-object object lab-pc-2(hitcnt=0)&lt;BR /&gt;network-object object lab-pc-3(hitcnt=0)&lt;BR /&gt;object-group network FMC_INLINE_dst_rule_111111111(hitcnt=175)&lt;BR /&gt;network-object object cloud-pc-1(hitcnt=95)&lt;BR /&gt;network-object object cloud-pc-2(hitcnt=80)&lt;BR /&gt;object-group service HTTP tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 Starting AC with minimum 1670, 'test-acp-rule', and SrcZone first with zones 24 -&amp;gt; 28, geo 0 -&amp;gt; 0, vlan 0, source sgt type: 0, source sgt tag: 0, ISE sgt id: 0, dest sgt type: 0, ISE dest sgt tag: 0, svc 0, payload 0, client 0, misc 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1670, 'test-acp-rule', src network, FQDN and GEO&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1671, 'inside_access_out_#123', IPProto&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1673, 'Security_Servers_access_~#37-2', DstPort&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1674, 'Any_Block&amp;gt;IS_TestBox', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1676, 'Any_Block&amp;gt;'Security_Servers', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1710, 'dmz_zone_out_#3-1003 #06', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1748, 'Deny_Any&amp;gt;DMZ1', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1750, 'Deny_Any&amp;gt;DMZ2', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1752, 'Deny_Any&amp;gt;Outside', DstZone&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 match rule order 1753, 'Default Action', action Block&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 14:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010343#M1108658</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-31T14:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010350#M1108660</link>
      <description>&lt;P&gt;I now see that SYN packet generated by packet-tracer hits "test-acp-rule", but this rule is not hit in Snort. FQDN is used by both of you, &lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97213" target="_blank"&gt;@atsukane&lt;/A&gt; and &lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1674667" target="_blank"&gt;@Shomi&lt;/A&gt; , not sure about GEO. Get rid of FQDN for test?&lt;/P&gt;&lt;PRE&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 Starting AC with minimum 1670, 'test-acp-rule', and SrcZone first with zones 24 -&amp;gt; 28, geo 0 -&amp;gt; 0, vlan 0, source sgt type: 0, source sgt tag: 0, ISE sgt id: 0, dest sgt type: 0, ISE dest sgt tag: 0, svc 0, payload 0, client 0, misc 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;172.16.10.1-1234 &amp;gt; 192.168.100.10-80 6 AS 1-1 I 9 no match rule order 1670, 'test-acp-rule', src network, FQDN and GEO&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 14:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010350#M1108660</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-31T14:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010373#M1108667</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;1. This NONAT rule is not required and will be removed because it's not a VPN traffic&lt;BR /&gt;2. packet-tracer input cloud-1 tcp 172.16.10.1 1234 192.168.100.10 80 detailed&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;Shomi&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 15:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010373#M1108667</guid>
      <dc:creator>Shomi</dc:creator>
      <dc:date>2024-01-31T15:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010381#M1108670</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt; thanks for your input. This is a bit of a weird one. We changed the FQDN in the policy to it's real IP address and that works but the problem is we need to keep the FQDN because the IP addresses are potentially changeable. Any thoughts why the IP works but fqdn fails? show dns host shows the correct IP address for the hostname.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;Shomi&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 15:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010381#M1108670</guid>
      <dc:creator>Shomi</dc:creator>
      <dc:date>2024-01-31T15:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010437#M1108683</link>
      <description>&lt;P&gt;Perhaps a bug. Do conditions of this one match your ACP rule?&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;FTD: Firewall is not matching ACP rules with multiple FQDN objects configured&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;CSCwh64784&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt; Traffic does not match an ACP rule which has more than one FQDN object specified as source or destination networks. Instead, another rule below will be matched.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Conditions:&lt;/STRONG&gt; 1) An ACP rule is configured with more than one FQDN object as a matching condition. 2) There are no IP-based objects in source or destination networks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt; For FQDN-based rules specify only one FQDN object. If needed, create a separate rule for every FQDN that should be matched.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Further Problem Description:&lt;/STRONG&gt; When only FQDN objects are used as a network condition, the rule will be ignored by the firewall, even if a DNS server is reachable and FQDNs are successfully resolved.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 16:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010437#M1108683</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-31T16:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010607#M1108697</link>
      <description>&lt;P&gt;Are you sure that the Firewall is able to resolve the FQDN?&amp;nbsp; Are the DNS servers that you configured during setup reachable from the FTD management interface?&amp;nbsp; And, are the DNS servers you configured on the FTD the ones that are able to resolve these FQDNs?&lt;/P&gt;
&lt;P&gt;These, and probably a couple more, are the questions you need to ask yourself if defining the IP works but the FQDN does not.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 22:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5010607#M1108697</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-31T22:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5012603#M1108795</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt; thank you for your input. We changed the FQDNs to their corresponding IPs and the service is working so it appears it's a bug as detailed in &lt;SPAN class=""&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCwh64784" target="_blank" rel="noopener"&gt;CSCwh64784&lt;/A&gt;&lt;/SPAN&gt; which you have shared. Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Feb 2024 13:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5012603#M1108795</guid>
      <dc:creator>Shomi</dc:creator>
      <dc:date>2024-02-04T13:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Packet being dropped by Snort in FTD despite hitting valid policy</title>
      <link>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5012604#M1108796</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;. Thank you for your input but it's not a firewall DNS or FQDN issue in this case, rather it appears it's a bug as detailed in the article shared above by tvotna.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 00:16:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-being-dropped-by-snort-in-ftd-despite-hitting-valid/m-p/5012604#M1108796</guid>
      <dc:creator>Shomi</dc:creator>
      <dc:date>2024-02-05T00:16:34Z</dc:date>
    </item>
  </channel>
</rss>

