<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Drop-reason: (acl-drop) Flow is denied by configured rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5014333#M1108875</link>
    <description>&lt;P&gt;The easiest way in the long run would be to make a script in python and have it fetch the rule, you could also do this via the &lt;A href="https://&amp;lt;FMC" target="_blank"&gt;https://&amp;lt;FMC-IP&lt;/A&gt;/api/api-explorer page but again you would need to perform this in several steps.&lt;/P&gt;
&lt;P&gt;But in short, to find the rule via the rule-id that you see in the CLI or packet-tracer, you will need to use API in some way.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2024 17:20:59 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2024-02-07T17:20:59Z</dc:date>
    <item>
      <title>Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012136#M1108773</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I ran the following packet tracer using a destination on the Inside with private IP and I'm trying to understand what rule its specifically referencing when it say's the flow was dropped.&amp;nbsp;&lt;/P&gt;&lt;P&gt;firepower# packet-tracer input outSIDE udp 69.185.96.215 1025 10.83.200.25 3544 detaild&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 30708 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffbc3df5f0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=281051874026, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 36679 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.180.0.201 using egress ifc INSIDE(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14714 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit udp any range 1025 65535 any eq 3544 rule-id 268453998&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268453998: PREFILTER POLICY: FASTPATH&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268453998: RULE: DEFAULT TUNNEL ACTION RULE&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffa81d3180, priority=12, domain=permit, deny=false&lt;BR /&gt;hits=13460, user_data=0xffddd42b00, cs_id=0x0, use_real_addr, flags=0x0, protocol=17&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=3544, tag=any, ifc=any, vlan=0,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;/P&gt;&lt;P&gt;sport range&amp;lt;0&amp;gt; : 1025-65535 dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14714 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffa85d57b0, priority=7, domain=conn-set, deny=false&lt;BR /&gt;hits=1858687396, user_data=0xffa85d3340, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=OUTSIDE(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14714 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffc096c720, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=6688481459, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14714 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffbc3e5970, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=5318748547, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=OUTSIDE(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 62269 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffbe9871d0, priority=20, domain=lu, deny=false&lt;BR /&gt;hits=930072487, user_data=0x0, cs_id=0x0, flags=0x0, protocol=17&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=OUTSIDE(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3412 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb4c5fab0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=1328718509, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=OUTSIDE(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 14501 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xffc0c80080, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=24377256, user_data=0xffc0c75990, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=OUTSIDE(vrfid:0), output_ifc=INSIDE(vrfid:0)&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 191925 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000000aaad882920 flow (NA)/NA&lt;/P&gt;&lt;P&gt;when running it this way my hit counter increases on the rule id 268453998. However, if I run this same packet tracer using my public IP as the destination I get the following output and my hit count doesn't go up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 30423 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffc096c720, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=6688965993, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 30423 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffbc3e0a00, priority=0, domain=permit, deny=true&lt;BR /&gt;hits=79288593, user_data=0xb, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=OUTSIDE(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 60846 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000000aaad87a248 flow (NA)/NA&lt;/P&gt;&lt;P&gt;Why is that and how can I figure out what rule this hit?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2024 17:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012136#M1108773</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2024-02-02T17:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012140#M1108774</link>
      <description>&lt;P&gt;You want to access server INside FTD from OUTside&lt;/P&gt;
&lt;P&gt;You use NAT overload and this make retrun traffic drop.&lt;/P&gt;
&lt;P&gt;You need static NAT for this case&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2024 17:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012140#M1108774</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-02T17:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012293#M1108776</link>
      <description>&lt;P&gt;It looks like you are missing NAT configuration mapping a public IP to the private IP.&amp;nbsp; Can you verify that you have this configured, and if you have it configured double check that it is configured correctly.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2024 04:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012293#M1108776</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-02-03T04:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012429#M1108783</link>
      <description>&lt;P&gt;You need to create a NAT rule for that inbound traffic. If you have additional public IP different than the one you have on the OUTSIDE interface then you can do something similar to this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network SERVER-10.83.200.25&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 10.83.200.25&lt;BR /&gt;&amp;nbsp; &amp;nbsp;nat (INSIDE,OUTSIDE) static &amp;lt; the additional public IP &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And if you have only a single public IP which is the one assigned to the OUTSIDE interface then you can do something similar to this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network SERVER-10.83.200.25&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 10.83.200.25&lt;BR /&gt;&amp;nbsp; &amp;nbsp;nat (INSIDE,OUTSIDE) static &amp;lt; the OUTSIDE interface public IP &amp;gt; service udp 3544 3544&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Or&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network SERVER-10.83.200.25&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 10.83.200.25&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object network OUTSIDE-INTERFACE-PUBLIC-IP&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;host x.x.x.x&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object service PORT-3544&lt;BR /&gt;&amp;nbsp; &amp;nbsp;service udp source eq 3544&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (INSIDE,OUTSIDE) source static&amp;nbsp;SERVER-10.83.200.25&amp;nbsp;OUTSIDE-INTERFACE-PUBLIC-IP service&amp;nbsp;PORT-3544&amp;nbsp;PORT-3544&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2024 17:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5012429#M1108783</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-03T17:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5013004#M1108810</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I apologize if I wasn't clear in my original ask. I'm not looking to solve for any NAT as this traffic should be blocked. I'm trying to understand what rule is actually doing the blocking. Upon looking at the access list via command line you can see all of these default permit statements that I don't have configured on the GUI. Running a packet tracer proves its being blocked but I would like to know what rule is doing the blocking. Hope that clears up what I'm after.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dcanady55_0-1707143921123.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209595i3851150E2DF73983/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dcanady55_0-1707143921123.png" alt="dcanady55_0-1707143921123.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 14:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5013004#M1108810</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2024-02-05T14:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5013047#M1108813</link>
      <description>&lt;P&gt;You can use the rule-id to identify which rule is being match, but you need to use API to do it.&lt;/P&gt;
&lt;P&gt;You would first need to find the ID of the ACP you want to filter on and then remove the&amp;nbsp; ACP ID portion of the ID and add the rule ID.&lt;/P&gt;
&lt;P&gt;So the ID you are looking for is 268453998 and your ACP ID is&amp;nbsp;0F920F8-abcd-efgh-0000-030064774061, then you would remove the last portion of the ACP ID (the 12 numbers that come after the last -).&amp;nbsp; Just bear in mind that there needs to be 12 characters in the last portion so you would add 0s if your rule ID has less than 12.&amp;nbsp; So the rule ID you would be looking for is&amp;nbsp;0F920F8-abcd-efgh-0000-000268453998&lt;/P&gt;
&lt;P&gt;Then you can use the following cURL statement to fetch the rule.&amp;nbsp; remember to replace DOMAINUUID, access-policy UUID and access rule UUID to be the actual values.&amp;nbsp; Also you would need to generate an access token.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;curl -k -X 'GET' \&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;'&lt;A href="https://10.20.30.40/api/fmc_config/v1/domain/{DOMAINUUID}/policy/accesspolicies/10F920F8-abcd-efgh-0000-030064774061/accessrules/0F920F8-abcd-efgh-0000-000268453998" target="_blank"&gt;https://10.20.30.40/api/fmc_config/v1/domain/{DOMAINUUID}/policy/accesspolicies/10F920F8-abcd-efgh-0000-030064774061/accessrules/0F920F8-abcd-efgh-0000-000268453998&lt;/A&gt;' \&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-H 'accept: application/json' \&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-H 'X-auth-access-token: e2e79282-aaaa-bbbb-cccc-4860e2964f0b'&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 16:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5013047#M1108813</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-02-05T16:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5014321#M1108873</link>
      <description>&lt;P&gt;Marius,&lt;/P&gt;&lt;P&gt;I will give that a try even though this seems overly complicated for what feels like a routine function within the CLI. I found a Cisco&amp;nbsp; document that describes what I'm after but they don't go into detail on how they obtained the snort side. They use the rule ID to queried snort somehow to show what the results would be of hitting the rule. That's what I'm trying to do.&amp;nbsp; information.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/218196-understand-how-lina-rules-configured-wit.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/218196-understand-how-lina-rules-configured-wit.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dcanady55_0-1707325103880.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209790i1B2F5149A802FA8B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dcanady55_0-1707325103880.png" alt="dcanady55_0-1707325103880.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 16:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5014321#M1108873</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2024-02-07T16:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5014333#M1108875</link>
      <description>&lt;P&gt;The easiest way in the long run would be to make a script in python and have it fetch the rule, you could also do this via the &lt;A href="https://&amp;lt;FMC" target="_blank"&gt;https://&amp;lt;FMC-IP&lt;/A&gt;/api/api-explorer page but again you would need to perform this in several steps.&lt;/P&gt;
&lt;P&gt;But in short, to find the rule via the rule-id that you see in the CLI or packet-tracer, you will need to use API in some way.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 17:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5014333#M1108875</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-02-07T17:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5014336#M1108876</link>
      <description>&lt;P&gt;Can you share all acl in lina?&lt;/P&gt;
&lt;P&gt;Why you use | in&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 17:25:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5014336#M1108876</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-07T17:25:50Z</dc:date>
    </item>
  </channel>
</rss>

