<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic permit ip ifc outside any any in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067300#M1111089</link>
    <description>&lt;P&gt;&lt;SPAN&gt;We have FMC and FTD , In FMC we configured Blocked traffic&amp;nbsp;ACCESS POLICY , but while checking in FTD(CLI) one more ACL( Ifc Outside any any allow) showing with same&amp;nbsp;rule-id 26844160.&amp;nbsp; &amp;nbsp;any ideas how to find this ACL in FMC&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ACL in FTD&amp;nbsp;&lt;BR /&gt;========&lt;BR /&gt;access-list CSM_FW_ACL_ line 17 remark rule-id 268441601: ACCESS POLICY: FTD-Mig-ACP-1584501209 - Default&lt;BR /&gt;access-list CSM_FW_ACL_ line 18 remark rule-id 268441601: L7 RULE: Blocked Traffic&lt;BR /&gt;&lt;STRONG&gt;access-list CSM_FW_ACL_ line 19 advanced deny ip ifc outside host x.x.x.x any rule-id 268441601 (hitcnt=0) 0x70ce5f02&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;access-list CSM_FW_ACL_ line 20 advanced permit ip ifc outside any any rule-id 268441601 (hitcnt=39080962) 0x8793b97e&lt;BR /&gt;&lt;BR /&gt;FMC&amp;nbsp;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="velusamycs_0-1712930570610.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215629iF157D2BF504E63FC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="velusamycs_0-1712930570610.png" alt="velusamycs_0-1712930570610.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Apr 2024 14:04:53 GMT</pubDate>
    <dc:creator>velusamycs</dc:creator>
    <dc:date>2024-04-12T14:04:53Z</dc:date>
    <item>
      <title>permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067300#M1111089</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We have FMC and FTD , In FMC we configured Blocked traffic&amp;nbsp;ACCESS POLICY , but while checking in FTD(CLI) one more ACL( Ifc Outside any any allow) showing with same&amp;nbsp;rule-id 26844160.&amp;nbsp; &amp;nbsp;any ideas how to find this ACL in FMC&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ACL in FTD&amp;nbsp;&lt;BR /&gt;========&lt;BR /&gt;access-list CSM_FW_ACL_ line 17 remark rule-id 268441601: ACCESS POLICY: FTD-Mig-ACP-1584501209 - Default&lt;BR /&gt;access-list CSM_FW_ACL_ line 18 remark rule-id 268441601: L7 RULE: Blocked Traffic&lt;BR /&gt;&lt;STRONG&gt;access-list CSM_FW_ACL_ line 19 advanced deny ip ifc outside host x.x.x.x any rule-id 268441601 (hitcnt=0) 0x70ce5f02&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;access-list CSM_FW_ACL_ line 20 advanced permit ip ifc outside any any rule-id 268441601 (hitcnt=39080962) 0x8793b97e&lt;BR /&gt;&lt;BR /&gt;FMC&amp;nbsp;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="velusamycs_0-1712930570610.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215629iF157D2BF504E63FC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="velusamycs_0-1712930570610.png" alt="velusamycs_0-1712930570610.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067300#M1111089</guid>
      <dc:creator>velusamycs</dc:creator>
      <dc:date>2024-04-12T14:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067312#M1111091</link>
      <description>&lt;P&gt;Check the default action in your FMC ACP.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067312#M1111091</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-12T14:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067327#M1111094</link>
      <description>&lt;P&gt;Default Action is block&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="velusamycs_0-1712931823692.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215630iEB0EDCE9769384CD/image-size/large?v=v2&amp;amp;px=999" role="button" title="velusamycs_0-1712931823692.png" alt="velusamycs_0-1712931823692.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067327#M1111094</guid>
      <dc:creator>velusamycs</dc:creator>
      <dc:date>2024-04-12T14:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067328#M1111095</link>
      <description>&lt;P&gt;Show run access-list &amp;lt;- from cli ftd share this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067328#M1111095</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-12T14:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067334#M1111096</link>
      <description>&lt;P&gt;"show access-list" (not "show running-config access-list") will expand the elements of your ACLs. We would expect expanded elements of an ACL entry to all have the same rule-id.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_0-1712932484884.png" style="width: 859px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215631iD492C2E7EF8ED09D/image-dimensions/859x481?v=v2" width="859" height="481" role="button" title="MarvinRhoads_0-1712932484884.png" alt="MarvinRhoads_0-1712932484884.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067334#M1111096</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-12T14:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067354#M1111097</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Test.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215637i593A10AA61E7C3E1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Test.JPG" alt="Test.JPG" /&gt;&lt;/span&gt;Show access-list.&amp;nbsp;&lt;BR /&gt;While doing packet tracer from any Outside to Inside traffic always taking this rule (&lt;/SPAN&gt;&lt;SPAN&gt;permit ip ifc outside any any).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067354#M1111097</guid>
      <dc:creator>velusamycs</dc:creator>
      <dc:date>2024-04-12T15:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067360#M1111103</link>
      <description>&lt;P&gt;Rule-id is&amp;nbsp;&lt;STRONG&gt;268441601&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The line 17'18'19'20 is same ACL.&lt;/P&gt;
&lt;P&gt;The ACL is L7 so it match app.&lt;/P&gt;
&lt;P&gt;So the traffic pass until FTD detect APP then this ACL will work permit or deny.&lt;/P&gt;
&lt;P&gt;If you do packet capture' you will see ACL with app unknown&lt;/P&gt;
&lt;P&gt;Do again using same IP and you will see the APP known and real action apply.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067360#M1111103</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-12T15:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067365#M1111105</link>
      <description>&lt;P&gt;I'm not seeing the origin of the "permit ip ifc outside any any" entry in what you have shared. In any event, why would you want to block only one incoming IP address in the ACL and not everything?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067365#M1111105</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-12T15:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067371#M1111108</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; all ACP entries show up as L7 rules in the cli. If you look at the original post however, note that no Application was specified in the rule itself.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067371#M1111108</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-12T15:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067380#M1111112</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;Note : In Blocked Traffic we added 1 IP address and One Geo location also in source network.&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;FLOW for OUTSIDE TO INSIDE (BLOCKED IP )&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#packet-tracer input outside tcp A.A.A.A 123 X.X.X.X $&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19456 ns&lt;BR /&gt;Config:&lt;BR /&gt;object network Server-001&lt;BR /&gt;nat (inside,outside) static External-Server-001&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate Y.Y.Y.Y/443 to 10.0.0.10/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 1&lt;BR /&gt;Destination Object Group Match Count: 4&lt;BR /&gt;Object Group Search: 4&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 256 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced deny ip ifc outside host A.A.A.A any rule-id 268441601&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: ACCESS POLICY: FTD-Mig-ACP-1584501209 - Default&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: L7 RULE: Blocked Traffic&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 21760 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000055d0c3144578 flow (NA)/NA&lt;/P&gt;&lt;P&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;OUTSIDE TO INSIDE- TRAFFIC FLOW&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;#packet-tracer input outside tcp X.X.X.X 123 Y.Y.Y.Y 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19456 ns&lt;BR /&gt;Config:&lt;BR /&gt;object network Server-001&lt;BR /&gt;nat (inside,outside) static External-Server-001&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate Y.Y.Y.Y/443 to 10.0.0.10/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 1&lt;BR /&gt;Destination Object Group Match Count: 4&lt;BR /&gt;Object Group Search: 4&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip ifc outside any any rule-id 268441601&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: ACCESS POLICY: FTD-Mig-ACP-1584501209 - Default&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: L7 RULE: Blocked Traffic&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 32256 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 1024 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7168 ns&lt;BR /&gt;Config:&lt;BR /&gt;object network Server-001&lt;BR /&gt;nat (inside,outside) static External-Server-001&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 34816 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 512 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 26624 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 95662948, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19968 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13768 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;service: (0), client: (0), payload: (0), misc: (0)&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 86380 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 2, Rule ID 268434438&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 3 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268434438 - Allow&lt;/P&gt;&lt;P&gt;Phase: 16&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7168 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.0.0.10 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 17&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3072 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.0.0.10 on interface inside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 0015.5d00.1a14 hits 28295 reference 4&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 267060 ns&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067380#M1111112</guid>
      <dc:creator>velusamycs</dc:creator>
      <dc:date>2024-04-12T15:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067385#M1111115</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;Specifically In Blocked Traffic we added 1 IP address and One Geo location also in source network.&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067385#M1111115</guid>
      <dc:creator>velusamycs</dc:creator>
      <dc:date>2024-04-12T15:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067402#M1111125</link>
      <description>&lt;P&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#packet-tracer input outside tcp A.A.A.A 123 X.X.X.X $&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19456 ns&lt;BR /&gt;Config:&lt;BR /&gt;object network Server-001&lt;BR /&gt;nat (inside,outside) static External-Server-001&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate Y.Y.Y.Y/443 to 10.0.0.10/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 1&lt;BR /&gt;Destination Object Group Match Count: 4&lt;BR /&gt;Object Group Search: 4&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 256 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced deny ip ifc outside host A.A.A.A any rule-id 268441601&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: ACCESS POLICY: FTD-Mig-ACP-1584501209 - Default&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: L7 RULE: Blocked Traffic&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 21760 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000055d0c3144578 flow (NA)/NA&lt;/P&gt;&lt;P&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;#packet-tracer input outside tcp X.X.X.X 123 Y.Y.Y.Y 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19456 ns&lt;BR /&gt;Config:&lt;BR /&gt;object network Server-001&lt;BR /&gt;nat (inside,outside) static External-Server-001&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate Y.Y.Y.Y/443 to 10.0.0.10/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 1&lt;BR /&gt;Destination Object Group Match Count: 4&lt;BR /&gt;Object Group Search: 4&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip ifc outside any any rule-id 268441601&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: ACCESS POLICY: FTD-Mig-ACP-1584501209 - Default&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268441601: L7 RULE: Blocked Traffic&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3712 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 32256 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 1024 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7168 ns&lt;BR /&gt;Config:&lt;BR /&gt;object network Server-001&lt;BR /&gt;nat (inside,outside) static External-Server-001&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 34816 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 512 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 26624 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 95662948, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19968 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13768 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;service: (0), client: (0), payload: (0), misc: (0)&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 86380 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 2, Rule ID 268434438&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 3 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268434438 - Allow&lt;/P&gt;&lt;P&gt;Phase: 16&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7168 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.0.0.10 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 17&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3072 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.0.0.10 on interface inside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 0015.5d00.1a14 hits 28295 reference 4&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 267060 ns&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067402#M1111125</guid>
      <dc:creator>velusamycs</dc:creator>
      <dc:date>2024-04-12T15:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067412#M1111129</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I think you meaning second packet-tracer is for geo IP' &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If that correct&amp;nbsp; then check below what you see in packet tracer&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;""This packet will be sent to snort for additional processing where a verdict will be reached""&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It L7 if there is no app then it geo what need to inspect by snort.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do packet-tracer again for geo IP and check block&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note:- this process is not seem in fmc event what you will see it last deny/permit event&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 16:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067412#M1111129</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-12T16:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067546#M1111163</link>
      <description>&lt;P&gt;Sorry ypu hide the IP and it not clear this packet-tracer for which IP&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 19:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067546#M1111163</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-12T19:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067682#M1111168</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;Specifically In Blocked Traffic we added 1 IP address and One Geo location also in source network&lt;/FONT&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;So, what's the question then? This ACP rule was correctly expanded into 2 Lina ACEs and in the packet-tracer you see how they're matched. The GEO part was programmed as "allow" Lina ACE to allow traffic reach "Snort" part of the system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 19:53:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5067682#M1111168</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-12T19:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5068415#M1111205</link>
      <description>&lt;P&gt;The access rule will show up as permit any any if you are using any services that is inspected by SNORT to drop the traffic.&amp;nbsp; That would include Geo location, URL filtering, Application, etc.&amp;nbsp; As the action is being taken in the SNORT process the LINA ACL needs to permit the traffic so it can reach SNORT which is why you are seeing a permit any any rule.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2024 22:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5068415#M1111205</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-13T22:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5069798#M1111280</link>
      <description>&lt;P&gt;Based on Below reference its expected, Pls correct me&amp;nbsp; if am wrong.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/218196-understand-how-lina-rules-configured-wit.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/218196-understand-how-lina-rules-configured-wit.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd00446" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd00446&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 17:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5069798#M1111280</guid>
      <dc:creator>velusamycs</dc:creator>
      <dc:date>2024-04-15T17:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5069803#M1111281</link>
      <description>&lt;P&gt;You can try&amp;nbsp;&lt;/P&gt;
&lt;P&gt;System support trace&lt;/P&gt;
&lt;P&gt;Which from my opinion must accurte than packet tracer to show traffic path through snort&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 17:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5069803#M1111281</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-15T17:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5069806#M1111282</link>
      <description>&lt;P&gt;Yes you are correct.&amp;nbsp; Any traffic that will be sent to snort for inspection and action will have an any any permit rule.&amp;nbsp; This is to allow the traffic through LINA so it can reach SNORT where further action will be taken.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 17:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5069806#M1111282</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-15T17:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: permit ip ifc outside any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5070653#M1111307</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;, the packet would need to leave Lina engine going to Snort engine, Snort then returns a verdict of that packet marking it to be allowed or dropped, it doesn't allow it or block it itself. However, as mentioned by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;if you don't have any next gen security inspection features enabled on the ACP, you wouldn't see that allow rule you shared because in that case Snort engine wouldn't be involved.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 11:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-ifc-outside-any-any/m-p/5070653#M1111307</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-16T11:30:04Z</dc:date>
    </item>
  </channel>
</rss>

