<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Snort packet drop due to black list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149632#M1114552</link>
    <description>&lt;P&gt;You have to go to FMC--&amp;gt;Policies---&amp;gt;Intrusion---&amp;gt;Snort2--&amp;gt;PolicyInformation--&amp;gt;Rules&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="123.PNG" style="width: 984px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224264i7368A2BAD4B3F3DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="123.PNG" alt="123.PNG" /&gt;&lt;/span&gt;&lt;STRONG&gt;Review and Modify the Rule:-&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Review the rule's action (drop, alert, etc.) and modify it if necessary.&lt;/P&gt;
&lt;P&gt;Ensure the rule is correctly configured to avoid false positives or unnecessary blocks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Policy Deployment:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;After making any changes, deploy the updated policy to your FTD device to ensure the changes take effect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jul 2024 07:36:26 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2024-07-24T07:36:26Z</dc:date>
    <item>
      <title>Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149110#M1114525</link>
      <description>&lt;P&gt;Trying to map a drive from Hub Server to Management Site Server.&amp;nbsp; Hub site is protected by a FTD 2130, when I try and map the drive I am getting denied by a Snort Drop (Rule ID 268434432).&amp;nbsp; The users kept trying to connect an eventually it looks like Snort blacklisted the flow.&amp;nbsp; Seeing the snort drops in a packet capture via FMC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access Policy is passing the traffic (Hub Host 10.6.1.150 to Mgmt Host 10.1.1.151 tcp/445 and tcp/139) but kicks it over to snort for further processing.&lt;/P&gt;&lt;P&gt;I see the rule ID hits on the FTD via CLI and I see hits but where do I find that rule in FMC?&amp;nbsp; When I look in the Polices--&amp;gt;Intrusion--&amp;gt;Snort3 Base Policy that ID doesn't show up.&amp;nbsp; Additionally where is the black list and can I clear it?&lt;/P&gt;&lt;P&gt;I added both IP's to the Security Intelligence Global-Do-Not-Block-List but that didn't do anything&lt;/P&gt;&lt;P&gt;Any assistance/information would be appreciated&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 14:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149110#M1114525</guid>
      <dc:creator>Chad Westog</dc:creator>
      <dc:date>2024-07-23T14:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149176#M1114532</link>
      <description>&lt;P&gt;Can you share packet tracer for this traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Run it twice&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 16:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149176#M1114532</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-23T16:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149324#M1114543</link>
      <description>&lt;P&gt;&lt;A href="https://jasonmurray.org/posts/2020/pacettracerfirepower/" target="_blank"&gt;https://jasonmurray.org/posts/2020/pacettracerfirepower/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;use the packet capture with packet trace option&lt;/P&gt;
&lt;P&gt;If this trusted traffic you can move&amp;nbsp; this acl into prefilter and where it bypasses snort.. only if you trust it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 21:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149324#M1114543</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-23T21:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149632#M1114552</link>
      <description>&lt;P&gt;You have to go to FMC--&amp;gt;Policies---&amp;gt;Intrusion---&amp;gt;Snort2--&amp;gt;PolicyInformation--&amp;gt;Rules&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="123.PNG" style="width: 984px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224264i7368A2BAD4B3F3DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="123.PNG" alt="123.PNG" /&gt;&lt;/span&gt;&lt;STRONG&gt;Review and Modify the Rule:-&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Review the rule's action (drop, alert, etc.) and modify it if necessary.&lt;/P&gt;
&lt;P&gt;Ensure the rule is correctly configured to avoid false positives or unnecessary blocks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Policy Deployment:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;After making any changes, deploy the updated policy to your FTD device to ensure the changes take effect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 07:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5149632#M1114552</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-07-24T07:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151052#M1114619</link>
      <description>&lt;P&gt;When I look at the Snort2 rules, the ruleid that I see in CLI doesn't show up: 268434432&lt;/P&gt;&lt;P&gt;We are on a closed air-gapped network and I trust both machines and the user, however I'd prefer to get to the why Snort is triggering on a drive-map.&lt;/P&gt;&lt;P&gt;Here is the packet trace&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 12:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151052#M1114619</guid>
      <dc:creator>Chad Westog</dc:creator>
      <dc:date>2024-07-25T12:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151066#M1114621</link>
      <description>&lt;P&gt;Ok...I see the rule ID's are actual numbers for the ACL Policy lines.&amp;nbsp; I got into CLI and went into the /var/sf/detection_engine/xxxxx/folders and looked at the ngfw.rules file and the ruleid:&amp;nbsp;&lt;SPAN&gt;268434432 corresponds to the deny any any rule at the end of the config.&amp;nbsp; But it looks like snort is kicking the traffic to that deny rule...but no reason why?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Earlier in the packet trace I see where the Access Policy permitted the traffic but kicked it to snort...is there a snort log to explain why its killing the traffic?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 12:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151066#M1114621</guid>
      <dc:creator>Chad Westog</dc:creator>
      <dc:date>2024-07-25T12:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151070#M1114622</link>
      <description>&lt;P&gt;can I see&amp;nbsp;&lt;BR /&gt;show run acl &amp;lt;&amp;lt;- FTD CLI&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 12:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151070#M1114622</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-25T12:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151092#M1114625</link>
      <description>&lt;P&gt;That might be difficult....there are a ton of rules and I need to vet the export though our security office so they can redact any verbiage they dont want going out.&amp;nbsp; I can more easily pull any rules that are specified in the packet trace if that would work&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 13:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151092#M1114625</guid>
      <dc:creator>Chad Westog</dc:creator>
      <dc:date>2024-07-25T13:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151102#M1114627</link>
      <description>&lt;P&gt;Here is the redacted ACL list with entries that match the packet trace...on a side note since my Systems team was complaining I modified the prefilter rule for this traffic flow to bypass inspection for this specific flow and that worked like a charm.&amp;nbsp; Mapped drive worked like a charm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 13:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151102#M1114627</guid>
      <dc:creator>Chad Westog</dc:creator>
      <dc:date>2024-07-25T13:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151104#M1114628</link>
      <description>&lt;PRE class="bp-text bp-text-plain hljs bp-is-scrollable" tabindex="0"&gt;&lt;CODE class="bp-text-code txt"&gt;access-list CSM_FW_ACL_ advanced permit tcp ifc inside-low object &amp;lt;10.6.1.150&amp;gt; ifc outside object &amp;lt;10.1.1.151&amp;gt; object-group SMB-TCP rule-id 268449798
a&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;this ACP is define as L7 rule ?&lt;BR /&gt;are you use Geo&amp;nbsp;&lt;BR /&gt;are you use APP not port&amp;nbsp;&lt;BR /&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 13:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151104#M1114628</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-25T13:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151106#M1114629</link>
      <description>&lt;P&gt;hmmmm....we shouldn't be using any of that.&amp;nbsp; This should be a basic ip/port to ip/port.&amp;nbsp; Let me dive into the rule&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 13:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151106#M1114629</guid>
      <dc:creator>Chad Westog</dc:creator>
      <dc:date>2024-07-25T13:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151116#M1114630</link>
      <description>&lt;P&gt;Why we buy high price FW if all traffic bypass via prefilter. I know it will work and I can suggest that but&amp;nbsp;&lt;BR /&gt;for any issue we bypass traffic then the FW will useless&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so run firewall-engine-debug and see SID and GID of snort drop then use filter to find the reason&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NOTE:- this need to remove prefilter&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&amp;gt; &lt;STRONG&gt;system support firewall-engine-debug&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Please specify an IP protocol: &lt;STRONG&gt;tcp&lt;/STRONG&gt;&lt;BR /&gt;Please specify a client IP address: &lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt;&lt;BR /&gt;Please specify a client port:&lt;BR /&gt;Please specify a server IP address: x.x.x.x&lt;BR /&gt;Please specify a server port: 445&lt;BR /&gt;Monitoring firewall engine debug messages&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 14:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151116#M1114630</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-25T14:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151141#M1114635</link>
      <description>&lt;P&gt;Pulled the prefilter, and ran the debug.&amp;nbsp; Not seeing any SID/GID....simply kicks it down to rule 180 which the default action Block rule.&amp;nbsp; Its almost acting like it kicks the packet to snort...snort see's its already black listed and kicks the packet back out to the default block action.&lt;/P&gt;&lt;P&gt;Also checked my rules and every rule that I have is listed as a L7 rule.&amp;nbsp; I'm not using any Applications/Users/URL's.&amp;nbsp; Just IP's/Zone/Ports&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 14:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151141#M1114635</guid>
      <dc:creator>Chad Westog</dc:creator>
      <dc:date>2024-07-25T14:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Snort packet drop due to black list</title>
      <link>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151267#M1114648</link>
      <description>&lt;PRE&gt;access-list NGFW_ONBOX_ACL remark &lt;STRONG&gt;rule-id 268435458&lt;/STRONG&gt;: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark &lt;STRONG&gt;rule-id 268435458&lt;/STRONG&gt;: L7 RULE: testappid&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435458 ifc outside any ifc inside any &lt;STRONG&gt;rule-id 268435458&lt;/STRONG&gt; &lt;BR /&gt;access-list NGFW_ONBOX_ACL remark &lt;STRONG&gt;rule-id 268435459&lt;/STRONG&gt;: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark &lt;STRONG&gt;rule-id 268435459&lt;/STRONG&gt;: L7 RULE: testurl&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435459 any any &lt;STRONG&gt;rule-id 268435459 &lt;FONT color="#FF0000"&gt;&amp;lt;&amp;lt;- the prefilter hit this&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark &lt;STRONG&gt;rule-id 268435461&lt;/STRONG&gt;: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark &lt;STRONG&gt;rule-id 268435461&lt;/STRONG&gt;: L5 RULE: testgeo&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435461 any any &lt;STRONG&gt;rule-id 268435461 &lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;This is how rules are seen on Snort side:&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;268435458&lt;/STRONG&gt; deny 1 any any 2 any any any any (appid 948:5, 1079:5) (ip_protos 6)&lt;BR /&gt;# End rule 268435458&lt;BR /&gt;&lt;STRONG&gt;268435459&lt;/STRONG&gt; deny any any any any any any any any (&lt;STRONG&gt;&lt;FONT face="arial black,avant garde" color="#00FF00"&gt;urlcat&lt;/FONT&gt;&lt;/STRONG&gt; 2027) (urlrep le 0) (&lt;FONT face="arial black,avant garde"&gt;&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;urlrep_unknown&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt; 1)&lt;BR /&gt;&lt;STRONG&gt;268435459&lt;/STRONG&gt; deny any any any any any any any any (&lt;FONT face="arial black,avant garde" color="#00FF00"&gt;&lt;STRONG&gt;urlcat&lt;/STRONG&gt;&lt;/FONT&gt; 2006) (urlrep le 0) (&lt;STRONG&gt;&lt;FONT face="arial black,avant garde" color="#00FF00"&gt;urlrep_unknown&lt;/FONT&gt;&lt;/STRONG&gt; 1)&lt;BR /&gt;# End rule 268435459&lt;BR /&gt;&lt;STRONG&gt;268435461&lt;/STRONG&gt; deny 1 any any any any any any any (&lt;FONT face="arial black,avant garde"&gt;&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;dstgeo&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt; 643) &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&amp;lt;&amp;lt;- the snort hit this&lt;/STRONG&gt;&lt;/FONT&gt; &lt;BR /&gt;# End rule 268435461&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/218196-understand-how-lina-rules-configured-wit.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/218196-understand-how-lina-rules-configured-wit.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;so same as your case&amp;nbsp;&lt;BR /&gt;there are multi Snort Rule and prefliter show in packet tracer hit the first one&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE class="bp-text bp-text-plain hljs bp-is-scrollable" tabindex="0"&gt;&lt;CODE class="bp-text-code txt"&gt;rule-id 268449798&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="bp-text bp-text-plain hljs bp-is-scrollable" tabindex="0"&gt;&lt;CODE class="bp-text-code txt"&gt;rule_id = 268434432&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;so when you check rule-id in snort there is something write beside the deny any any it can urlcat or dstgeo or other can you share the output&amp;nbsp;&lt;BR /&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 19:06:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-snort-packet-drop-due-to-black-list/m-p/5151267#M1114648</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-25T19:06:58Z</dc:date>
    </item>
  </channel>
</rss>

