<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC Prefilter-Fastpath error in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5213602#M1116877</link>
    <description>&lt;P&gt;Please refer to this link for the "show snort statistics" command:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/s_8.html#wp7571291640" target="_blank"&gt;Cisco Secure Firewall Threat Defense Command Reference - show s - sz [Cisco Secure Firewall Threat Defense] - Cisco&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Oct 2024 11:38:56 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-10-23T11:38:56Z</dc:date>
    <item>
      <title>FMC Prefilter-Fastpath error</title>
      <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5212776#M1116821</link>
      <description>&lt;P&gt;Morning,&lt;/P&gt;&lt;P&gt;I am having an issue with our Fastpath rules, hoping for some advice:&lt;/P&gt;&lt;P&gt;I have added our scanning IP ranges in to Network Objects and then created a prefilter policy to fastpath traffic from or to these addresses.&lt;/P&gt;&lt;P&gt;I'm unsure why but we are still seeing intrusion alerts being generated from these addresses during our periodic scans. As far as I understand the fastpath should prevent the traffic from those IPs from being inspected by the snort engine. Do I need to put it in the ACP as a Trust rule to capture existing connections as well?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 08:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5212776#M1116821</guid>
      <dc:creator>RWarr100</dc:creator>
      <dc:date>2024-10-22T08:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Prefilter-Fastpath error</title>
      <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5212852#M1116824</link>
      <description>&lt;P&gt;Did you attach the prefilter policy to you ACP policy? if so, do you see any counters on the "show snort statistics" command on FTD CLISH mode "&amp;gt;"?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 10:39:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5212852#M1116824</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-22T10:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Prefilter-Fastpath error</title>
      <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5213587#M1116874</link>
      <description>&lt;P&gt;Yes, it's attached to the ACP. I had a look in the FTDs CLI and I didn't have the option for snort statistics under the "show" command.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 11:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5213587#M1116874</guid>
      <dc:creator>RWarr100</dc:creator>
      <dc:date>2024-10-23T11:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Prefilter-Fastpath error</title>
      <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5213602#M1116877</link>
      <description>&lt;P&gt;Please refer to this link for the "show snort statistics" command:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/s_8.html#wp7571291640" target="_blank"&gt;Cisco Secure Firewall Threat Defense Command Reference - show s - sz [Cisco Secure Firewall Threat Defense] - Cisco&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 11:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5213602#M1116877</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-23T11:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Prefilter-Fastpath error</title>
      <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5214276#M1116911</link>
      <description>&lt;P&gt;Thanks, I read that however when I use the show and look at all potential commands there are no snort entries. They are old devices so maybe the OS doesn't support the command?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 08:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5214276#M1116911</guid>
      <dc:creator>RWarr100</dc:creator>
      <dc:date>2024-10-24T08:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Prefilter-Fastpath error</title>
      <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5214309#M1116916</link>
      <description>&lt;P&gt;Mmm, not sure. One thing you could try would be to remove that prefilter rule and create it in the ACP with a trust action. The end result would be the same.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 09:34:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5214309#M1116916</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-24T09:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Prefilter-Fastpath error</title>
      <link>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5217866#M1117152</link>
      <description>&lt;P&gt;prefilter is bypass Snort but as I understand you config prefilter after traffic pass FTD&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this make FTD build conn and hence it bypass any prefilter and make traffic inspect by snort&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 07:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-prefilter-fastpath-error/m-p/5217866#M1117152</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-31T07:27:07Z</dc:date>
    </item>
  </channel>
</rss>

