<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Default action to FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241488#M1118475</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; yes, as you have more a specific rule (as above) from inside to any that matches the traffic, then nothing should hit the default rule, unless there are other zones you do not have specific rules for. Traffic will still be discovered by matching your allow rule (from inside to any), it does not need to hit the default action rule - "network discovery only".&lt;/P&gt;
&lt;P&gt;Most environments would set the default action to be Default Access Control—Blocks all traffic without further inspection - this means you don't need an explict deny rule. A default action of Network discovery only, might be used for an internal firewall, during initial discovery phase before implementing traffic filtering.&lt;/P&gt;</description>
    <pubDate>Sat, 28 Dec 2024 12:49:43 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-12-28T12:49:43Z</dc:date>
    <item>
      <title>Default action to FTD</title>
      <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241479#M1118472</link>
      <description>&lt;P&gt;Hi to everybody,&lt;/P&gt;&lt;P&gt;It is not so clear to me what the discovery default action does.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am asking this because my last rule is &lt;STRONG&gt;deny from outside to inside&lt;/STRONG&gt;. Therefore i suppose that the FTD does not pass to the default action that is below the all deny rule which is the &lt;STRONG&gt;default action network discovery only.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Please see the attached pic.&lt;/P&gt;&lt;P&gt;I suppose i am missing something here,&lt;/P&gt;&lt;P&gt;Any explanation is welcome.&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 12:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241479#M1118472</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-12-28T12:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Default action to FTD</title>
      <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241483#M1118473</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; the default action is applicable if the traffic does not match an explict rule in the ruleset.&lt;/P&gt;
&lt;P&gt;In your scenario,traffic from outside to inside would match your explict rule and be denied. But traffic from &lt;U&gt;inside&lt;/U&gt; to &lt;U&gt;outside&lt;/U&gt; that did not match a specific rule, would match the default action and traffic would be allowed, while inspecting it for discovery data but not intrusions or exploits. The more traffic that passes, the more information the FTD can learn about the hosts in your network, to build a host profile.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/access-policies.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/access-policies.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 12:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241483#M1118473</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-28T12:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: Default action to FTD</title>
      <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241487#M1118474</link>
      <description>&lt;P&gt;Thanks Rob but there is also a rule for traffic from inside going to outside. See the attached pic.&lt;/P&gt;&lt;P&gt;So in my case no traffic should reach the default discovery action.&amp;nbsp; Correct ?&lt;/P&gt;&lt;P&gt;However i have discovered hosts. I can not understand this.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 12:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241487#M1118474</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-12-28T12:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Default action to FTD</title>
      <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241488#M1118475</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; yes, as you have more a specific rule (as above) from inside to any that matches the traffic, then nothing should hit the default rule, unless there are other zones you do not have specific rules for. Traffic will still be discovered by matching your allow rule (from inside to any), it does not need to hit the default action rule - "network discovery only".&lt;/P&gt;
&lt;P&gt;Most environments would set the default action to be Default Access Control—Blocks all traffic without further inspection - this means you don't need an explict deny rule. A default action of Network discovery only, might be used for an internal firewall, during initial discovery phase before implementing traffic filtering.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 12:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241488#M1118475</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-28T12:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Default action to FTD</title>
      <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241489#M1118476</link>
      <description>&lt;P&gt;Thanks for the explanation, now it is clear to me.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 12:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241489#M1118476</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-12-28T12:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Default action to FTD</title>
      <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241490#M1118477</link>
      <description>&lt;P&gt;I will check this point and update you&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 13:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241490#M1118477</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-28T13:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Default action to FTD</title>
      <link>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241495#M1118478</link>
      <description>&lt;P&gt;default action with Net Discover is &lt;STRONG&gt;ALLOW&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (230).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/236661i58F671265120103B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (230).png" alt="Screenshot (230).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 13:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-action-to-ftd/m-p/5241495#M1118478</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-28T13:04:41Z</dc:date>
    </item>
  </channel>
</rss>

