<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote VDI access not working after migration from ASA to FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254881#M1119240</link>
    <description>&lt;P&gt;&lt;FONT size="4"&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1495947"&gt;@NetworkMonkey101&lt;/a&gt;search 26844 it does show up.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SherazSalim_0-1738252006089.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238809iD073A70CFD99CA3F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SherazSalim_0-1738252006089.png" alt="SherazSalim_0-1738252006089.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Prefiltering&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;Improved performance: Prefiltering occurs early in the inspection process, allowing for faster handling of traffic. Reduced resource usage: By quickly handling certain types of traffic, prefiltering can reduce the load on subsequent, more resource-intensive inspections. Ability to fastpath or block specific traffic: Prefiltering can quickly handle plaintext, passthrough tunnels based on outer encapsulation headers. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html" target="_self"&gt;Information taken from here.&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Negatives&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Limited criteria: Prefilter rules use simple network criteria like IP address, VLAN tag, port, and protocol, which may not be as granular as full Snort rules. Less flexibility: Prefiltering has fewer actions available compared to full access control rules.&lt;A href="https://docs.defenseorchestrator.com/cdfmc/c_prefiltering_vs_access_control.html" target="_self"&gt;Here is the link&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;Snort 3 rule &lt;SPAN&gt;Benefits:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;More granular control: Snort rules can use more robust criteria, including application-layer information &lt;A href="https://docs.snort.org/rules/headers/actions" target="_self"&gt;Benefits&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Wider range of actions: Snort rules offer more actions, including alert, block, drop, log, and pass &lt;A href="https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/snort-rules/" target="_self"&gt;link here&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Deep packet inspection: Snort can perform more thorough analysis of packet contents &lt;A href="https://docs.defenseorchestrator.com/cdfmc/c_prefiltering_vs_access_control.html" target="_self"&gt;link here&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Negatives:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Higher resource usage: Full Snort rule processing can be more resource-intensive than prefiltering &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html" target="_self"&gt;here the link but already shared above&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Potential performance impact: Processing all traffic through Snort rules may lead to slower overall performance compared to prefiltering&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="4"&gt;The choice between prefiltering and amending the Snort 3 rule depends on your specific requirements. If performance is a primary concern and the traffic can be effectively filtered using simple criteria, prefiltering may be the better option. However, if you need more granular control and deeper inspection capabilities, modifying the Snort 3 rule would be more appropriate.&lt;/FONT&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Thu, 30 Jan 2025 15:58:48 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2025-01-30T15:58:48Z</dc:date>
    <item>
      <title>Remote VDI access not working after migration from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254664#M1119214</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have had a failed migration attempt due to VDI access not working after the migration and have had to roll back. I took a wireshark from the client at the time.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1738229496854.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238770iA60CD38056433A81/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1738229496854.png" alt="NetworkMonkey101_0-1738229496854.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After the roll back I have ran some packet captures on the live ASA and the non live FTD.&lt;/P&gt;&lt;P&gt;Just running a capture from the FTD and ASDM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see the when testing from an dummy address of 1.1.1.1 to 217.146.101.212 port 8443 traffic is allowed and natted to 172.16.230.19 as expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_1-1738229548975.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238772i981F99205962ADF6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_1-1738229548975.png" alt="NetworkMonkey101_1-1738229548975.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_2-1738229548980.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238771iA375785D623CB71F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_2-1738229548980.png" alt="NetworkMonkey101_2-1738229548980.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When running the same test from FTD it is failing at the SNORT inspection, something that isn’t present on the ASA. I will investigate this further as unsure if this is a cause or red herring atm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_3-1738229548992.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238773i1D6BC02DE60049F1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_3-1738229548992.png" alt="NetworkMonkey101_3-1738229548992.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;On the FTD it would appear the correct ACLs and NAT statements are being hit. But denied by SNORT.... Should I allow a process through SNORT?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1738230145427.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238775iC75DCA5248682C85/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1738230145427.png" alt="NetworkMonkey101_0-1738230145427.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Searching for the SNORT 3 rule ID but nothing is showing..&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1738231277588.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238778i378A4B164D65B6B2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1738231277588.png" alt="NetworkMonkey101_0-1738231277588.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 10:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254664#M1119214</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-01-30T10:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VDI access not working after migration from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254688#M1119218</link>
      <description>&lt;P&gt;Based on your observations, it appears that the migration from ASA to FTD has introduced an issue with SNORT inspection blocking traffic that was previously allowed on the ASA. Here are my thoughts.&lt;/P&gt;&lt;P&gt;The traffic is correctly hitting the ACLs and NAT statements on the FTD, which suggests that the basic firewall rules have been migrated successfully.&lt;BR /&gt;The denial by SNORT is the main difference between the ASA and FTD behavior. This is expected, as FTD includes SNORT inspection capabilities that weren't present in the ASA.&lt;/P&gt;&lt;P&gt;To address this issue:&lt;/P&gt;&lt;P&gt;Review the SNORT rule that's blocking the traffic. You mentioned searching for the SNORT 3 rule ID without success. Make sure you're using the correct rule ID format for SNORT 3, as it differs from SNORT 2.&lt;BR /&gt;Consider creating a prefilter rule to fastpath the traffic, bypassing SNORT inspection for this specific connection1. This can be done in the FMC under Policies &amp;gt; Access Control &amp;gt; Prefilter.&lt;BR /&gt;If the traffic should be inspected but allowed, you may need to tune your intrusion policy. Review the policy applied to the relevant access control rule and consider disabling or modifying the specific SNORT rule that's triggering.&lt;BR /&gt;Enable logging for intrusion events and review the logs to understand why SNORT is blocking the traffic. This can provide insights into potential security concerns or false positives.&lt;BR /&gt;Use the packet tracer feature in FMC to simulate the traffic flow and identify exactly where and why the packet is being dropped.&lt;BR /&gt;If you're using application-based access control, ensure that the application is correctly identified. Sometimes, updates to applications or SNORT can cause mismatches in application identification. Remember that while allowing traffic through SNORT might solve the immediate issue, it's important to understand why SNORT is blocking the traffic in the first place. This ensures you're not inadvertently introducing security vulnerabilities. If you continue to face issues, consider opening a TAC case with Cisco for further assistance, as they can provide more specific guidance based on your exact configuration and SNORT rule details.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 12:16:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254688#M1119218</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-01-30T12:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VDI access not working after migration from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254748#M1119227</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Output no prefilter&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Packet Details:&lt;BR /&gt;09:22:08.305 - 1.1.1.1:1 &amp;gt; 217.146.101.212:8443 TCP&lt;BR /&gt;GC2_Outside(vrfid:2)&lt;/P&gt;&lt;P&gt;CAPTURE&lt;BR /&gt;Type:&lt;BR /&gt;CAPTURE&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;25889 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb801f4b0, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=140103, user_data=0xffd9c900e0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=GC2_Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;ACCESS-LIST&lt;BR /&gt;Type:&lt;BR /&gt;ACCESS-LIST&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;25889 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb452d080, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=5797287, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=GC2_Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;UN-NAT&lt;BR /&gt;| static&lt;BR /&gt;Type:&lt;BR /&gt;UN-NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;static&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ_POD2_EXT,GC2_Outside) source static DMZUAG_VIP4 obj_217.146.101.212&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;19915 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;NAT divert to egress interface DMZ_POD2_EXT(vrfid:2)&lt;BR /&gt;Untranslate 217.146.101.212/8443 to 172.16.230.19/8443&lt;/P&gt;&lt;P&gt;OBJECT_GROUP_SEARCH&lt;BR /&gt;Type:&lt;BR /&gt;OBJECT_GROUP_SEARCH&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;0 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Source Object Group Match Count: 1&lt;BR /&gt;Destination Object Group Match Count: 2&lt;BR /&gt;Object Group Search: 2&lt;/P&gt;&lt;P&gt;ACCESS-LIST&lt;BR /&gt;| log&lt;BR /&gt;Type:&lt;BR /&gt;ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;log&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global access-list CSM_FW_ACL_ advanced permit ip ifc GC2_Outside any ifc DMZ_POD2_EXT any rule-id 268443040 access-list CSM_FW_ACL_ remark rule-id 268443040: ACCESS POLICY:ACP_PCH_INTERNET Default access-list CSM_FW_ACL_ remark rule-id 268443040: L7 RULE:outside_access_horizion_block&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb40ab910, priority=12, domain=permit, deny=false&lt;BR /&gt;hits=2, user_data=0x5586a1da00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=GC2_Outside(vrfid:2)&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=DMZ_POD2_EXT(vrfid:2),, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;CONN-SETTINGS&lt;BR /&gt;Type:&lt;BR /&gt;CONN-SETTINGS&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default match any policy-map global_policy class class-default set connection advanced-options UM_STATIC_TCP_MAP service-policy global_policy global&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe29e22d0, priority=7, domain=conn-set, deny=false&lt;BR /&gt;hits=17335, user_data=0xffe29dec20, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ_POD2_EXT,GC2_Outside) source static DMZUAG_VIP4 obj_217.146.101.212&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Static translate 1.1.1.1/1 to 1.1.1.1/1&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb9add2f0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=1368, user_data=0xffb93fe170, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=217.146.101.212, mask=255.255.255.255, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=DMZ_POD2_EXT(vrfid:2)&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;| per-session&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;per-session&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x55a461b2d0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93756, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;IP-OPTIONS&lt;BR /&gt;Type:&lt;BR /&gt;IP-OPTIONS&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb4532010, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=58065, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;FOVER&lt;BR /&gt;| standby-update&lt;BR /&gt;Type:&lt;BR /&gt;FOVER&lt;BR /&gt;Subtype:&lt;BR /&gt;standby-update&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;34709 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffdc592590, priority=20, domain=lu, deny=false&lt;BR /&gt;hits=14309, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;| rpf-check&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;rpf-check&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ_POD2_EXT,GC2_Outside) source static DMZUAG_VIP4 obj_217.146.101.212&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;10242 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xffb9add720, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1278, user_data=0xffb8277c50, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.230.19, mask=255.255.255.255, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=DMZ_POD2_EXT(vrfid:2)&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;| per-session&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;per-session&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;71125 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x55a461b2d0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93758, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;IP-OPTIONS&lt;BR /&gt;Type:&lt;BR /&gt;IP-OPTIONS&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;1707 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xffd84dcdf0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=14497, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=DMZ_POD2_EXT(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;FLOW-CREATION&lt;BR /&gt;Type:&lt;BR /&gt;FLOW-CREATION&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;63159 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;New flow created with id 68454, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;EXTERNAL-INSPECT&lt;BR /&gt;Type:&lt;BR /&gt;EXTERNAL-INSPECT&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;23329 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;SNORT&lt;BR /&gt;| appid&lt;BR /&gt;Type:&lt;BR /&gt;SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;appid&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;15760 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;service: (0), client: (0), payload: (0), misc: (0)&lt;/P&gt;&lt;P&gt;SNORT&lt;BR /&gt;| firewall&lt;BR /&gt;Type:&lt;BR /&gt;SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;firewall&lt;BR /&gt;Result:&lt;BR /&gt;DROP&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 4, Rule ID 268443040&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;291876 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Starting rule matching, zone 41 -&amp;gt; 14, geo 840 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268443040 - Block&lt;/P&gt;&lt;P&gt;Result: drop&lt;BR /&gt;Input Interface:&lt;BR /&gt;GC2_Outside(vrfid:2)&lt;BR /&gt;Input Status:&lt;BR /&gt;up&lt;BR /&gt;Input Line Status:&lt;BR /&gt;up&lt;BR /&gt;Output Interface:&lt;BR /&gt;DMZ_POD2_EXT(vrfid:2)&lt;BR /&gt;Output Status:&lt;BR /&gt;up&lt;BR /&gt;Output Line Status:&lt;BR /&gt;up&lt;BR /&gt;Action:&lt;BR /&gt;drop&lt;BR /&gt;Time Taken:&lt;BR /&gt;587580 ns&lt;BR /&gt;Drop Reason:&lt;BR /&gt;(firewall) Blocked or blacklisted by the firewall preprocessor&lt;BR /&gt;Drop Detail:&lt;BR /&gt;Drop-location: frame 0x000000aaaec0a208 flow (NA)/NA&lt;BR /&gt;DMZ_POD2_EXT(vrfid:2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Output with prefilter&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Packet Details:&lt;BR /&gt;12:43:15.40 - 1.1.1.1:1 &amp;gt; 217.146.101.212:8443 TCP&lt;BR /&gt;GC2_Outside(vrfid:2)&lt;/P&gt;&lt;P&gt;CAPTURE&lt;BR /&gt;Type:&lt;BR /&gt;CAPTURE&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;27596 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb801f4b0, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=140105, user_data=0xffd9c900e0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=GC2_Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;ACCESS-LIST&lt;BR /&gt;Type:&lt;BR /&gt;ACCESS-LIST&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;27596 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb452d080, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=5797288, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=GC2_Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;UN-NAT&lt;BR /&gt;| static&lt;BR /&gt;Type:&lt;BR /&gt;UN-NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;static&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ_POD2_EXT,GC2_Outside) source static DMZUAG_VIP4 obj_217.146.101.212&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;21622 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;NAT divert to egress interface DMZ_POD2_EXT(vrfid:2)&lt;BR /&gt;Untranslate 217.146.101.212/8443 to 172.16.230.19/8443&lt;/P&gt;&lt;P&gt;OBJECT_GROUP_SEARCH&lt;BR /&gt;Type:&lt;BR /&gt;OBJECT_GROUP_SEARCH&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;0 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Source Object Group Match Count: 1&lt;BR /&gt;Destination Object Group Match Count: 2&lt;BR /&gt;Object Group Search: 2&lt;/P&gt;&lt;P&gt;ACCESS-LIST&lt;BR /&gt;| log&lt;BR /&gt;Type:&lt;BR /&gt;ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;log&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global access-list CSM_FW_ACL_ advanced trust ip ifc GC2_Outside any ifc DMZ_POD2_EXT object DMZUAG_VIP4 rule-id 268443041 event-log flow-end access-list CSM_FW_ACL_ remark rule-id 268443041: PREFILTER POLICY: PF_PCH_INTERNET access-list CSM_FW_ACL_ remark rule-id 268443041: RULE: VDI-ALLOW&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffd23867f0, priority=12, domain=permit, trust&lt;BR /&gt;hits=0, user_data=0x5588911880, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=GC2_Outside(vrfid:2)&lt;BR /&gt;dst ip/id=172.16.230.19, mask=255.255.255.255, port=0, tag=any, ifc=DMZ_POD2_EXT(vrfid:2),, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;CONN-SETTINGS&lt;BR /&gt;Type:&lt;BR /&gt;CONN-SETTINGS&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default match any policy-map global_policy class class-default set connection advanced-options UM_STATIC_TCP_MAP service-policy global_policy global&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe29e22d0, priority=7, domain=conn-set, deny=false&lt;BR /&gt;hits=17336, user_data=0xffe29dec20, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ_POD2_EXT,GC2_Outside) source static DMZUAG_VIP4 obj_217.146.101.212&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Static translate 1.1.1.1/1 to 1.1.1.1/1&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb9add2f0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=1369, user_data=0xffb93fe170, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=217.146.101.212, mask=255.255.255.255, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=DMZ_POD2_EXT(vrfid:2)&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;| per-session&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;per-session&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x55a461b2d0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93758, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;IP-OPTIONS&lt;BR /&gt;Type:&lt;BR /&gt;IP-OPTIONS&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;796 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb4532010, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=58066, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;FOVER&lt;BR /&gt;| standby-update&lt;BR /&gt;Type:&lt;BR /&gt;FOVER&lt;BR /&gt;Subtype:&lt;BR /&gt;standby-update&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;34709 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffdc592590, priority=20, domain=lu, deny=false&lt;BR /&gt;hits=14310, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;| rpf-check&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;rpf-check&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ_POD2_EXT,GC2_Outside) source static DMZUAG_VIP4 obj_217.146.101.212&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;10811 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xffb9add720, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1279, user_data=0xffb8277c50, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.230.19, mask=255.255.255.255, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=GC2_Outside(vrfid:2), output_ifc=DMZ_POD2_EXT(vrfid:2)&lt;/P&gt;&lt;P&gt;NAT&lt;BR /&gt;| per-session&lt;BR /&gt;Type:&lt;BR /&gt;NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;per-session&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;60883 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x55a461b2d0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93760, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;IP-OPTIONS&lt;BR /&gt;Type:&lt;BR /&gt;IP-OPTIONS&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;2276 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xffd84dcdf0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=14498, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=DMZ_POD2_EXT(vrfid:2), output_ifc=any&lt;/P&gt;&lt;P&gt;FLOW-CREATION&lt;BR /&gt;Type:&lt;BR /&gt;FLOW-CREATION&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;58038 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;New flow created with id 68481, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;| Resolve Preferred Egress interface&lt;BR /&gt;Type:&lt;BR /&gt;INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Resolve Preferred Egress interface&lt;BR /&gt;Result:&lt;BR /&gt;ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Elapsed Time:&lt;BR /&gt;26174 ns&lt;/P&gt;&lt;P&gt;Additional Information&lt;BR /&gt;Found next-hop 172.16.230.19 using egress ifc DMZ_POD2_EXT(vrfid:2)&lt;/P&gt;&lt;P&gt;Result: drop&lt;BR /&gt;Input Interface:&lt;BR /&gt;GC2_Outside(vrfid:2)&lt;BR /&gt;Input Status:&lt;BR /&gt;up&lt;BR /&gt;Input Line Status:&lt;BR /&gt;up&lt;BR /&gt;Output Interface:&lt;BR /&gt;DMZ_POD2_EXT(vrfid:2)&lt;BR /&gt;Output Status:&lt;BR /&gt;up&lt;BR /&gt;Output Line Status:&lt;BR /&gt;up&lt;BR /&gt;Action:&lt;BR /&gt;drop&lt;BR /&gt;Time Taken:&lt;BR /&gt;273685 ns&lt;BR /&gt;Drop Reason:&lt;BR /&gt;(no-v4-adjacency) No valid V4 adjacency. Check ARP table (show arp) has entry for nexthop.&lt;BR /&gt;Drop Detail:&lt;BR /&gt;Drop-location: frame 0x000000aaad9e1cac flow (NA)/NA&lt;BR /&gt;DMZ_POD2_EXT(vrfid:2)&lt;/P&gt;&lt;P&gt;The FTD has not been migrated yet and interfaces are not up. Is this the reason why the error -&amp;nbsp;(no-v4-adjacency) No valid V4 adjacency. Check ARP table (show arp) has entry for nexthop is showing in the packet capture&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 13:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254748#M1119227</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-01-30T13:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VDI access not working after migration from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254761#M1119229</link>
      <description>&lt;P&gt;So b&lt;SPAN&gt;ased on the packet capture, there are two scenarios one without a prefilter and one with a prefilter.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;The packet is dropped by SNORT inspection due to Rule ID 268443040. The result shows:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;SNORT
| firewall
Type: SNORT
Subtype: firewall
Result: DROP
Config: Network 0, Inspection 0, Detection 4, Rule ID 268443040&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;The drop reason is given as &lt;STRONG&gt;"(firewall) Blocked or blacklisted by the firewall preprocessor".&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;With Prefilter:&lt;/SPAN&gt; &lt;SPAN&gt;The packet is allowed to pass through without being dropped by SNORT. The key difference is in the ACCESS-LIST section&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ACCESS-LIST
| log
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config: access-group CSM_FW_ACL_ global access-list CSM_FW_ACL_ advanced trust ip ifc GC2_Outside any ifc DMZ_POD2_EXT object DMZUAG_VIP4 rule-id 268443041 event-log flow-end access-list CSM_FW_ACL_ remark rule-id 268443041: PREFILTER POLICY: PF_PCH_INTERNET access-list CSM_FW_ACL_ remark rule-id 268443041: RULE: VDI-ALLOW&lt;/LI-CODE&gt;&lt;P&gt;This prefilter rule (268443041) allows the traffic to bypass SNORT inspection, effectively resolving the issue of the packet being dropped.&lt;BR /&gt;&lt;BR /&gt;"The FTD has not been migrated yet and interfaces are not up. Is this the reason why the error - (no-v4-adjacency) No valid V4 adjacency. Check ARP table (show arp) has entry for nexthop is showing in the packet capture"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The FTD's interfaces are currently down due to a pending migration. This explains the "no-v4-adjacency" error and the lack of a valid ARP entry for the nexthop in the packet capture. Once the migration is complete and the interfaces are up, the ARP table should populate, and the packet trace should succeed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 13:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254761#M1119229</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-01-30T13:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VDI access not working after migration from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254783#M1119230</link>
      <description>&lt;P&gt;Thanks for your reply Sheraz.&lt;/P&gt;&lt;P&gt;I am unable to locate the rule within SNORT3&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1738245484389.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238794i6FEA0FC36FAB2029/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1738245484389.png" alt="NetworkMonkey101_0-1738245484389.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;by filtering by the rule id nothing shows..&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_1-1738245675327.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238795iD06392422DB7FDC7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_1-1738245675327.png" alt="NetworkMonkey101_1-1738245675327.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also can you confirm if it is recommended to add a prefilter or amend the current SNORT3 rule which is blocking the connection?&lt;/P&gt;&lt;P&gt;What are the benefits and negatives for each method?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 14:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254783#M1119230</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-01-30T14:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VDI access not working after migration from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254881#M1119240</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1495947"&gt;@NetworkMonkey101&lt;/a&gt;search 26844 it does show up.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SherazSalim_0-1738252006089.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238809iD073A70CFD99CA3F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SherazSalim_0-1738252006089.png" alt="SherazSalim_0-1738252006089.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Prefiltering&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;Improved performance: Prefiltering occurs early in the inspection process, allowing for faster handling of traffic. Reduced resource usage: By quickly handling certain types of traffic, prefiltering can reduce the load on subsequent, more resource-intensive inspections. Ability to fastpath or block specific traffic: Prefiltering can quickly handle plaintext, passthrough tunnels based on outer encapsulation headers. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html" target="_self"&gt;Information taken from here.&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Negatives&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Limited criteria: Prefilter rules use simple network criteria like IP address, VLAN tag, port, and protocol, which may not be as granular as full Snort rules. Less flexibility: Prefiltering has fewer actions available compared to full access control rules.&lt;A href="https://docs.defenseorchestrator.com/cdfmc/c_prefiltering_vs_access_control.html" target="_self"&gt;Here is the link&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;Snort 3 rule &lt;SPAN&gt;Benefits:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;More granular control: Snort rules can use more robust criteria, including application-layer information &lt;A href="https://docs.snort.org/rules/headers/actions" target="_self"&gt;Benefits&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Wider range of actions: Snort rules offer more actions, including alert, block, drop, log, and pass &lt;A href="https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/snort-rules/" target="_self"&gt;link here&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Deep packet inspection: Snort can perform more thorough analysis of packet contents &lt;A href="https://docs.defenseorchestrator.com/cdfmc/c_prefiltering_vs_access_control.html" target="_self"&gt;link here&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Negatives:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Higher resource usage: Full Snort rule processing can be more resource-intensive than prefiltering &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html" target="_self"&gt;here the link but already shared above&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Potential performance impact: Processing all traffic through Snort rules may lead to slower overall performance compared to prefiltering&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="4"&gt;The choice between prefiltering and amending the Snort 3 rule depends on your specific requirements. If performance is a primary concern and the traffic can be effectively filtered using simple criteria, prefiltering may be the better option. However, if you need more granular control and deeper inspection capabilities, modifying the Snort 3 rule would be more appropriate.&lt;/FONT&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Jan 2025 15:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vdi-access-not-working-after-migration-from-asa-to-ftd/m-p/5254881#M1119240</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-01-30T15:58:48Z</dc:date>
    </item>
  </channel>
</rss>

