<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTDv Not Matching Rule set to &amp;quot;Allow&amp;quot; have to set in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274487#M1120246</link>
    <description>&lt;P&gt;UPDATE: Looks like this is a BUG. Found this&lt;BR /&gt;&lt;A href="https://bst.cisco.com/quickview/bug/CSCwk78400" target="_blank"&gt;https://bst.cisco.com/quickview/bug/CSCwk78400&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I'm guessing im sticking to setting the zone to ANY for now. Still has no fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Mar 2025 08:12:55 GMT</pubDate>
    <dc:creator>LJ Gabrillo</dc:creator>
    <dc:date>2025-03-24T08:12:55Z</dc:date>
    <item>
      <title>Cisco FTDv Not Matching Rule set to "Allow" have to set it to "Trust"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274445#M1120241</link>
      <description>&lt;P&gt;For the setup, I'm basically running a demo version of FTDv. Also enabled the trial licenses for IPS, Malware Defense, URL, Essentials.&lt;BR /&gt;&lt;BR /&gt;I'm currently encountering an issue in which I have to set the action of the Policy to "Trust" to make it work. Setting it to "Allow" blocks the traffic. The troubleshooting i've done so far is doing a packet-tracer, system support firewall-engine-debug and&amp;nbsp;system support trace. Based on the traces, the traffic it matches the Implicit Policy (Default) when the action of the rule is "Allow" however, when set to "Trust" it works&lt;BR /&gt;&lt;BR /&gt;firewall-engine-debug output:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;FONT size="2"&gt;10.1.1.111 8 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 New firewall session&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 8 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Starting with minimum 0, id 0 and dst network first with zones -1 -&amp;gt; -1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, svc 0, payload 0, client 0, misc 0, user 9999997, icmpType 8, icmpCode 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 8 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 match rule order 2, 'Default Action', action Block&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 8 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 MidRecovery data sent for rule id: 1, rule_action:4, rev id:3879646918, rule_match flag:0x1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 8 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Generating an SOF event with rule_id = 1 ruleAction = 4 ruleReason = 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 8 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 deny action&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 8 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Deleting Firewall session flags=0x0, logFlags=0x1000&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;trace output:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Packet 1116: ICMP, 03/24-06:07:06.246691, Type: 8 Code: 0 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Session: new snort session&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Firewall: starting rule matching, zone -1 -&amp;gt; -1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, icmpType 8, icmpCode 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Firewall: block rule, 'Default Action', force_block&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Stream: pending block, drop&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Policies: Network 0, Inspection 0, Detection 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Verdict: blacklist&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;10.1.1.111 0 -&amp;gt; 1.1.1.1 0 1 AS=0 ID=0 GR=1-1 Verdict Reason: firewall, force_block&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;Configuration wise:&lt;BR /&gt;-This is a simple User to Internet Policy, literally just LAN to ANY. Everything works basically if the policy is set to "Trust". Setting it to allow blocks everything and matches it to the implicit deny action.&lt;BR /&gt;-Intrusion&amp;nbsp;Default Network Analysis Policy has been set to "No Rules Active"&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Screenshot of my policy&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LJGabrillo_0-1742796554141.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242270i1E733DA896E7B3EC/image-size/large?v=v2&amp;amp;px=999" role="button" title="LJGabrillo_0-1742796554141.png" alt="LJGabrillo_0-1742796554141.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Appreciate any inputs. Really confusing why this isn't matching an "allow" policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 06:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274445#M1120241</guid>
      <dc:creator>LJ Gabrillo</dc:creator>
      <dc:date>2025-03-24T06:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTDv Not Matching Rule set to "Allow" have to set</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274446#M1120242</link>
      <description>&lt;P&gt;The "Trust" action allows the traffic with no additional checks, while the "Allow" action passes the traffic to the snort engine.&lt;/P&gt;&lt;P&gt;edit: link:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212321-clarify-the-firepower-threat-defense-acc.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 06:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274446#M1120242</guid>
      <dc:creator>ulineosan</dc:creator>
      <dc:date>2025-03-24T06:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTDv Not Matching Rule set to "Allow" have to set</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274447#M1120243</link>
      <description>&lt;P&gt;Yes you are correct, but that is not my question (not asking the difference between Trust and Allow). My concern is that I have to use "Trust" to make the policy hit the traffic. However, our requirement is that it should be "Allow"&lt;BR /&gt;&lt;BR /&gt;I want my policies to have action "allow" so that I can enable sec features such as IPS and File Filter.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 06:25:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274447#M1120243</guid>
      <dc:creator>LJ Gabrillo</dc:creator>
      <dc:date>2025-03-24T06:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTDv Not Matching Rule set to "Allow" have to set</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274473#M1120245</link>
      <description>&lt;P&gt;UPDATE: I sorta found a workaround, it seems the issue in the ZONE config. After setting the policy to use "Any" Zone, traffic is working now.&lt;BR /&gt;&lt;BR /&gt;I do not see any issues with my zone configuration, tripled check and verified that the zone is mapped to the correct interface.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 07:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274473#M1120245</guid>
      <dc:creator>LJ Gabrillo</dc:creator>
      <dc:date>2025-03-24T07:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTDv Not Matching Rule set to "Allow" have to set</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274487#M1120246</link>
      <description>&lt;P&gt;UPDATE: Looks like this is a BUG. Found this&lt;BR /&gt;&lt;A href="https://bst.cisco.com/quickview/bug/CSCwk78400" target="_blank"&gt;https://bst.cisco.com/quickview/bug/CSCwk78400&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I'm guessing im sticking to setting the zone to ANY for now. Still has no fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 08:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-not-matching-rule-set-to-quot-allow-quot-have-to-set/m-p/5274487#M1120246</guid>
      <dc:creator>LJ Gabrillo</dc:creator>
      <dc:date>2025-03-24T08:12:55Z</dc:date>
    </item>
  </channel>
</rss>

