<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318122#M1122126</link>
    <description>&lt;P&gt;Thank you! Can you help clarify another related question?&lt;/P&gt;&lt;P&gt;There are some IPS rules for services I &lt;STRONG&gt;don't&lt;/STRONG&gt; have, for example, Apache, SQL Server, Oracle, and so on. Should I disable those rules?&lt;/P&gt;</description>
    <pubDate>Wed, 06 Aug 2025 13:13:24 GMT</pubDate>
    <dc:creator>Otvforte</dc:creator>
    <dc:date>2025-08-06T13:13:24Z</dc:date>
    <item>
      <title>IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318100#M1122120</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;I've been trying to figure out the best approach for applying IPS inspection.&lt;/P&gt;&lt;P&gt;Suppose I don't have any internal services or servers exposed to the internet — meaning no port forwarding from Outside to DMZ or Outside to Inside. In that case, does it still make sense to enable IPS on zones like Any/Any, or should I stick with Inside-to-Outside inspection only?&lt;/P&gt;&lt;P&gt;The only exception would be the VPN service, which would still be reachable from the internet.&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 12:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318100#M1122120</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-06T12:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318117#M1122123</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222704-configure-fdm-interfaces-in-inline-pair.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222704-configure-fdm-interfaces-in-inline-pair.html&lt;/A&gt;&amp;nbsp;&amp;lt;&amp;lt;- check this maybe it answer your Q&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:05:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318117#M1122123</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-06T13:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318118#M1122124</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Just answering my own question.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I don't have internal services or servers published on the internet, then I don't have any rules in the Outside-to-Inside or Outside-to-DMZ direction. So the question doesn't really make sense — there's not even a rule where IPS could be enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318118#M1122124</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-06T13:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318120#M1122125</link>
      <description>&lt;P&gt;IPS can apply with ACP&amp;nbsp;&lt;BR /&gt;or can apply as inline &amp;lt;&amp;lt;- here FTD is work as IPS only&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318120#M1122125</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-06T13:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318122#M1122126</link>
      <description>&lt;P&gt;Thank you! Can you help clarify another related question?&lt;/P&gt;&lt;P&gt;There are some IPS rules for services I &lt;STRONG&gt;don't&lt;/STRONG&gt; have, for example, Apache, SQL Server, Oracle, and so on. Should I disable those rules?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318122#M1122126</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-06T13:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318140#M1122127</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1895170"&gt;@Otvforte&lt;/a&gt;&amp;nbsp;it is recommended by cisco&amp;nbsp;to disable rules written for vulnerabilities not found on hosts in your network, so if you are not using&amp;nbsp; Apache, SQL Server, Oracle etc you'd not have a vulnerabilities and can disable those rules. You can use the cisco recommendations to&amp;nbsp;tune the Snort rule set based on host data collected through passive discovery.&amp;nbsp;The Recommendations feature uses this host database to determine which Snort rules apply to your environment.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://secure.cisco.com/secure-firewall/v7.4/docs/intrusion-policy-73" target="_blank"&gt;https://secure.cisco.com/secure-firewall/v7.4/docs/intrusion-policy-73&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318140#M1122127</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-08-06T13:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318146#M1122128</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I'm currently using FDM, so Network Discovery isn't available at the moment. However, I'll look into it if I get the opportunity in the future.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318146#M1122128</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-06T13:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318159#M1122129</link>
      <description>&lt;P&gt;Can i know where you see these options&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Screenshots is perfect&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 14:04:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318159#M1122129</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-06T14:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318178#M1122131</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249822i37C51FBFE74BC026/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image.png" alt="Image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 14:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318178#M1122131</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-06T14:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPS traffic</title>
      <link>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318185#M1122133</link>
      <description>&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Dont change anything here&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;this cisco recommend action and you can not control what user use, so you dont know if user use SQL or not.&lt;/P&gt;
&lt;P&gt;you can instead change the no. of rules by change the security level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (297).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249827i164377E7574C7A27/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (297).png" alt="Screenshot (297).png" /&gt;&lt;/span&gt;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 15:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-traffic/m-p/5318185#M1122133</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-06T15:26:57Z</dc:date>
    </item>
  </channel>
</rss>

