<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Just making sure it wasn't in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061825#M135216</link>
    <description>&lt;P&gt;Just making sure it wasn't for FTD - in which case it would open up your firewall. For inspection purposes it's fine though.&lt;/P&gt;
&lt;P&gt;Have you customized the $HOME_NET and $EXTERNAL_NET variables for your network discovery? That allows you to use any-any with more confidence and let FirePOWER use the intelligence embedded in the Snort rules to decide in which cases protection needs to be applied.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 May 2017 15:58:43 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-05-26T15:58:43Z</dc:date>
    <item>
      <title>Adding rules to access control policy - Sourcefire/ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061822#M135198</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Attached is a screenshot of a few rules I added in the access control policy of my sourcefire config. Please take a look to see if it makes sense as to where I placed and configured the rules. Its a basic setup, inside and outside zone interface, and private network object.&lt;/P&gt;
&lt;P&gt;I have rules that:&lt;/P&gt;
&lt;P&gt;block geolocation (blocked countries) from any source to destination and from any destination to source.&lt;/P&gt;
&lt;P&gt;allow zone inside to zone outside and source private network to any&lt;/P&gt;
&lt;P&gt;allow zone outside to zone inside and destination private network from any&lt;/P&gt;
&lt;P&gt;allow (default rule) all any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also have these rules labeled under the Administrator Rules section and nothing under the "Standard" or "Root" section if that matters.&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061822#M135198</guid>
      <dc:creator>tolinrome tolinrome</dc:creator>
      <dc:date>2019-03-12T09:25:27Z</dc:date>
    </item>
    <item>
      <title>Is this for and FTD device or</title>
      <link>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061823#M135205</link>
      <description>&lt;P&gt;Is this for and FTD device or a FirePOWER module on an ASA?&lt;/P&gt;
&lt;P&gt;The geolocation rule should be two rules: 1) Block incoming from blocked countries to any. 2) Block outgoing from any to blocked countries. Otherwise traffic would have to be from a blocked country to another blocked country to match it.&lt;/P&gt;
&lt;P&gt;It would seem very unusual to allow external traffic inbound for everything. We would normally expect an ACL to restrict the extrernally initiated traffic to accessing only a few specific servicers and services.&lt;/P&gt;
&lt;P&gt;It looks like you have no file (AMP) policy specified. Do you have the Malware license?&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 05:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061823#M135205</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-26T05:30:59Z</dc:date>
    </item>
    <item>
      <title>This is for FirePOWER module</title>
      <link>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061824#M135208</link>
      <description>&lt;P&gt;This is for FirePOWER module on the ASA. I thought the allowing of external traffic to internal would mean "inspect everything from external to internal"? after the traffic goes through the firewall ACL? Thats why I made the rule.&lt;/P&gt;
&lt;P&gt;So, on the acess control policy I would remove that rule and leave the one for "from internal to external"?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 12:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061824#M135208</guid>
      <dc:creator>tolinrome tolinrome</dc:creator>
      <dc:date>2017-05-26T12:47:19Z</dc:date>
    </item>
    <item>
      <title>Just making sure it wasn't</title>
      <link>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061825#M135216</link>
      <description>&lt;P&gt;Just making sure it wasn't for FTD - in which case it would open up your firewall. For inspection purposes it's fine though.&lt;/P&gt;
&lt;P&gt;Have you customized the $HOME_NET and $EXTERNAL_NET variables for your network discovery? That allows you to use any-any with more confidence and let FirePOWER use the intelligence embedded in the Snort rules to decide in which cases protection needs to be applied.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 15:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061825#M135216</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-26T15:58:43Z</dc:date>
    </item>
    <item>
      <title>$HOME_NET is my private</title>
      <link>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061826#M135220</link>
      <description>&lt;P&gt;$HOME_NET is my private networks and $EXTERNAL_NET is the default, which is any, which I left as is as I assume that would be "any" as in "outside."&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 16:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061826#M135220</guid>
      <dc:creator>tolinrome tolinrome</dc:creator>
      <dc:date>2017-05-26T16:20:03Z</dc:date>
    </item>
    <item>
      <title>It's recommended to make</title>
      <link>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061827#M135224</link>
      <description>&lt;P&gt;It's recommended to make $EXTERNAL_NET be !$HOME_NET ("not home net")&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 16:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-rules-to-access-control-policy-sourcefire-asa/m-p/3061827#M135224</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-26T16:24:54Z</dc:date>
    </item>
  </channel>
</rss>

