<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3054397#M145291</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am running into the same problem. Did you find the solution for this?&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jun 2017 07:21:39 GMT</pubDate>
    <dc:creator>Arild Amundsen</dc:creator>
    <dc:date>2017-06-26T07:21:39Z</dc:date>
    <item>
      <title>Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3054396#M145288</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;when I issued a packet-tracer from my antispam to Internet on SMTP dest port, I see this results :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Phase: 12&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Type: SNORT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Result: DROP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Snort Trace:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Packet: TCP, SYN, seq 811220630&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;AppID: service unknown (0), application unknown (0)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Firewall: starting rule matching, zone 1 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, sgt 65535, user 9999997, icmpType 0, icmpCode 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Firewall: block rule, id 268434432, drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Snort: processed decoder alerts or actions queue, drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace; color: #ff0000;"&gt;NAP id 2, IPS id 0, Verdict BLACKLIST, Blocked by Firewall&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace; color: #ff0000;"&gt;Snort Verdict: (black-list) black list this flow&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Result:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;input-interface: INSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;input-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;output-interface: OUT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;output-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Action: drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Drop-reason: (firewall) &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Blocked or blacklisted by the firewall preprocessor&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can't find anyware to allow or white list this stream&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:09:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3054396#M145288</guid>
      <dc:creator>ssambourg</dc:creator>
      <dc:date>2019-03-12T09:09:30Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3054397#M145291</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am running into the same problem. Did you find the solution for this?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2017 07:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3054397#M145291</guid>
      <dc:creator>Arild Amundsen</dc:creator>
      <dc:date>2017-06-26T07:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3349271#M145292</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm also encounter same issue , do you resolve this problem ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And another question is how to tune Snort Verdict blacklisted time?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 15:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3349271#M145292</guid>
      <dc:creator>Ben Chen</dc:creator>
      <dc:date>2018-03-15T15:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3349327#M145294</link>
      <description>&lt;P&gt;In such a case the destination address is in the Firepower blacklist - either the one downloaded automatically as part of the Cisco Security Intelligence (SI) feed or a local custom blacklist.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 16:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3349327#M145294</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-15T16:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3370486#M145295</link>
      <description>&lt;P&gt;i have the same issue when failover to primary node. i am using FTD running version 6.2.3 -83. secondary node work normally.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Apr 2018 23:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3370486#M145295</guid>
      <dc:creator>CiscoAzs</dc:creator>
      <dc:date>2018-04-21T23:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3370580#M145297</link>
      <description>&lt;P&gt;Are the appliances managed locally (ASDM) or remotely(FMC). In either case you must make sure that the policies are applied identically to both nodes.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Apr 2018 12:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3370580#M145297</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-04-22T12:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3370824#M145299</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;
&lt;P&gt;i was the same issue but cisco tag help me find the reason&lt;/P&gt;
&lt;P&gt;your output contain the blocking line id&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Firewall: block rule, id 268434432, drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;in your situation it is 268434432&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;you must go to firepower applianca cli&amp;nbsp; and connect to FTD&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;if promt is "ASB-HO-FTD-A# " connect to FTD&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;ASB-HO-FTD-A# connect ftd &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;then go to expert mode by typeng next commang&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&amp;gt; expert&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;do the next linux command ( &lt;SPAN&gt;&lt;STRONG&gt;1ac0cb9a-0cd2-11e8-8c50-8f0e1cebbe73&lt;/STRONG&gt;&lt;/SPAN&gt; part is different for each appliance&amp;nbsp; )&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt; &lt;SPAN&gt;cat /var/sf/detection_engines/&lt;STRONG&gt;1ac0cb9a-0cd2-11e8-8c50-8f0e1cebbe73&lt;/STRONG&gt;/ngfw.rules&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN&gt;if you have problem with doing privious step then &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN&gt;- type "cat /var/sf/detection_engines/"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN&gt;- press tab button&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN&gt;- append "ngfw.rules"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN&gt;&amp;nbsp;after this you will see all ACL and ID of each ACE&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN&gt;find the one from packet tracer output " 268434432 " &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN&gt;probably you must have permit statement for traffic before this point.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 05:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3370824#M145299</guid>
      <dc:creator>Aydin Ehtibarov</dc:creator>
      <dc:date>2018-04-23T05:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3885950#M145301</link>
      <description>Hi Marvin, Im having the same issue between 2 FTDs which are managed by FMC. Both FTDs has identical config and not blacklisted. Below results only showing when running packet-tracer from FTD1 to FTD2, but works fine when run packet-tracer between FTD2 to FTD1.&lt;BR /&gt;"Drop-reason: (firewall) Blocked or blacklisted by the firewall preprocessor."&lt;BR /&gt;&lt;BR /&gt;Any suggestions....</description>
      <pubDate>Mon, 08 Jul 2019 02:57:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3885950#M145301</guid>
      <dc:creator>G_Singh</dc:creator>
      <dc:date>2019-07-08T02:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886115#M145302</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445696"&gt;@G_Singh&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are FTD 1 and FTD 2 in an HA pair?&lt;/P&gt;
&lt;P&gt;We need some more details to ascertain possible causes of your problem.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 09:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886115#M145302</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-08T09:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886642#M145304</link>
      <description>Hi Marvin, no FTDs arent clustered or in HA, but will be in future....also as Aydin Ehtibarov mentioned, I ran same expert Linux commands but unable to find the Tracer output on non-working FTD as it should, but able to see on working FTD.&lt;BR /&gt;&lt;BR /&gt;(FW101) non-working&lt;BR /&gt;&amp;gt; show access-list | include DMVPN_Traffic_Hub_to_Hub&lt;BR /&gt;access-list CSM_FW_ACL_ line 140 remark rule-id 268439606: L7 RULE: DMVPN_Traffic_Hub_to_Hub&lt;BR /&gt;&lt;BR /&gt;show access-list | include 268439606&lt;BR /&gt;access-list CSM_FW_ACL_ line 139 remark rule-id 268439606: ACCESS POLICY: FW101 - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ line 140 remark rule-id 268439606: L7 RULE: DMVPN_Traffic_Hub_to_Hub&lt;BR /&gt;access-list CSM_FW_ACL_ line 141 advanced permit tcp ifc Interlink object-group FMC_INLINE_src_rule_268439606 ifc Interlink object-group FMC_INLINE_dst_rule_268439606 object-group ESP_50 rule-id 268439606 (hitcnt=0) 0x65342c53&lt;BR /&gt;access-list CSM_FW_ACL_ line 141 advanced permit tcp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 50 rule-id 268439606 (hitcnt=0) 0x7a797f98&lt;BR /&gt;access-list CSM_FW_ACL_ line 141 advanced permit tcp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 50 rule-id 268439606 (hitcnt=0) 0x0a8c2851&lt;BR /&gt;access-list CSM_FW_ACL_ line 141 advanced permit tcp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 50 rule-id 268439606 (hitcnt=0) 0x5effc1c3&lt;BR /&gt;access-list CSM_FW_ACL_ line 141 advanced permit tcp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 50 rule-id 268439606 (hitcnt=0) 0x146865f8&lt;BR /&gt;access-list CSM_FW_ACL_ line 142 advanced permit udp ifc Interlink object-group FMC_INLINE_src_rule_268439606 ifc Interlink object-group FMC_INLINE_dst_rule_268439606 object-group UDP_4500 rule-id 268439606 (hitcnt=0) 0x8d388f80&lt;BR /&gt;access-list CSM_FW_ACL_ line 142 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 4500 rule-id 268439606 (hitcnt=0) 0x79dc3f1d&lt;BR /&gt;access-list CSM_FW_ACL_ line 142 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 4500 rule-id 268439606 (hitcnt=0) 0x6ca0619f&lt;BR /&gt;access-list CSM_FW_ACL_ line 142 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 4500 rule-id 268439606 (hitcnt=0) 0xaef4147c&lt;BR /&gt;access-list CSM_FW_ACL_ line 142 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 4500 rule-id 268439606 (hitcnt=0) 0x0dfa067c&lt;BR /&gt;access-list CSM_FW_ACL_ line 143 advanced permit udp ifc Interlink object-group FMC_INLINE_src_rule_268439606 ifc Interlink object-group FMC_INLINE_dst_rule_268439606 object-group UDP_500 rule-id 268439606 (hitcnt=6) 0xdd1f3fe4&lt;BR /&gt;access-list CSM_FW_ACL_ line 143 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq isakmp rule-id 268439606 (hitcnt=0) 0xfd58fc5b&lt;BR /&gt;access-list CSM_FW_ACL_ line 143 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq isakmp rule-id 268439606 (hitcnt=0) 0x810563db&lt;BR /&gt;access-list CSM_FW_ACL_ line 143 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq isakmp rule-id 268439606 (hitcnt=6) 0xf3c91e26&lt;BR /&gt;access-list CSM_FW_ACL_ line 143 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq isakmp rule-id 268439606 (hitcnt=0) 0xe1fc9781&lt;BR /&gt;access-list CSM_FW_ACL_ line 144 advanced permit udp ifc Interlink object-group FMC_INLINE_src_rule_268439606 ifc Interlink object-group FMC_INLINE_dst_rule_268439606 object-group IPSec_over_UDP rule-id 268439606 (hitcnt=0) 0xe1b61e51&lt;BR /&gt;access-list CSM_FW_ACL_ line 144 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 10000 rule-id 268439606 (hitcnt=0) 0xfa9d9d5c&lt;BR /&gt;access-list CSM_FW_ACL_ line 144 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 10000 rule-id 268439606 (hitcnt=0) 0x4d1f57ad&lt;BR /&gt;access-list CSM_FW_ACL_ line 144 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 10000 rule-id 268439606 (hitcnt=0) 0x2247f007&lt;BR /&gt;access-list CSM_FW_ACL_ line 144 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 10000 rule-id 268439606 (hitcnt=0) 0xc20f6752&lt;BR /&gt;&lt;BR /&gt;Below commands are from Expert mode in FTD, showing no out put in regards to rule-id 268439606 as it shows on working FTD at the bootm of the page&lt;BR /&gt;admin@FW101: cat /var/sf/detection_engines/17b6430e-5f23-11e9-b014-8e6fe6d5323f/ngfw.rules&lt;BR /&gt;(should appear some rule-id 268439606)&lt;BR /&gt;&lt;BR /&gt;(FW201) Working&lt;BR /&gt;&amp;gt; show access-list | include DMVPN_Traffic_Hub_to_Hub&lt;BR /&gt;access-list CSM_FW_ACL_ line 273 remark rule-id 268439607: L7 RULE: DMVPN_Traffic_Hub_to_Hub&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show access-list | include 268439607&lt;BR /&gt;access-list CSM_FW_ACL_ line 272 remark rule-id 268439607: ACCESS POLICY: FW201 - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ line 273 remark rule-id 268439607: L7 RULE: DMVPN_Traffic_Hub_to_Hub&lt;BR /&gt;access-list CSM_FW_ACL_ line 274 advanced permit tcp ifc Interlink object-group FMC_INLINE_src_rule_268439607 ifc Interlink object-group FMC_INLINE_dst_rule_268439607 object-group ESP_50 rule-id 268439607 (hitcnt=0) 0x945e36cb&lt;BR /&gt;access-list CSM_FW_ACL_ line 274 advanced permit tcp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 50 rule-id 268439607 (hitcnt=0) 0x7a797f98&lt;BR /&gt;access-list CSM_FW_ACL_ line 274 advanced permit tcp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 50 rule-id 268439607 (hitcnt=0) 0x0a8c2851&lt;BR /&gt;access-list CSM_FW_ACL_ line 274 advanced permit tcp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 50 rule-id 268439607 (hitcnt=0) 0x5effc1c3&lt;BR /&gt;access-list CSM_FW_ACL_ line 274 advanced permit tcp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 50 rule-id 268439607 (hitcnt=0) 0x146865f8&lt;BR /&gt;access-list CSM_FW_ACL_ line 275 advanced permit udp ifc Interlink object-group FMC_INLINE_src_rule_268439607 ifc Interlink object-group FMC_INLINE_dst_rule_268439607 object-group UDP_4500 rule-id 268439607 (hitcnt=0) 0xccac03cf&lt;BR /&gt;access-list CSM_FW_ACL_ line 275 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 4500 rule-id 268439607 (hitcnt=0) 0x79dc3f1d&lt;BR /&gt;access-list CSM_FW_ACL_ line 275 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 4500 rule-id 268439607 (hitcnt=0) 0x6ca0619f&lt;BR /&gt;access-list CSM_FW_ACL_ line 275 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 4500 rule-id 268439607 (hitcnt=0) 0xaef4147c&lt;BR /&gt;access-list CSM_FW_ACL_ line 275 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 4500 rule-id 268439607 (hitcnt=0) 0x0dfa067c&lt;BR /&gt;access-list CSM_FW_ACL_ line 276 advanced permit udp ifc Interlink object-group FMC_INLINE_src_rule_268439607 ifc Interlink object-group FMC_INLINE_dst_rule_268439607 object-group UDP_500 rule-id 268439607 (hitcnt=1) 0x202df959&lt;BR /&gt;access-list CSM_FW_ACL_ line 276 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq isakmp rule-id 268439607 (hitcnt=0) 0xfd58fc5b&lt;BR /&gt;access-list CSM_FW_ACL_ line 276 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq isakmp rule-id 268439607 (hitcnt=1) 0x810563db&lt;BR /&gt;access-list CSM_FW_ACL_ line 276 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq isakmp rule-id 268439607 (hitcnt=0) 0xf3c91e26&lt;BR /&gt;access-list CSM_FW_ACL_ line 276 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq isakmp rule-id 268439607 (hitcnt=0) 0xe1fc9781&lt;BR /&gt;access-list CSM_FW_ACL_ line 277 advanced permit udp ifc Interlink object-group FMC_INLINE_src_rule_268439607 ifc Interlink object-group FMC_INLINE_dst_rule_268439607 object-group IPSec_over_UDP rule-id 268439607 (hitcnt=0) 0x37d6d61a&lt;BR /&gt;access-list CSM_FW_ACL_ line 277 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 10000 rule-id 268439607 (hitcnt=0) 0xfa9d9d5c&lt;BR /&gt;access-list CSM_FW_ACL_ line 277 advanced permit udp ifc Interlink x.x.x.0 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 10000 rule-id 268439607 (hitcnt=0) 0x4d1f57ad&lt;BR /&gt;access-list CSM_FW_ACL_ line 277 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.0 255.255.255.252 eq 10000 rule-id 268439607 (hitcnt=0) 0x2247f007&lt;BR /&gt;access-list CSM_FW_ACL_ line 277 advanced permit udp ifc Interlink x.x.x.4 255.255.255.252 ifc Interlink x.x.x.4 255.255.255.252 eq 10000 rule-id 268439607 (hitcnt=0) 0xc20f6752&lt;BR /&gt;&lt;BR /&gt;FROM EXPERT MODE of FTD (CLI)&lt;BR /&gt;admin@FW201:~$ cat /var/sf/detection_engines/0b43cfec-a673-11e8-a02e-385aad3b79f3/ngfw.rules&lt;BR /&gt;268439607 allow 8 x.x.x.0 29 any 8 x.x.x.0 29 10000 any 17&lt;BR /&gt;268439607 allow 8 x.x.x.0 29 any 8 x.x.x.0 29 4500 any 17&lt;BR /&gt;268439607 allow 8 x.x.x.0 29 any 8 x.x.x.0 29 500 any 17&lt;BR /&gt;268439607 allow 8 x.x.x.0 29 any 8 x.x.x.0 29 50 any 6</description>
      <pubDate>Mon, 08 Jul 2019 22:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886642#M145304</guid>
      <dc:creator>G_Singh</dc:creator>
      <dc:date>2019-07-08T22:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886727#M145306</link>
      <description>&lt;P&gt;If there aren't in an HA pair or cluster, how can they have the same configurations? Can you backup a step and tell us how you have them setup? Is this a lab?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 03:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886727#M145306</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-09T03:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886731#M145310</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;I have 2x (2130) FTDs managed by FMC and all in production. Initially, we only needed 1 FTD and over the time things grew and added new FTD. Previously deployed FTD running version 6.2.3.12 and recently added FTD running version 6.2.1. Im unable to upgrade 6.2.1 to 6.2.3.12 therefore can not cluster/HA (TAC case logged).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually, I wasn't able to set up DMVPN/IPSec tunnels between our 2 HUBs which are behind each FTD. Tried running packet-tracer and seen this SNORT drop, now Im here and seeking advice on "&lt;SPAN&gt;Blocked or blacklisted by the firewall preprocessor"&lt;/SPAN&gt;. Mind you to establish tunnels between both HUBs traffic traverses thru both FTD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question arises, should I wait to upgrade FTD 6.2.1 to 6.2.3.12 and then cluster/HA or should look for reason for DROP?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 03:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886731#M145310</guid>
      <dc:creator>G_Singh</dc:creator>
      <dc:date>2019-07-09T03:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886752#M145313</link>
      <description>&lt;P&gt;To pass DMVPN/IPsec tunnels through the Firepower devices, you should allow the traffic in a prefilter rule - not an access control policy rule. You will need to allow:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;UDP/500,&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;UDP/4500 and&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;ESP/AH (IP proto 50/51) depending on configuration.&lt;/P&gt;
&lt;P&gt;...to your hub address. The action should be "Fastpath".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 05:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3886752#M145313</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-09T05:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3887378#M145315</link>
      <description>Thanks Marvin, added the prefilter and packet-tracer seems happy now!&lt;BR /&gt;As your last post, jsut making sure that when using DMVPN/IPSec tunnels then should ONLY use Prefilter not ACP rule?</description>
      <pubDate>Wed, 10 Jul 2019 01:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3887378#M145315</guid>
      <dc:creator>G_Singh</dc:creator>
      <dc:date>2019-07-10T01:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blocked or blacklisted by the firewall preprocessor</title>
      <link>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3887420#M145316</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;Yes, that's correct - only prefilter it with Fastpath action. Since the traffic is IPsec encapsulated and coming from known endpoints, none of the NGIPS processes (Snort, SI, Malware detection etc.) can add any value so prefilter will just Fastpath the DMVPN traffic to the post-processing stages (ALG, egress interface selection etc.).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD Order of Operations" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/40480i5B6D7EED08ED6F3E/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD OOO.PNG" alt="FTD Order of Operations" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD Order of Operations&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 02:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocked-or-blacklisted-by-the-firewall-preprocessor/m-p/3887420#M145316</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-10T02:48:51Z</dc:date>
    </item>
  </channel>
</rss>

