<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower Intrusion detection: How to disable/whitelist rule for spesific hosts? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/2978291#M148638</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have implemented Firepower Intrusion detection on my ASA 5525-X, and how a question: One of the rules blocks traffic between 2 hosts, but I do not want this traffic to be blocked between these hosts. I want the rule to be active, but how can I prevent the rule to block traffic between these 2 hosts, while blocking traffic for other hosts that are hit by the rule?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Br,&lt;/P&gt;
&lt;P&gt;Thor-Egil&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:31:22 GMT</pubDate>
    <dc:creator>cisco</dc:creator>
    <dc:date>2019-03-12T08:31:22Z</dc:date>
    <item>
      <title>Firepower Intrusion detection: How to disable/whitelist rule for spesific hosts?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/2978291#M148638</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have implemented Firepower Intrusion detection on my ASA 5525-X, and how a question: One of the rules blocks traffic between 2 hosts, but I do not want this traffic to be blocked between these hosts. I want the rule to be active, but how can I prevent the rule to block traffic between these 2 hosts, while blocking traffic for other hosts that are hit by the rule?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Br,&lt;/P&gt;
&lt;P&gt;Thor-Egil&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/2978291#M148638</guid>
      <dc:creator>cisco</dc:creator>
      <dc:date>2019-03-12T08:31:22Z</dc:date>
    </item>
    <item>
      <title>Hello, this can be achived by</title>
      <link>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/2978292#M148639</link>
      <description>&lt;P&gt;Hello, this can be achived by implementing Access control rule for those two hosts. Let's assume, you need to disable IPS Policy for traffic between 192.168.1.5 and 172.16.1.5. Inseret the new access rule above the rule with IPS policy configured. Choose the "trust" action for new rule. See the attach.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Alternatively, if you don't want to disable IPS between two hosts completely, you can create a new IPS policy with the signature which blocks traffic between two hosts currently setted to disabled state. After that create the new access rule as in the first example but with action "Allow", and implement a new IPS policy with disabled signature.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2016 12:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/2978292#M148639</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-11-11T12:01:17Z</dc:date>
    </item>
    <item>
      <title>Thanks, your first solution</title>
      <link>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/2978293#M148640</link>
      <description>&lt;P&gt;Thanks, your first solution will work for me.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Br,&lt;/P&gt;
&lt;P&gt;Thor-Egil&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2016 12:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/2978293#M148640</guid>
      <dc:creator>cisco</dc:creator>
      <dc:date>2016-11-11T12:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Hello, this can be achived by</title>
      <link>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/3679968#M148641</link>
      <description>&lt;P&gt;Thanks so much. This was the solution I needed for fix a Site-Site Hyper-V replication problem.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 12:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-intrusion-detection-how-to-disable-whitelist-rule-for/m-p/3679968#M148641</guid>
      <dc:creator>zirbesma</dc:creator>
      <dc:date>2018-08-02T12:53:10Z</dc:date>
    </item>
  </channel>
</rss>

