<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: firepower inline normalization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-inline-normalization/m-p/3893740#M17945</link>
    <description>&lt;P&gt;as long as your FMC is configured to drop in line it will drop the packet and log it in the event logs.&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jul 2019 17:10:06 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-07-19T17:10:06Z</dc:date>
    <item>
      <title>firepower inline normalization</title>
      <link>https://community.cisco.com/t5/network-security/firepower-inline-normalization/m-p/3893211#M17912</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does any one here have experience on the firepower, the results on the intrusion events have "would have dropped" and "drop"? One IPS signature but two results drop and would have dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the firepower are configured on inline mode. Any one here have the same experience? How did you manage to configure the FMC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;software version = 6.2.3 both fmc and sensor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-inline-normalization/m-p/3893211#M17912</guid>
      <dc:creator>saintlan1</dc:creator>
      <dc:date>2020-02-21T17:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: firepower inline normalization</title>
      <link>https://community.cisco.com/t5/network-security/firepower-inline-normalization/m-p/3893740#M17945</link>
      <description>&lt;P&gt;as long as your FMC is configured to drop in line it will drop the packet and log it in the event logs.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2019 17:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-inline-normalization/m-p/3893740#M17945</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-07-19T17:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: firepower inline normalization</title>
      <link>https://community.cisco.com/t5/network-security/firepower-inline-normalization/m-p/3894011#M17963</link>
      <description>&lt;P&gt;It should work as you said, but I've seen cases where http and https traffic to the same host fires the same ips rule, but http traffic gets dropped and https traffic gets would have dropped.&lt;/P&gt;&lt;P&gt;Don't know if it depends on the host not fully discovered or what, but I've seen it.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 05:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-inline-normalization/m-p/3894011#M17963</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2019-07-20T05:44:46Z</dc:date>
    </item>
  </channel>
</rss>

