<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803790#M18313</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The best way would be to create a TRUST rule for the source ip as Symantec Proxy server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;</description>
    <pubDate>Sat, 21 Nov 2015 13:31:19 GMT</pubDate>
    <dc:creator>Aastha Bhardwaj</dc:creator>
    <dc:date>2015-11-21T13:31:19Z</dc:date>
    <item>
      <title>Turn off rule for specific IP address</title>
      <link>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803789#M18311</link>
      <description>&lt;P&gt;Hello everyone.&lt;/P&gt;
&lt;P&gt;I am looking for a way to turn off a rule for one specific source IP address. I have a customer whose&amp;nbsp;Symantec Proxy server is triggering the "MALWARE-CNC Win.Trojan.Cidox variant outbound connection" rule on trafffic bound for Symantec. Due to the base IPS policy this traffic is being dropped by the FirePOWER sensor. I don't want to disable&amp;nbsp;the rule I just want to stop it from dropping traffic&amp;nbsp;when the source IP is the Symantec Proxy server IP.&lt;/P&gt;
&lt;P&gt;Would Event Thresholding&amp;nbsp;help me accomplish this or should I do something like Rate-Based to disable the rule when the source IP belongs to the Symantec Proxy server?&lt;/P&gt;
&lt;P&gt;Thanks in advance for any help you can give me.&lt;/P&gt;
&lt;P&gt;Jon.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Nov 2015 01:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803789#M18311</guid>
      <dc:creator>JonPBerbee</dc:creator>
      <dc:date>2015-11-21T01:19:02Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803790#M18313</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The best way would be to create a TRUST rule for the source ip as Symantec Proxy server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;</description>
      <pubDate>Sat, 21 Nov 2015 13:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803790#M18313</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2015-11-21T13:31:19Z</dc:date>
    </item>
    <item>
      <title>Thank you Aastha, I had</title>
      <link>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803791#M18316</link>
      <description>&lt;P&gt;Thank you Aastha, I had considered that option as well but was hoping there was a way to turn the rule off for one specific IP. I'll probably go the trust route since it seems like the best way for this specific traffic.&amp;nbsp;Thanks again!&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2015 02:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803791#M18316</guid>
      <dc:creator>JonPBerbee</dc:creator>
      <dc:date>2015-11-23T02:22:33Z</dc:date>
    </item>
    <item>
      <title>Hi Jon,</title>
      <link>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803792#M18318</link>
      <description>&lt;P&gt;Hi Jon,&lt;/P&gt;
&lt;P&gt;I've done the following for systems that generate false positives for single rules, but I don't trust completely so still want the rest of the rules to apply.&lt;/P&gt;
&lt;P&gt;Firstly edit the rule to create a new Local rule that excludes the IP, in this example it'll be something like&amp;nbsp; "MALWARE-CNC Win.Trojan.Cidox variant outbound connection exclude proxy"&lt;/P&gt;
&lt;P&gt;the edit will look like the attached pic,assume the proxy IP is 10.10.10.10 in this example, so you exclude the source using !10.10.10.10. nothing else changes&lt;/P&gt;
&lt;P&gt;Save this as a new rule which will create a Local rule if you've not done any before this will have the SID&amp;nbsp; 1:1000001:1&lt;/P&gt;
&lt;P&gt;Edit your policy enabling the new local rule and disabling the original SID, add a comment to both rules for future reference&lt;/P&gt;
&lt;P&gt;Deploy&lt;/P&gt;
&lt;P&gt;All done, the new rule will fire on all IPs except this one, and all other rules will still apply to the proxy.&lt;/P&gt;
&lt;P&gt;You do need to be aware that SEU changes will not alter the local rule, so you'll need to periodically check in case the detection is updated.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 09:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803792#M18318</guid>
      <dc:creator>ed.sherratt</dc:creator>
      <dc:date>2015-12-18T09:48:52Z</dc:date>
    </item>
    <item>
      <title>We did similar things.</title>
      <link>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803793#M18320</link>
      <description>&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Arial','sans-serif';"&gt;We did similar things. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Arial','sans-serif';"&gt;First copy the rule.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Arial','sans-serif';"&gt;Use the ip you want the rule not to trigger on in the source or dest.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Arial','sans-serif';"&gt;Change the action to trust.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Arial','sans-serif';"&gt;Custom rules trigger first and act like a ACL. if you match a custom rule of trust you will never hit the SF rule that is below it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Arial','sans-serif';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Arial','sans-serif';"&gt;End result meaning the rule is white listed for the specific IP. The normal rule is still active and updated by SF for all other devices. you no longer need to check it unless you see something triggering again. At that time update the rule. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000" face="Times New Roman"&gt; &lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000" face="Times New Roman"&gt;Hope this helps&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000" face="Times New Roman"&gt;Shawn&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2016 14:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-off-rule-for-specific-ip-address/m-p/2803793#M18320</guid>
      <dc:creator>shawn_e_currin</dc:creator>
      <dc:date>2016-03-18T14:39:20Z</dc:date>
    </item>
  </channel>
</rss>

