<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower is not dropping packets. How to enable rules to generate events in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718185#M31937</link>
    <description>&lt;P&gt;Is that IPS rule in your deployed Intrusion policy?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If so, does the policy (or rule with that policy associated that's otherwise allowing the traffic) have "log at beginning of connection" selected?&lt;/P&gt;</description>
    <pubDate>Wed, 03 Oct 2018 11:25:20 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2018-10-03T11:25:20Z</dc:date>
    <item>
      <title>Firepower is not dropping packets. How to enable rules to generate events</title>
      <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718137#M31934</link>
      <description>&lt;P&gt;Hello community&lt;/P&gt;
&lt;P&gt;I am trying to generate some events in order to monitor my environment, but I am facing some issues.&lt;/P&gt;
&lt;P&gt;I want to drop connections which use "public" or "private" community on snmp gets, but I am being not successfull.&lt;/P&gt;
&lt;P&gt;I would appreciate some help.&lt;/P&gt;
&lt;P&gt;I am trying to establish a connection to a switch/router using "public" community. I get no answer because that community is not configured, but I'd like to drop that try using firepower resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I attach my config.&lt;/P&gt;
&lt;P&gt;It seems that the connection crosses the FW:&lt;/P&gt;
&lt;P&gt;Oct 03 2018 08:53:07: %ASA-6-302015: Built inbound UDP connection 181208 for OUTSIDE:10.3.51.97/54829 (10.3.51.97/54829) to INSIDE:10.1.51.1/161 (10.1.51.1/161)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And is being inspected:&lt;/P&gt;
&lt;P&gt;ASA-CDS-1# sho conn | in 10.1.51.1&lt;BR /&gt;UDP OUTSIDE 10.3.51.97:54829 INSIDE 10.1.51.1:161, idle 0:01:19, bytes 44, flags X &lt;BR /&gt;UDP OUTSIDE 10.3.51.97:54828 INSIDE 10.1.51.1:161, idle 0:01:37, bytes 44, flags X&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using community "public" to make the request:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="snmp flow.JPG" style="width: 963px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19591i8F40A25D995F8D50/image-size/large?v=v2&amp;amp;px=999" role="button" title="snmp flow.JPG" alt="snmp flow.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I enabled the rule to generate the event:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower snmp rules.JPG" style="width: 915px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19592iF43AD59F2BF25AB1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower snmp rules.JPG" alt="Firepower snmp rules.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I commited the config and deployed to the devices.&lt;/P&gt;
&lt;P&gt;My problem is that it seems that this is not generating intrussion events.&lt;/P&gt;
&lt;P&gt;Enabling another rules (icmp echo reply) I can see those events.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Should I apply anything else?&lt;/P&gt;
&lt;P&gt;Is this rule made for this goal?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718137#M31934</guid>
      <dc:creator>p.juarezponte</dc:creator>
      <dc:date>2020-02-21T16:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower is not dropping packets. How to enable rules to generate events</title>
      <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718185#M31937</link>
      <description>&lt;P&gt;Is that IPS rule in your deployed Intrusion policy?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If so, does the policy (or rule with that policy associated that's otherwise allowing the traffic) have "log at beginning of connection" selected?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718185#M31937</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T11:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower is not dropping packets. How to enable rules to generate events</title>
      <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718407#M31940</link>
      <description>&lt;P&gt;Hello Marvin&lt;/P&gt;
&lt;P&gt;Thank you for your help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have applied as "default Action" and inside access rule too.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower rules general.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19643iDCA75B8FB67F99D6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower rules general.JPG" alt="Firepower rules general.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is the config:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower rule snmp inspection.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19646iE0C3BD589B7F1786/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower rule snmp inspection.JPG" alt="Firepower rule snmp inspection.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower rule snmp logging.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19647i40D8500E2824C561/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower rule snmp logging.JPG" alt="Firepower rule snmp logging.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I enabled snmp traps too, and I can see those events.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower intrusion events.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19648iD634C40288305345/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower intrusion events.JPG" alt="Firepower intrusion events.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 15:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718407#M31940</guid>
      <dc:creator>p.juarezponte</dc:creator>
      <dc:date>2018-10-03T15:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower is not dropping packets. How to enable rules to generate events</title>
      <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718415#M31943</link>
      <description>&lt;P&gt;Try "Log at Beginning of Connection".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A udp flow will never have a FIN packet and thus won't&amp;nbsp;signal the connection is ended.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, when you change the rule to block you must log at beginning to generate events since there won't be a FIN no matter what protocol is being used.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 15:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3718415#M31943</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T15:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower is not dropping packets. How to enable rules to generate events</title>
      <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3719391#M31944</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;I tried to detect those events enabling "Log at beggining..." but it does not detect them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower intrusion events snmp.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19711i0191AB4EE13E1749/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower intrusion events snmp.JPG" alt="Firepower intrusion events snmp.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It shows snmp request or traps, but I am not able to drop a request which uses community "public".&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 15:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3719391#M31944</guid>
      <dc:creator>p.juarezponte</dc:creator>
      <dc:date>2018-10-04T15:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower is not dropping packets. How to enable rules to generate events</title>
      <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3723724#M31945</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;I could fix this, I will share my config in order to help someone.&lt;/P&gt;
&lt;P&gt;It's important to apply the Intrusion Policy on the access rule, because if traffic matches, it does not apply the default IPS policy.&lt;/P&gt;
&lt;P&gt;Oh, and I had to reload the device too!!!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="snmp ACL inspection.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/20151i654F808508857675/image-size/large?v=v2&amp;amp;px=999" role="button" title="snmp ACL inspection.JPG" alt="snmp ACL inspection.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="snmp ACL logging.JPG" style="width: 859px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/20152i1497CC4191369DA2/image-size/large?v=v2&amp;amp;px=999" role="button" title="snmp ACL logging.JPG" alt="snmp ACL logging.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And rememember to enable the rule, (maybe) it is not enabled by default.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower snmp ips rules.JPG" style="width: 758px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/20153iB5633B3D9A9D9002/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower snmp ips rules.JPG" alt="Firepower snmp ips rules.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here they are:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firepower intrusion events received.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/20154iC5E0A7A37921A472/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firepower intrusion events received.JPG" alt="Firepower intrusion events received.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 15:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3723724#M31945</guid>
      <dc:creator>p.juarezponte</dc:creator>
      <dc:date>2018-10-11T15:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower is not dropping packets. How to enable rules to generate events</title>
      <link>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3723802#M31946</link>
      <description>&lt;P&gt;Thanks for sharing your solution! It helps the community as a whole.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 16:46:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-is-not-dropping-packets-how-to-enable-rules-to/m-p/3723802#M31946</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-11T16:46:24Z</dc:date>
    </item>
  </channel>
</rss>

