<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ah ok - yes the excluded zone in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033154#M42991</link>
    <description>&lt;P&gt;Ah ok - yes the excluded zone was what I was referring to.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're welcome.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Apr 2017 06:31:22 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-04-17T06:31:22Z</dc:date>
    <item>
      <title>FirePOWER Rules/Geofiltering</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033151#M42978</link>
      <description>&lt;P&gt;Hello all, i just had a few questions about Geofiltering on an ASA 5512-X with FirePOWER services managed through ASDM. I believe that I have the &amp;nbsp;rules setup correctly as everything is functioning as it should. I have the rules setup so that any packet with a source or destination address that is not from the US will be blocked. Obviously there are a few cases where I will need to exempt IPs outside of the US. What is the best way to accomplish this? Currently I have added two rules, one for inbound and one for outbound, that are linked to a network objecting containing the addresses I want to whitelist. The point of this rule is to catch the traffic before it hits the block rule and specifically allow it. I also enabled the IPS filtering and file policy on this rule. If my understanding is correct the traffic I exempt should be matching this rule (which it is) and then be filtered through IPS and file policy and then not be processed by any further rules. I will post a screenshot of my rules below. Everything is functional I just want to make sure that there is not a better perhaps more elegant way to accomplish the same thing. I also don't want to have anything processing multiple times and causing unnecessary hardware utilization.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/capture_277.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rules 1 and 2 are the geofilter bypass rules (the names are cut off) and also IPS and file policy filtering for matching traffic, 3 and 4 are the inbound or outbound match rules and 5 is the IPS and file policy filtering for any traffic that makes it that far. I matched rule number 5 to the inside and outside zone to avoid filtering on an specific interface that I cannot have filtered. Is it okay that I have the source and destination zones as the same zone for both?&lt;/P&gt;
&lt;P&gt;Any feedback would be greatly appreciated! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033151#M42978</guid>
      <dc:creator>brandonbittinger</dc:creator>
      <dc:date>2019-03-10T13:48:51Z</dc:date>
    </item>
    <item>
      <title>That looks pretty much like</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033152#M42980</link>
      <description>&lt;P&gt;That looks pretty much like how I would do it and how it's taught by Cisco.&lt;/P&gt;
&lt;P&gt;I would only leave out the zones as I don't think they add any granularity that's not already implicit in the rest of the rules. (Unless you have other zones that aren't mentioned in your posting.)&lt;/P&gt;</description>
      <pubDate>Sun, 16 Apr 2017 21:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033152#M42980</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-16T21:37:24Z</dc:date>
    </item>
    <item>
      <title>There is one other zone</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033153#M42982</link>
      <description>&lt;P&gt;There is one other zone containing one interface that I need to exclude from the filtering. It connects to a partner network and FirePOWER causes some issues. Is that what you were referring too?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Other than that thank you for the feedback!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Apr 2017 21:37:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033153#M42982</guid>
      <dc:creator>brandonbittinger</dc:creator>
      <dc:date>2017-04-16T21:37:25Z</dc:date>
    </item>
    <item>
      <title>Ah ok - yes the excluded zone</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033154#M42991</link>
      <description>&lt;P&gt;Ah ok - yes the excluded zone was what I was referring to.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're welcome.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2017 06:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rules-geofiltering/m-p/3033154#M42991</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-17T06:31:22Z</dc:date>
    </item>
  </channel>
</rss>

