<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic the problem is the rule being in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915185#M43833</link>
    <description>&lt;P&gt;the problem is the rule being referenced is actually disabled in the intrusion policy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;it is not set to drop.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thats why is surprising that i am seeing an intrusion block&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2016 12:00:54 GMT</pubDate>
    <dc:creator>Tejas Kunte</dc:creator>
    <dc:date>2016-06-29T12:00:54Z</dc:date>
    <item>
      <title>firesight intrusion block</title>
      <link>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915180#M43828</link>
      <description>&lt;P&gt;i am seeing a strange issue with my firesight URL filtering setup&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;am seeing an intrusion block for website that is matching an allow rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;also the intrusion policy rule that is being matched is disabled.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;how is that possible ?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915180#M43828</guid>
      <dc:creator>Tejas Kunte</dc:creator>
      <dc:date>2019-03-10T13:38:08Z</dc:date>
    </item>
    <item>
      <title>Tejas,Could you add more</title>
      <link>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915181#M43829</link>
      <description>&lt;P&gt;Tejas,&lt;BR /&gt;&lt;BR /&gt;Could you add more information about the problem? Please add some screenshots from the connection events, and screenshot of your Access control Policy in order to understand the issue and the way the traffic is being analyzed by the Firewall Engine.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 16:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915181#M43829</guid>
      <dc:creator>Andres Vega</dc:creator>
      <dc:date>2016-06-27T16:51:56Z</dc:date>
    </item>
    <item>
      <title>as you can see from the</title>
      <link>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915182#M43830</link>
      <description>&lt;P&gt;as you can see from the screenshot the access policy being matched in my URL whitelist which allows all traffic, yet traffic is being blocked&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 17:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915182#M43830</guid>
      <dc:creator>Tejas Kunte</dc:creator>
      <dc:date>2016-06-27T17:01:03Z</dc:date>
    </item>
    <item>
      <title>Tejas,The problem is not the</title>
      <link>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915183#M43831</link>
      <description>&lt;P&gt;Tejas,&lt;BR /&gt;&lt;BR /&gt;The problem is not the object you created to allow the URL. Basically, your last line of defense (Intrusion Policy) has detected some anomalous content in that specific connection and now you have to confirm if it is a false positive or not.&lt;BR /&gt;&lt;BR /&gt;In order to identify the rule this connection hits, go to the intrusion events and filter it by initiator IP and then download the capture for that event.&lt;BR /&gt;&lt;BR /&gt;To confirm if it is a FP or FN, please open a case with TAC by referencing the GID you are matching, and submitting the capture retrieved previously.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 19:23:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915183#M43831</guid>
      <dc:creator>Andres Vega</dc:creator>
      <dc:date>2016-06-27T19:23:27Z</dc:date>
    </item>
    <item>
      <title>Hello Tejas,</title>
      <link>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915184#M43832</link>
      <description>&lt;P&gt;Hello Tejas,&lt;/P&gt;
&lt;P&gt;Have you verified if this blocked Intrusion rule is called in the Advanced option of Access control policy rule ?&lt;/P&gt;
&lt;P&gt;Policies &amp;gt; Access Control &amp;gt; Click on Edit button &amp;gt; Advanced&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Verify if the Intrusion policy is not called here.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 05:21:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915184#M43832</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-06-29T05:21:57Z</dc:date>
    </item>
    <item>
      <title>the problem is the rule being</title>
      <link>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915185#M43833</link>
      <description>&lt;P&gt;the problem is the rule being referenced is actually disabled in the intrusion policy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;it is not set to drop.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thats why is surprising that i am seeing an intrusion block&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 12:00:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-intrusion-block/m-p/2915185#M43833</guid>
      <dc:creator>Tejas Kunte</dc:creator>
      <dc:date>2016-06-29T12:00:54Z</dc:date>
    </item>
  </channel>
</rss>

