<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access Control Policy - traffic rule matching in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892456#M44128</link>
    <description>&lt;P&gt;Hello, I am a little bit confused with traffic matching some rule when all conditions are NOT met in that rule on defense center v5.4.1.5.&lt;/P&gt;
&lt;P&gt;So, I have a case on DefenseCenter (AccessPolicy) where all conditions were NOT met but rule is applied to traffic.&lt;BR /&gt;I have one example where condition is to &lt;STRONG&gt;allow&lt;/STRONG&gt; &lt;STRONG&gt;only&lt;/STRONG&gt; Applications with Very Low, Low and Medium risk for certan AD users. But when I try to open some torrent site which is classified as Very High risk application, and it is recognized as "Very High" risk app, rule is applied to this traffic, and I am able to open this torrent site with no problems.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;As I understand, all conditions have to be met to apply rule to some traffic. In this example, application Risk is &lt;STRONG&gt;NOT&lt;/STRONG&gt; met, but rule is applied to traffic.&lt;/P&gt;
&lt;P&gt;When I create rule with same conditions (security zones, AD users, ports), but with opposite application risk condition "High and Very High risk applications" "and opposite action "Block with reset", and I insert this rule above &lt;STRONG&gt;allow&lt;/STRONG&gt; rule, then torrent site is recognized as "Very high&amp;nbsp; risk" and it is blocked.&lt;/P&gt;
&lt;P&gt;Now I am insecure with rule creation, and each and every rule I have to test twice.&lt;/P&gt;
&lt;P&gt;Any idea?&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:34:29 GMT</pubDate>
    <dc:creator>Nele Valjak</dc:creator>
    <dc:date>2019-03-10T13:34:29Z</dc:date>
    <item>
      <title>Access Control Policy - traffic rule matching</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892456#M44128</link>
      <description>&lt;P&gt;Hello, I am a little bit confused with traffic matching some rule when all conditions are NOT met in that rule on defense center v5.4.1.5.&lt;/P&gt;
&lt;P&gt;So, I have a case on DefenseCenter (AccessPolicy) where all conditions were NOT met but rule is applied to traffic.&lt;BR /&gt;I have one example where condition is to &lt;STRONG&gt;allow&lt;/STRONG&gt; &lt;STRONG&gt;only&lt;/STRONG&gt; Applications with Very Low, Low and Medium risk for certan AD users. But when I try to open some torrent site which is classified as Very High risk application, and it is recognized as "Very High" risk app, rule is applied to this traffic, and I am able to open this torrent site with no problems.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;As I understand, all conditions have to be met to apply rule to some traffic. In this example, application Risk is &lt;STRONG&gt;NOT&lt;/STRONG&gt; met, but rule is applied to traffic.&lt;/P&gt;
&lt;P&gt;When I create rule with same conditions (security zones, AD users, ports), but with opposite application risk condition "High and Very High risk applications" "and opposite action "Block with reset", and I insert this rule above &lt;STRONG&gt;allow&lt;/STRONG&gt; rule, then torrent site is recognized as "Very high&amp;nbsp; risk" and it is blocked.&lt;/P&gt;
&lt;P&gt;Now I am insecure with rule creation, and each and every rule I have to test twice.&lt;/P&gt;
&lt;P&gt;Any idea?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892456#M44128</guid>
      <dc:creator>Nele Valjak</dc:creator>
      <dc:date>2019-03-10T13:34:29Z</dc:date>
    </item>
    <item>
      <title>Are you certain that you do</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892457#M44129</link>
      <description>&lt;P&gt;Are you certain that you do not use the default rule, eg. Intrusion Prevention, because it does not meet the conditions in your allow rule?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 12:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892457#M44129</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-03-09T12:21:51Z</dc:date>
    </item>
    <item>
      <title>Yes, I am using default</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892458#M44131</link>
      <description>&lt;P&gt;Yes, I am using default intrusion policy (with a little change), but still, as you can see in pictures, I have a policy "Internet pristup" and rule "SITT-pristup" which allows ONLY very low, low and medium risk applications (accessrule.png). After I apply access policy, in connection events I can see that High risk applications are matched with this rule (connectionevents.png)&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 12:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892458#M44131</guid>
      <dc:creator>Nele Valjak</dc:creator>
      <dc:date>2016-03-09T12:44:18Z</dc:date>
    </item>
    <item>
      <title>That it strange. Can you</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892459#M44132</link>
      <description>&lt;P&gt;That&amp;nbsp;it strange. Can you please make a "report" of your Access Control policy, and copy all the text from the rule "&lt;SPAN&gt;SITT-pristup" and paste it here.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 13:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892459#M44132</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-03-09T13:20:30Z</dc:date>
    </item>
    <item>
      <title>I just saw another post where</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892460#M44133</link>
      <description>&lt;P&gt;I just saw another post where the solution to a similar problem (URL filtering) was to check the DNS settings on the sensors.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;"Log in to the appliance's CLI as admin&lt;/P&gt;
&lt;P&gt;on the '&amp;gt;' prompt, type 'configure network dns servers &amp;lt;ip addresses of DNS servers separated by commas&amp;gt;&lt;/P&gt;
&lt;P&gt;Once this is done, type in expert, and type 'sudo /etc/rc.d/init.d/nscd restart'&lt;/P&gt;
&lt;P&gt;Put in the admin password when prompted"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 20:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892460#M44133</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-03-09T20:08:22Z</dc:date>
    </item>
    <item>
      <title>Hi, DNS is OK (checked with</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892461#M44135</link>
      <description>&lt;P&gt;Hi, DNS is OK (checked with cat /etc/resolv.conf and with pinging internal and external names)&lt;/P&gt;
&lt;P&gt;In attachment you can find rule...&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 11:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892461#M44135</guid>
      <dc:creator>Nele Valjak</dc:creator>
      <dc:date>2016-03-14T11:33:34Z</dc:date>
    </item>
    <item>
      <title>Do the traffic eventually get</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892462#M44136</link>
      <description>&lt;P&gt;Do the traffic eventually get blocked while surfing the kastatic.com website?&lt;BR /&gt;&lt;BR /&gt;You might be affected by this, in the documentation:&lt;/P&gt;
&lt;DIV class="page" title="Page 373"&gt;
&lt;DIV class="section"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 18pt;"&gt;Speed of Application Identification &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt;The system cannot perform application control before: &lt;/SPAN&gt;&lt;/P&gt;
&lt;UL style="padding-left: 30px;"&gt;
&lt;LI&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt;a monitored connection is established between a client and server, and &lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt;the system identifies the application in the session &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt;This identification should occur within 3 to 5 packets, or after the server certificate exchange in the SSL handshake if the traffic is encrypted. &lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;If one of these first packets matches all other conditions in an access control rule containing an application condition but the identification is not complete, the access control policy allows the packet to pass.&lt;/SPAN&gt;&lt;/STRONG&gt; This behavior allows the connection to be established so that applications can be identified. For your convenience, affected rules are marked with an information icon ( ). &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt;The allowed packets are inspected by the access control policy’s &lt;/SPAN&gt;&lt;SPAN&gt;default &lt;/SPAN&gt;&lt;SPAN&gt;intrusion policy (not the &lt;/SPAN&gt;&lt;SPAN&gt;default action &lt;/SPAN&gt;&lt;SPAN&gt;intrusion policy nor the almost-matched rule’s intrusion policy). For more information, see &lt;/SPAN&gt;&lt;SPAN&gt;Setting the Default Intrusion Policy for Access Control, page 25-1&lt;/SPAN&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt;After the system completes its identification, the system applies the access control rule action, as well as any associated intrusion and file policy, to the remaining session traffic that matches its application condition. &lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 14 Mar 2016 11:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892462#M44136</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-03-14T11:55:20Z</dc:date>
    </item>
    <item>
      <title>Tested but no. (Browsed</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892463#M44137</link>
      <description>&lt;P&gt;Tested but no. (Browsed through site)&lt;/P&gt;
&lt;P&gt;Tried on some other "very high risk" sites with or without encryption but it is same.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 12:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892463#M44137</guid>
      <dc:creator>Nele Valjak</dc:creator>
      <dc:date>2016-03-14T12:44:27Z</dc:date>
    </item>
    <item>
      <title>For me it seems like a TAC</title>
      <link>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892464#M44138</link>
      <description>&lt;P&gt;For me it seems like a TAC case is the only way out of this uncertainty.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The manual states that; "If you can write one rule that covers it all then you should not write two rules for it"&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 07:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-policy-traffic-rule-matching/m-p/2892464#M44138</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-03-15T07:15:57Z</dc:date>
    </item>
  </channel>
</rss>

