<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firesight IPS sensor Rule Update causing Packets to Drop in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firesight-ips-sensor-rule-update-causing-packets-to-drop/m-p/2895358#M44165</link>
    <description>&lt;P&gt;While the Firesight IPS sensor loads a rule update....snort restarts in order to load new configuration.&lt;/P&gt;
&lt;P&gt;However, when this happens, the IPS sensor drops multiple packets (about 20).&lt;/P&gt;
&lt;P&gt;Anyone know a way around this?&lt;/P&gt;
&lt;P&gt;The IPS is set to "fail-open" from the firewall's perspective.&lt;/P&gt;
&lt;P&gt;Any thoughts would be appreciated!&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:33:57 GMT</pubDate>
    <dc:creator>Ralphy006</dc:creator>
    <dc:date>2019-03-10T13:33:57Z</dc:date>
    <item>
      <title>Firesight IPS sensor Rule Update causing Packets to Drop</title>
      <link>https://community.cisco.com/t5/network-security/firesight-ips-sensor-rule-update-causing-packets-to-drop/m-p/2895358#M44165</link>
      <description>&lt;P&gt;While the Firesight IPS sensor loads a rule update....snort restarts in order to load new configuration.&lt;/P&gt;
&lt;P&gt;However, when this happens, the IPS sensor drops multiple packets (about 20).&lt;/P&gt;
&lt;P&gt;Anyone know a way around this?&lt;/P&gt;
&lt;P&gt;The IPS is set to "fail-open" from the firewall's perspective.&lt;/P&gt;
&lt;P&gt;Any thoughts would be appreciated!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-ips-sensor-rule-update-causing-packets-to-drop/m-p/2895358#M44165</guid>
      <dc:creator>Ralphy006</dc:creator>
      <dc:date>2019-03-10T13:33:57Z</dc:date>
    </item>
    <item>
      <title>Is "Inspect traffic during</title>
      <link>https://community.cisco.com/t5/network-security/firesight-ips-sensor-rule-update-causing-packets-to-drop/m-p/2895359#M44166</link>
      <description>&lt;P&gt;Is "Inspect traffic during policy apply" turned on, under Advanced in your Access Control policy?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 12:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-ips-sensor-rule-update-causing-packets-to-drop/m-p/2895359#M44166</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-03-09T12:24:00Z</dc:date>
    </item>
    <item>
      <title>Yes.</title>
      <link>https://community.cisco.com/t5/network-security/firesight-ips-sensor-rule-update-causing-packets-to-drop/m-p/2895360#M44167</link>
      <description>&lt;P&gt;Yes. When the box is checked, there is less packet loss during rule updates. However, we still see packet loss every few days&lt;/P&gt;
&lt;P&gt;Here is an answer from TAC:&lt;/P&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;When the &lt;SPAN class="il"&gt;inspect&lt;/SPAN&gt; traffic during policy apply is set to no, and when there is a policy apply happening on the SFR modules, all traffic will be dropped&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;Let me explain the behavior of this feature&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;When you have the “&lt;SPAN class="il"&gt;Inspect&lt;/SPAN&gt; traffic during policy apply” option enabled what happens is snort will &lt;SPAN class="il"&gt;inspect&lt;/SPAN&gt; all traffic with the old configuration while it is validating and loading the new configuration. Once the new configuration is finished validating and initializing snort will swap the configuration and start &lt;SPAN class="il"&gt;inspecting&lt;/SPAN&gt; the current traffic with the new configuration&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;If you disable this option, every AC policy apply will cause all traffic going to the SFR to be dropped. To prevent the traffic from being dropped during every AC policy apply, leave this option enabled. Even with this option enabled, there are still certain configuration changes in the policy that can cause snort to restart. If you are concerned about this, you should check the online help for the relevant changes that you are making. If the changes being made cause snort to restart there will be a mention in the guide&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;To avoid traffic interruptions, please schedule policy applies during a maintenance window&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;&lt;FONT face="Calibri"&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;
&lt;DIV style="padding-left: 30px;"&gt;&lt;EM&gt;here are some situations that will require a snort restart as opposed to a snort reload. Though this is not externally documented, these include:&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV style="padding-left: 30px;"&gt;
&lt;UL style="padding-left: 30px;"&gt;
&lt;LI&gt;&lt;EM&gt;When you apply an access control policy that pushes a new version of Snort to a managed device following a Defense Center upgrade.&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;When you apply a policy for the first time after a rule import that includes shared object rules.&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;In some cases, when you install a VDB update.&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 09 Mar 2016 15:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-ips-sensor-rule-update-causing-packets-to-drop/m-p/2895360#M44167</guid>
      <dc:creator>Ralphy006</dc:creator>
      <dc:date>2016-03-09T15:45:58Z</dc:date>
    </item>
  </channel>
</rss>

