<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, another option is once in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796920#M44252</link>
    <description>&lt;P&gt;Hi, another option is once you see the event (connection, intrusion, malware, etc.), you can right click the attacking IP address and select Blacklist. This will add the IP into the Global Blacklist object which is in every Access control policy by default. You will not need to re-apply the ACP as it updates this change automatically.&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;</description>
    <pubDate>Mon, 18 Jan 2016 12:59:39 GMT</pubDate>
    <dc:creator>pazzi</dc:creator>
    <dc:date>2016-01-18T12:59:39Z</dc:date>
    <item>
      <title>Blocking hosts using Firesight and firepower</title>
      <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796917#M44249</link>
      <description>&lt;P&gt;I was curious if there is a section in firesight where it could be programmed to block hosts like the CISCO IPS host blocks section? Kind of like the list of hosts blocked for triggering signatures. Trying to translate this into the new product.&lt;/P&gt;
&lt;P&gt;Also, event action filters. A possibility could be a trust rule in the access control policy correct?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796917#M44249</guid>
      <dc:creator>babiojd01</dc:creator>
      <dc:date>2019-03-10T13:32:41Z</dc:date>
    </item>
    <item>
      <title>Hi there</title>
      <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796918#M44250</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The Access control policy has a security intelligence tab which allows you to block connections to/from any IP address that you put in the Blacklist. You could also simply log instead of blocking by enabling logging and changing the drop to a monitor action.&lt;/P&gt;
&lt;P&gt;The security intelligence is configurable per access control policy.&lt;/P&gt;
&lt;P&gt;Under Object Management, in the SI section, you can also import .txt based file containing IP addresses or create a SI feed to a server where the .txt file is hosted.&lt;/P&gt;
&lt;P&gt;A Trust rule action implies that you will perform no inspection to traffic matching your rule conditions.&lt;/P&gt;
&lt;P&gt;Hope this helps&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2016 01:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796918#M44250</guid>
      <dc:creator>pazzi</dc:creator>
      <dc:date>2016-01-18T01:42:20Z</dc:date>
    </item>
    <item>
      <title>Thank you Paul, So basically</title>
      <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796919#M44251</link>
      <description>&lt;P&gt;Thank you Paul, So basically if a host is hammering away with sql injection it will block if and only if it matches the signature. Beings I have it setup that way. If a host starts attacking with sql injection with the cisco ips 7.0 it will place the source IP that were triggering rules into a blocked host list to block all traffic from the host. Its just not a feature in sf i suppose.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2016 05:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796919#M44251</guid>
      <dc:creator>babiojd01</dc:creator>
      <dc:date>2016-01-18T05:11:41Z</dc:date>
    </item>
    <item>
      <title>Hi, another option is once</title>
      <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796920#M44252</link>
      <description>&lt;P&gt;Hi, another option is once you see the event (connection, intrusion, malware, etc.), you can right click the attacking IP address and select Blacklist. This will add the IP into the Global Blacklist object which is in every Access control policy by default. You will not need to re-apply the ACP as it updates this change automatically.&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2016 12:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/2796920#M44252</guid>
      <dc:creator>pazzi</dc:creator>
      <dc:date>2016-01-18T12:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Hi, another option is once</title>
      <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/3768508#M44253</link>
      <description>&lt;P&gt;Ciao,&lt;/P&gt;
&lt;P&gt;all it's right but is there possibility to do it in automatically way so if a signature is matched the source o destination are blocked (or blocked for the next X seconds..).&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 24 Dec 2018 08:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/3768508#M44253</guid>
      <dc:creator>ipagliani</dc:creator>
      <dc:date>2018-12-24T08:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: Hi, another option is once</title>
      <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/3768577#M44254</link>
      <description>Ciao&lt;BR /&gt;&lt;BR /&gt;Yes, you can configure the intrusion rules with a 'Dynamic State'.&lt;BR /&gt;&lt;BR /&gt;Within the Intrusion policy, select the desired rule and click Dynamic&lt;BR /&gt;State &amp;gt; Add Rate-based Rule State. The timeout value (based on seconds) can&lt;BR /&gt;be specified - this is the duration of the action you wish to set.&lt;BR /&gt;&lt;BR /&gt;If you wish to set this as a flat rule so it kicks in straight away, set&lt;BR /&gt;the rate as 1 count/1 second and set to track by rule.&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;Kind regards&lt;BR /&gt;Phil&lt;BR /&gt;</description>
      <pubDate>Mon, 24 Dec 2018 14:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/3768577#M44254</guid>
      <dc:creator>phil.hydea</dc:creator>
      <dc:date>2018-12-24T14:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: Hi, another option is once</title>
      <link>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/3768656#M44255</link>
      <description>&lt;P&gt;Ciao,&lt;/P&gt;
&lt;P&gt;It's not exactly what I meat. Like a previous shun module I'd like to block an attacker for a specific amount of time after the a signature had trigged and not just change a signature action after matching.&lt;/P&gt;
&lt;P&gt;The case could be a brute force attack attempt, where in case of signature match I'd like to block every connection coming from the attacker's IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Dec 2018 20:09:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-hosts-using-firesight-and-firepower/m-p/3768656#M44255</guid>
      <dc:creator>ipagliani</dc:creator>
      <dc:date>2018-12-24T20:09:32Z</dc:date>
    </item>
  </channel>
</rss>

