<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: errors in Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3360893#M924145</link>
    <description>&lt;P&gt;Hi Adam,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the first question:&lt;/P&gt;
&lt;P&gt;It could be that bug. Do you have the same conditions in that setup like the firmware version and FTD HA?&lt;/P&gt;
&lt;P&gt;It could be some other issue as well. I would suggest to open TAC case for that so right issue can be isolated and fixed.&lt;/P&gt;
&lt;P&gt;For the second question: Although the screenshot does not show what is the warning(you can hover mouse over the warning and it will show the message) but it could just be that some of the&amp;nbsp; files which are dynamic analysis capable and local analysis capable are also executable&amp;nbsp; and multimedia which are already blocked. So dynamic/local analysis for those files will not be done because they are blocked anyways. If that's the error, it can safely be ignored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the third question.&lt;/P&gt;
&lt;P&gt;its not a good practice to let FMC traffic pass through FTD/FPR but if you are doing that,&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;FONT size="4"&gt;panacea.threatgrid.com is explicitly allowed on firepower for port 443 and &lt;/FONT&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;cloud-sa.amp.sourcefire.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;for netowork AMP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Hope it helps,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Yogesh&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 id="toc-hId-131765818" style="margin: 0px; padding: 0px; font-size: 14px; font-weight: bold; line-height: 17px; font-family: Arial; color: #333333; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;FONT color="#333300"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Apr 2018 04:49:45 GMT</pubDate>
    <dc:creator>yogdhanu</dc:creator>
    <dc:date>2018-04-05T04:49:45Z</dc:date>
    <item>
      <title>errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3360680#M924144</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have three questions, Please answer&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please find the attached error.&lt;/P&gt;
&lt;P&gt;whenever i navigate to edit the ACP , i get a pop-up as per the attached , also when i save after doing any changes&amp;nbsp; i get an a attached pop-up error, hence it is a bug but i am on the latest still it is hitting me, ???why that so ?? the bug id is &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd40583/?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd40583/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also&amp;nbsp;I have a file policy as per the attached it is showing warning, i wanted to confirm this warning means the file policy is not configured properly&amp;nbsp;or it is just an information, also i have selected any for the type of file and checking for malware for all types of file except executable and multimedia which i m blocking explicitly is it a good practice of design.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i was having a default action to pass i have changed it dropped all traffic, now my fmc pops up with the&amp;nbsp; error: unable to communicate dynamic analysis cloud, i have allowed all protocols from firepower sensor IP address.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3360680#M924144</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2020-02-21T15:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3360893#M924145</link>
      <description>&lt;P&gt;Hi Adam,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the first question:&lt;/P&gt;
&lt;P&gt;It could be that bug. Do you have the same conditions in that setup like the firmware version and FTD HA?&lt;/P&gt;
&lt;P&gt;It could be some other issue as well. I would suggest to open TAC case for that so right issue can be isolated and fixed.&lt;/P&gt;
&lt;P&gt;For the second question: Although the screenshot does not show what is the warning(you can hover mouse over the warning and it will show the message) but it could just be that some of the&amp;nbsp; files which are dynamic analysis capable and local analysis capable are also executable&amp;nbsp; and multimedia which are already blocked. So dynamic/local analysis for those files will not be done because they are blocked anyways. If that's the error, it can safely be ignored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the third question.&lt;/P&gt;
&lt;P&gt;its not a good practice to let FMC traffic pass through FTD/FPR but if you are doing that,&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;FONT size="4"&gt;panacea.threatgrid.com is explicitly allowed on firepower for port 443 and &lt;/FONT&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;cloud-sa.amp.sourcefire.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;for netowork AMP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Hope it helps,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: 'Helvetica Neue'; font-size: 9.0pt; color: #454545;"&gt;&lt;SPAN style="color: #000000; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Yogesh&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 id="toc-hId-131765818" style="margin: 0px; padding: 0px; font-size: 14px; font-weight: bold; line-height: 17px; font-family: Arial; color: #333333; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;FONT color="#333300"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 04:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3360893#M924145</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2018-04-05T04:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3360965#M924146</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It could be that bug. Do you have the same conditions in that setup like the firmware version and FTD HA?&lt;/P&gt;
&lt;P&gt;NO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It could be some other issue as well. I would suggest to open TAC case for that so right issue can be isolated and fixed&lt;/P&gt;
&lt;P&gt;Any hint you can give me so that i can check for it, it can be becz of&amp;nbsp; policies for which i have a deny statement&amp;nbsp; up and permit statement&amp;nbsp; down then again i have a deny statement for the some application traffic ,&amp;nbsp;&amp;nbsp; It can be for that ????&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but it could just be that some of the&amp;nbsp; files which are dynamic analysis capable and local analysis capable are also executable&amp;nbsp; and multimedia which are already blocked. So dynamic/local analysis for those files will not be done because they are blocked anyways. If that's the error, it can safely be ignored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes exactly it&amp;nbsp;is the error.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Third Question&lt;/P&gt;
&lt;P style="margin: 0in; color: rgb(69, 69, 69); line-height: 18pt; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 9pt;"&gt;&lt;FONT size="4"&gt;panacea.threatgrid.com is explicitly allowed on firepower for port 443 and &lt;/FONT&gt;&lt;SPAN style="color: rgb(0, 0, 0); text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; background-color: rgb(255, 255, 255); font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;cloud-sa.amp.sourcefire.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; color: rgb(69, 69, 69); line-height: 18pt; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 9pt;"&gt;&lt;SPAN style="color: rgb(0, 0, 0); text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; background-color: rgb(255, 255, 255); font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;for netowork AMP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; color: rgb(69, 69, 69); line-height: 18pt; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 9pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; color: rgb(69, 69, 69); line-height: 18pt; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 9pt;"&gt;&lt;SPAN style="color: rgb(0, 0, 0); text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; background-color: rgb(255, 255, 255); font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;from FMC&amp;nbsp; &amp;amp; firepower, IP address i have allowed , 80,443, 53 are there any other ports that has to be allowed apart from these.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; color: rgb(69, 69, 69); line-height: 18pt; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 9pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; color: rgb(69, 69, 69); line-height: 18pt; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 9pt;"&gt;&lt;SPAN style="color: rgb(0, 0, 0); text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; background-color: rgb(255, 255, 255); font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 07:06:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3360965#M924146</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-05T07:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3361108#M924147</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are no other ports to be allowed. Are you doing SSL decryption on Firepower? If yes, bypass FMC IP from that. Or create a trust rule for FMC IP.&lt;/P&gt;
&lt;P&gt;The policy error cannot be because of the rule actions. They may or may not match and give warning about that but no error.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can run pigtail on FMC CLI in root mode and then reproduce the error. Stop the pigtail (it would be huge output so you may want to log the putty output) and then check for that error and any related info (just before the error comes) which might help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps,&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 11:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3361108#M924147</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2018-04-05T11:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3361647#M924148</link>
      <description>&lt;P&gt;Dear Yogdhanu&lt;/P&gt;
&lt;P&gt;Are you doing SSL decryption on Firepower&lt;/P&gt;
&lt;P&gt;not for the FMC subnet as it is management Vlan,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create a trust rule for FMC IP&lt;/P&gt;
&lt;P&gt;I will create and test, currently not in the office&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can run pigtail on FMC CLI in root mode and then reproduce the error. Stop the pigtail (it would be huge output so you may want to log the putty output) and then check for that error and any related info (just before the error comes) which might help.&lt;/P&gt;
&lt;P&gt;Also I will try applying the above and will collect logs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the reply&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2018 05:11:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3361647#M924148</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-06T05:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3370208#M924149</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please find the warning snapshot,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my first rule is blocking all executables and multimedia and on the second rule &amp;nbsp;malware lookups for types of file , Please confirm whether it is a best practice for configuring file policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The trust rule worked fine without any errors&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if&amp;nbsp;start the&amp;nbsp;pigtail how&amp;nbsp;I can stop it. ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 21 Apr 2018 00:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3370208#M924149</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-21T00:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3370803#M924150</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The rules is fine. As the warning just explains that because first rule is to block file itself, system will not do lookup for those files which it has to block anyways on extension.&lt;/P&gt;
&lt;P&gt;You can use control+ c to stop the output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rate if helps,&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 04:43:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3370803#M924150</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2018-04-23T04:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3372202#M924151</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Attached are the pigtails, i don't know how we can read them is it any cisco document or it is only for the TAC use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the file policy which i have configured is it a best practice as per the cisco ,???&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i m facing a issue with the download file ,,i try to download a exe file for a user who is allowed to download the exe, the file starts downloading but at the end when it is 4 % 3% or 2% left to finish it fails with network error , but the logs says it is allowed&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Apr 2018 19:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3372202#M924151</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-25T19:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3375590#M924152</link>
      <description>&lt;P&gt;Dear Yogdhanu,&lt;/P&gt;
&lt;P&gt;Can u investigate the logs attached and share your experience&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 19:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3375590#M924152</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-30T19:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3387261#M924153</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;Anybody can help me for the above query.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 22 May 2018 19:43:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3387261#M924153</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-22T19:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3912784#M924154</link>
      <description>&lt;P&gt;I Have the same issue in my firepower and I don't know why, URL also not working. Please guide us&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 05:07:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3912784#M924154</guid>
      <dc:creator>qasim.saeed1</dc:creator>
      <dc:date>2019-08-23T05:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3912787#M924155</link>
      <description>&lt;P&gt;Error is Successfully connected with the cloud&lt;/P&gt;&lt;P&gt;FMC: Unable to communicate with dynamic analysis cloud.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 05:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/3912787#M924155</guid>
      <dc:creator>qasim.saeed1</dc:creator>
      <dc:date>2019-08-23T05:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: errors in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/4802320#M1099050</link>
      <description>&lt;P&gt;I have the problem - ERROR DURING POLICY VALIDATION "Internal error..........."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I gt below steps from TAC&lt;/P&gt;
&lt;P&gt;Action Taken:-&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Raised TAC as this needs some scripts to be run,&lt;/LI&gt;
&lt;LI&gt;TAC initiated – 695290717,&lt;/LI&gt;
&lt;LI&gt;TAC confirmed the same bug,&lt;/LI&gt;
&lt;LI&gt;TAC eng mentioned to raise BU collab, next eng to join in next 5 to 10 mins&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Bug ID - &lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvd40583" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvd40583&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next plan of action:- TAC steps to run script&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Take backup of the FMC DB before executing this script.&lt;/LI&gt;
&lt;LI&gt;Copy the file InterfaceAndInterfaceObjectCleanUp.zip to the FMC under the location /volume/home/admin.&lt;/LI&gt;
&lt;LI&gt;SSH into the FMC with admin user.&lt;/LI&gt;
&lt;LI&gt;Run “sudo su”, and type in the password.&lt;/LI&gt;
&lt;LI&gt;Extract the compressed file with the command “unzip InterfaceAndInterfaceObjectCleanUp.zip”&lt;/LI&gt;
&lt;LI&gt;Run “cd InterfaceAndInterfaceObjectCleanUp”&lt;/LI&gt;
&lt;LI&gt;Run “chmod 777 InterfaceGroupCleanUp.sh”&lt;/LI&gt;
&lt;LI&gt;Trigger the “InterfaceGroupCleanUp.sh” script by running the command: ./InterfaceGroupCleanUp.sh&lt;/LI&gt;
&lt;LI&gt;Script has been attached to the below folder.&lt;/LI&gt;
&lt;LI&gt;Needs to be done under a maintenance window,&lt;/LI&gt;
&lt;LI&gt;Interfaces may restart,&lt;/LI&gt;
&lt;LI&gt;TAC eng was not aware , BU eng joined the webex and told us this.&lt;/LI&gt;
&lt;LI&gt;Script files may be taen from TAC. Not able to attach them here.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 27 Mar 2023 21:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-in-firepower/m-p/4802320#M1099050</guid>
      <dc:creator>sachin garg</dc:creator>
      <dc:date>2023-03-27T21:51:40Z</dc:date>
    </item>
  </channel>
</rss>

