<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Rule Updates in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351180#M924257</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct, the update is for snort rules.&lt;/P&gt;
&lt;P&gt;At the moment this is the behavior if your running inline.&lt;/P&gt;
&lt;P&gt;Here is some more information if you haven seen it already:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/policy_management.html#concept_33516C5D6B574B6888B1A05F956ABDF9" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/policy_management.html#concept_33516C5D6B574B6888B1A05F956ABDF9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured this rule update to happen at nights.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;br, Micke&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Mar 2018 20:35:17 GMT</pubDate>
    <dc:creator>mikael.lahtela</dc:creator>
    <dc:date>2018-03-19T20:35:17Z</dc:date>
    <item>
      <title>Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351162#M924256</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;We are currently evaluating the FirePower for use in a project.&lt;/P&gt;
&lt;P&gt;Our current test unit is a Firepower 2110 with FTD 6.2.2.2, Managed from the Firepower Management Center.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When running automatic Rule Update. (System-&amp;gt;Updates-&amp;gt;Rule Updates) the traffic is interrupted for a small time when the devices activates the new rules.&lt;/P&gt;
&lt;P&gt;My understanding is that the Rule Updates is the IPS/Snort filters.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This interruption is not acceptable to us.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a setting/fix for this issue? Or is this more of an TAC question?&lt;BR /&gt;Not updating the filters is not an option.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351162#M924256</guid>
      <dc:creator>hdnorway</dc:creator>
      <dc:date>2020-02-21T15:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351180#M924257</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct, the update is for snort rules.&lt;/P&gt;
&lt;P&gt;At the moment this is the behavior if your running inline.&lt;/P&gt;
&lt;P&gt;Here is some more information if you haven seen it already:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/policy_management.html#concept_33516C5D6B574B6888B1A05F956ABDF9" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/policy_management.html#concept_33516C5D6B574B6888B1A05F956ABDF9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured this rule update to happen at nights.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;br, Micke&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Mar 2018 20:35:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351180#M924257</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2018-03-19T20:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351218#M924258</link>
      <description>&lt;P&gt;The interface/zone is not part of an inline set. It is an routed interface. Basically a lan to wan scenario.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But thanks for the link. I understand a bit more. The users we are serving is connecting with a remote solution 24/7. So any connection interruption is not good at any time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Mar 2018 21:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351218#M924258</guid>
      <dc:creator>hdnorway</dc:creator>
      <dc:date>2018-03-19T21:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351350#M924259</link>
      <description>&lt;P&gt;You can minimize the impact by selecting for flow Preservation during Snort restart. With that, all existing flows will continued to be allowed while the Snort engine restarts. This was a (non-default) option as of 6.2.0.2 and 6.2.2.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any new flows will continue to be impacted during Snort engine restart.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 03:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351350#M924259</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-20T03:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351445#M924260</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;Could you please point me in the direction on where i can change this in the Managment Center?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 09:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351445#M924260</guid>
      <dc:creator>hdnorway</dc:creator>
      <dc:date>2018-03-20T09:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351575#M924261</link>
      <description>&lt;P&gt;Look under your Access Control Policy &amp;gt; Advanced &amp;gt; General Settings as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC Inspect during policy apply option.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/9135i52CE9228335F3ABE/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC Inspect during policy apply option.PNG" alt="FMC Inspect during policy apply option.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 13:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351575#M924261</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-20T13:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351992#M924262</link>
      <description>&lt;P&gt;Thanks. I checked it and the setting was enabled. It still has some seconds drop. Enough that it will interrupt RDP sessions and some very sensitive applications.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is now workaround for this?&amp;nbsp;&lt;BR /&gt;Anyone now if Cisco has said anything about improving this?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 22:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3351992#M924262</guid>
      <dc:creator>hdnorway</dc:creator>
      <dc:date>2018-03-20T22:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3352262#M924263</link>
      <description>&lt;P&gt;Cisco is working very hard on improving this. They realize it is a current limitation and many customers and partners have raised it as a concern.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Mar 2018 09:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3352262#M924263</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-21T09:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3353039#M924264</link>
      <description>&lt;P&gt;There is also an option that was introduced in 6.2.0.2. From the cli it is " configure snort preserve-connection {enable | disable} "&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/6201/relnotes/Firepower_Release_Notes_Version_620x.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/6201/relnotes/Firepower_Release_Notes_Version_620x.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's not available in 6.2.1 or 6.2.2 but I'm told it will be folded back in to the upcoming 6.2.3 release (ca. April 2018) and will be the default behavior.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That feature may further address your valid concern.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 12:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3353039#M924264</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-22T12:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3353548#M924265</link>
      <description>&lt;P&gt;Thanks for the information,&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 21:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/3353548#M924265</guid>
      <dc:creator>hdnorway</dc:creator>
      <dc:date>2018-03-22T21:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Rule Updates</title>
      <link>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/4144950#M1073518</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;Anyone knows if this has been fixed on later versions of FTD (6.5 or 6.6).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;Anderson&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 08:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-rule-updates/m-p/4144950#M1073518</guid>
      <dc:creator>andersonamorim</dc:creator>
      <dc:date>2020-09-02T08:28:26Z</dc:date>
    </item>
  </channel>
</rss>

