<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD: Block with reset vs Block in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3344506#M924587</link>
    <description>&lt;P&gt;I got&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi31751/?referring_sie=dumpcr" target="_self"&gt;CSCvi31751&lt;/A&gt;&amp;nbsp;created “just for me”... now back to the waiting game.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Workaround: set SSL Inspection policy to None at the Access List. You will miss SSL decryption and SSL session statistics.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Mar 2018 00:48:30 GMT</pubDate>
    <dc:creator>HQuest</dc:creator>
    <dc:date>2018-03-08T00:48:30Z</dc:date>
    <item>
      <title>FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337187#M924577</link>
      <description>&lt;P&gt;Hello all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have made a few tests with content block and got stuck with an unexpected behavior - or a bad understanding from my part. 3D sensor runs v6.2.2.2-1, if that adds to the question.&lt;/P&gt;
&lt;P&gt;According to the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/access_control_rules.html#ID-2190-0000027b" target="_blank"&gt;documentation&lt;/A&gt; [1]: "&lt;EM&gt;The Block and Block with reset actions deny traffic without further inspection of any kind. Block with reset rules also reset the connection.&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;I was expecting the "Block" action to be completely silent for both parties, until the connection timeout happens, and the "Block with reset" action to be an immediate stop of the connection with both sides aware of the connection being terminated.&lt;/P&gt;
&lt;P&gt;I applied some policies for HTTP/HTTPS traffic and I can see traffic being blocked as soon as it matches the policy, however it does not matter if the policy is set to Block with our without reset, on the client side it always delays until the connection time out. Please see attachment for visual details. And this completely destroys the end user experience, as some external services have delays over 2 minutes (for whatever reason).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Am I missing something?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[1]&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/access_control_rules.html#ID-2190-0000027b" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/access_control_rules.html#ID-2190-0000027b&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337187#M924577</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2020-02-21T15:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337188#M924578</link>
      <description>&lt;P&gt;Hello Alexander,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are right on the way the Block and Block with Reset is supposed to work. Block is suppose to leave the page loading until it times out, Block with Reset should be immediate. The one sending the RST is the device itself.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is not working, please open an SR for further investigation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Feb 2018 17:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337188#M924578</guid>
      <dc:creator>argrullo</dc:creator>
      <dc:date>2018-02-24T17:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337265#M924579</link>
      <description>&lt;P&gt;I have a TAC open (delayed after a few hiccups in Cisco's escalation process) and was able to speak to an engineer, however while researching this further, seems I'm hitting bug &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf47736" target="_self"&gt;CSCvf47736&lt;/A&gt;. Still waiting to hear from the engineer if my problem confirms as this bug.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Feb 2018 02:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337265#M924579</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2018-02-25T02:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337393#M924580</link>
      <description>I am glad to you were able to find a bug that might be related and provide a path. Does your environment match the conditions. Do you have an SSL Policy?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The internal bug notes have some information your CSE will be able to use to confirm the bug.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 25 Feb 2018 14:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337393#M924580</guid>
      <dc:creator>argrullo</dc:creator>
      <dc:date>2018-02-25T14:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337400#M924581</link>
      <description>&lt;P&gt;Yes, we do have SSL policies for internal traffic decryption and for session&amp;nbsp;recording purposes. Not that we are decrypting traffic from this particular policy but a SSL policy is applied. Seems my large scale deployment is going to get postponed - again...&lt;/P&gt;</description>
      <pubDate>Sun, 25 Feb 2018 15:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337400#M924581</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2018-02-25T15:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337439#M924582</link>
      <description>&lt;P&gt;That is unfortunate. Currently the Fixed version for the bug are 6.2.2.2 and 6.2.3.&lt;/P&gt;
&lt;P&gt;I know the versions above are also listed in the problem version, but this is because they were found in it during testing and will be fixed prior to release.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Version 6.2.2.2 should be released by the end of the month.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Otherwise the only other option would be to reimage the ASA to FTD. But that would much more work than needed, specially when there is a fixed version around the corner.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Feb 2018 17:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3337439#M924582</guid>
      <dc:creator>argrullo</dc:creator>
      <dc:date>2018-02-25T17:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3339559#M924583</link>
      <description>Well, February's almost over, so should the new code land today/tomorrow, we can put it in on the lab and see if 1) it fixes the issue and 2) what else it breaks. Hopefully, nothing that we might use elsewhere so we can roll this to the other deployments by the end of March.&lt;BR /&gt;&lt;BR /&gt;Thanks for all the hints. I have to say I had better luck getting updates from you than from any of the 3 engineers assigned for my SR...</description>
      <pubDate>Wed, 28 Feb 2018 13:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3339559#M924583</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2018-02-28T13:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3340577#M924584</link>
      <description>Found 6.2.2.2-109 was out, so I gave it a shot on the lab earlier this morning. Applied to the FMC and to the sensor, deployed policies, tested and... same issue. Still not seeing any RESET from the sensor - only from the browser after 20+ seconds and a few packet retries.</description>
      <pubDate>Thu, 01 Mar 2018 17:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3340577#M924584</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2018-03-01T17:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3340582#M924585</link>
      <description>Hello Alexandre,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;That is unfortunate and I am sorry it did not work out.&lt;BR /&gt;&lt;BR /&gt;At this is more in depth, I would recommend to open an SR regarding this bug, and how it was supposed to solve the issue and to get the bug revised / find you a workaround.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Mar 2018 17:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3340582#M924585</guid>
      <dc:creator>argrullo</dc:creator>
      <dc:date>2018-03-01T17:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3340645#M924586</link>
      <description>I have a SR is open. Waiting now to hear from the TAC engineer. I sent a few more pcaps for analysis and a fresh troubleshooting package too.</description>
      <pubDate>Thu, 01 Mar 2018 19:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3340645#M924586</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2018-03-01T19:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3344506#M924587</link>
      <description>&lt;P&gt;I got&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi31751/?referring_sie=dumpcr" target="_self"&gt;CSCvi31751&lt;/A&gt;&amp;nbsp;created “just for me”... now back to the waiting game.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Workaround: set SSL Inspection policy to None at the Access List. You will miss SSL decryption and SSL session statistics.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Mar 2018 00:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3344506#M924587</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2018-03-08T00:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3358000#M924588</link>
      <description>&lt;P&gt;Hello! I have the same issue. But it seems that in 6.2.2.2 it was resolved.&lt;/P&gt;
&lt;P&gt;I see that with do not decrypt rule and block with reset action everithing is ok.&lt;/P&gt;
&lt;P&gt;Could you confirm that you are still facing wit the bug in 6.2.2.2-109?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 09:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3358000#M924588</guid>
      <dc:creator>netcrackercorp</dc:creator>
      <dc:date>2018-03-30T09:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3362285#M924589</link>
      <description>&lt;P&gt;On 6.2.2.2 it was acting the same way - if a SSL policy is added, it was a no go. I found out 6.2.3 is out, and gave it a shot. Enabled the SSL policy again and it seems it is fixed. I need to do some more testing but it looks promising.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Apr 2018 02:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3362285#M924589</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2018-04-08T02:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Block with reset vs Block</title>
      <link>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3794930#M924590</link>
      <description>&lt;P&gt;I have the same issue with 6.2.3.9&amp;nbsp; doesn't matter if ssl decrypt is enabled or disabled.....&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 10:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-block-with-reset-vs-block/m-p/3794930#M924590</guid>
      <dc:creator>jmarugg</dc:creator>
      <dc:date>2019-02-05T10:32:39Z</dc:date>
    </item>
  </channel>
</rss>

