<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to export  All the rules from a 8350 FirePower  Policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3883333#M945470</link>
    <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I get rid of below message while trying to scp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@HH-HHH-HH1:/var/sf/detection_engines/302e2fca-7a77-11e6-870d-af9f5b863148# sudo scp ngfw.rules admin@10.7.XX.XX:/var/tmp&lt;BR /&gt;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&lt;BR /&gt;@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @&lt;BR /&gt;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&lt;BR /&gt;IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!&lt;BR /&gt;Someone could be eavesdropping on you right now (man-in-the-middle attack)!&lt;BR /&gt;It is also possible that a host key has just been changed.&lt;BR /&gt;The fingerprint for the ECDSA key sent by the remote host is&lt;BR /&gt;SHA256:4raWthjsdjfhsdjhfkjsdhfiwryeiuweryVgdqAQLwraTy3L0NJk.&lt;BR /&gt;Please contact your system administrator.&lt;BR /&gt;Add correct host key in /root/.ssh/known_hosts to get rid of this message.&lt;BR /&gt;Offending ECDSA key in /root/.ssh/known_hosts:2&lt;BR /&gt;ECDSA host key for 10.7.XX.XX has changed and you have requested strict checking.&lt;BR /&gt;Host key verification failed.&lt;BR /&gt;lost connection&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2019 16:22:23 GMT</pubDate>
    <dc:creator>subrun.jamil</dc:creator>
    <dc:date>2019-07-02T16:22:23Z</dc:date>
    <item>
      <title>How to export  All the rules from a 8350 FirePower  Policy</title>
      <link>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3865803#M945462</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to export All the rules in a FirePower Policy.&amp;nbsp; Reason I am asking this question is searching items in SourceFire is not that much user friendly. Like If I want to search with a AD Group name it really does not look at User field. That's why just wondering how to search AD Group in a Firewall Policy. Also better to know after exporting a Firewall Policy How to view them ?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3865803#M945462</guid>
      <dc:creator>subrun.jamil</dc:creator>
      <dc:date>2020-02-21T17:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to export  All the rules from a 8350 FirePower  Policy</title>
      <link>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3866097#M945463</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;You will need to use API calls to export ACP and into returned results you'll see all role details which means you will have the AD group condition.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 01 Jun 2019 05:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3866097#M945463</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-06-01T05:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to export  All the rules from a 8350 FirePower  Policy</title>
      <link>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3866099#M945467</link>
      <description>&lt;P&gt;The deployed access control policy should be located in:&lt;/P&gt;
&lt;PRE&gt;/var/sf/detection_engines/UUID/ngfw.rules &lt;/PRE&gt;
&lt;P&gt;The UUID (Universally Unique Identifier) will vary - look in /var/sf/detection_engines folder for your UUIDs and, if there are multiple, choose the one with the latest timestamp.&lt;/P&gt;
&lt;P&gt;You can export and/or search that file (e.g. with grep utility) to examine the ACP in more detail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2019 05:11:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3866099#M945467</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-06-01T05:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to export  All the rules from a 8350 FirePower  Policy</title>
      <link>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3883333#M945470</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I get rid of below message while trying to scp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@HH-HHH-HH1:/var/sf/detection_engines/302e2fca-7a77-11e6-870d-af9f5b863148# sudo scp ngfw.rules admin@10.7.XX.XX:/var/tmp&lt;BR /&gt;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&lt;BR /&gt;@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @&lt;BR /&gt;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&lt;BR /&gt;IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!&lt;BR /&gt;Someone could be eavesdropping on you right now (man-in-the-middle attack)!&lt;BR /&gt;It is also possible that a host key has just been changed.&lt;BR /&gt;The fingerprint for the ECDSA key sent by the remote host is&lt;BR /&gt;SHA256:4raWthjsdjfhsdjhfkjsdhfiwryeiuweryVgdqAQLwraTy3L0NJk.&lt;BR /&gt;Please contact your system administrator.&lt;BR /&gt;Add correct host key in /root/.ssh/known_hosts to get rid of this message.&lt;BR /&gt;Offending ECDSA key in /root/.ssh/known_hosts:2&lt;BR /&gt;ECDSA host key for 10.7.XX.XX has changed and you have requested strict checking.&lt;BR /&gt;Host key verification failed.&lt;BR /&gt;lost connection&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 16:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3883333#M945470</guid>
      <dc:creator>subrun.jamil</dc:creator>
      <dc:date>2019-07-02T16:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to export  All the rules from a 8350 FirePower  Policy</title>
      <link>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3883616#M945475</link>
      <description>&lt;P&gt;Do like the message says and:&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;Add correct host key in /root/.ssh/known_hosts to get rid of this message.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Offending ECDSA key in /root/.ssh/known_hosts:2&lt;/SPAN&gt;"&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 01:10:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-export-all-the-rules-from-a-8350-firepower-policy/m-p/3883616#M945475</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-03T01:10:31Z</dc:date>
    </item>
  </channel>
</rss>

