<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FirePOWER logging issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-logging-issue/m-p/3806977#M948125</link>
    <description>&lt;P&gt;Hi everybody,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we are working on project implementation and found the syslog&amp;nbsp;message from FirePOWER have some mismatch to the defined ACP's rules. Does anybody &lt;SPAN style="background-color: #f6d5d9;"&gt;see&amp;nbsp;&lt;/SPAN&gt;this issue before? we are running v6.2.3 patch 4, thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;say for example.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A DNS policy have hit by the 443 traffic but the AD-DNS rules only allow TCP &amp;amp; UDP 53 port&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jan Date&amp;nbsp; Firepower-module1 SFIMS: Protocol: UDP, SrcIP: 192.168.x.x, OriginalClientIP: ::, DstIP: 192.168.x.x, , SrcPort: 55775, DstPort: &lt;STRONG&gt;443&lt;/STRONG&gt;, Flags: 0x0, IngressZone: Outside, EgressZone: Inside, DE: Primary Detection Engine (x.x.x.x), Policy: Office-Firewall_Policy, ConnectType: End, AccessControlRuleName:&amp;nbsp; &lt;STRONG&gt;AD DNS&lt;/STRONG&gt;, AccessControlRuleAction: Allow, AccessControlRuleReason: Intrusion Block, Prefilter Policy: Default Prefilter Policy, UserName: No Authentication Required, Client: DNS client, ApplicationProtocol: DNS, IPSCount: 1, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 85, ResponderBytes: 233, NAPPolicy: Balanced Security and Connectivity, DNSQuery: outlook.office365.com, DNSRecordType: a host address, DNSResponseType: No Error, DNS_T&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:50:51 GMT</pubDate>
    <dc:creator>ray_lau</dc:creator>
    <dc:date>2020-02-21T16:50:51Z</dc:date>
    <item>
      <title>FirePOWER logging issue</title>
      <link>https://community.cisco.com/t5/network-security/firepower-logging-issue/m-p/3806977#M948125</link>
      <description>&lt;P&gt;Hi everybody,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we are working on project implementation and found the syslog&amp;nbsp;message from FirePOWER have some mismatch to the defined ACP's rules. Does anybody &lt;SPAN style="background-color: #f6d5d9;"&gt;see&amp;nbsp;&lt;/SPAN&gt;this issue before? we are running v6.2.3 patch 4, thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;say for example.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A DNS policy have hit by the 443 traffic but the AD-DNS rules only allow TCP &amp;amp; UDP 53 port&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jan Date&amp;nbsp; Firepower-module1 SFIMS: Protocol: UDP, SrcIP: 192.168.x.x, OriginalClientIP: ::, DstIP: 192.168.x.x, , SrcPort: 55775, DstPort: &lt;STRONG&gt;443&lt;/STRONG&gt;, Flags: 0x0, IngressZone: Outside, EgressZone: Inside, DE: Primary Detection Engine (x.x.x.x), Policy: Office-Firewall_Policy, ConnectType: End, AccessControlRuleName:&amp;nbsp; &lt;STRONG&gt;AD DNS&lt;/STRONG&gt;, AccessControlRuleAction: Allow, AccessControlRuleReason: Intrusion Block, Prefilter Policy: Default Prefilter Policy, UserName: No Authentication Required, Client: DNS client, ApplicationProtocol: DNS, IPSCount: 1, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 85, ResponderBytes: 233, NAPPolicy: Balanced Security and Connectivity, DNSQuery: outlook.office365.com, DNSRecordType: a host address, DNSResponseType: No Error, DNS_T&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-logging-issue/m-p/3806977#M948125</guid>
      <dc:creator>ray_lau</dc:creator>
      <dc:date>2020-02-21T16:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: FirePOWER logging issue</title>
      <link>https://community.cisco.com/t5/network-security/firepower-logging-issue/m-p/3807228#M948126</link>
      <description>&lt;P&gt;Maybe this is DNS over HTTPS?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.umbrella.com/hc/en-us/articles/360001371526-Firefox-and-DNS-over-HTTPS-default" target="_blank"&gt;https://support.umbrella.com/hc/en-us/articles/360001371526-Firefox-and-DNS-over-HTTPS-default&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://developers.google.com/speed/public-dns/docs/dns-over-https" target="_blank"&gt;https://developers.google.com/speed/public-dns/docs/dns-over-https&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not know how your Firepower rules are set up. But the Firepower may be detecting this as DNS if your condition is to match DNS application rather than tcp/ udp 53.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 22:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-logging-issue/m-p/3807228#M948126</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2019-02-21T22:22:11Z</dc:date>
    </item>
  </channel>
</rss>

