<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower IPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3810788#M990917</link>
    <description>&lt;P&gt;it could be a false positive. you can change the rules going into a snort rule and change according to your requirements.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Feb 2019 11:53:13 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-02-27T11:53:13Z</dc:date>
    <item>
      <title>Firepower IPS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3809646#M990905</link>
      <description>&lt;P&gt;Hi. I recently set IPS on firepower but portscan detection catche traffic from Domain controller to host device that is used to watch cameras. I dont understand what kind of traffic is it to trigger protscan detection. What could be send from domain controller to hosts that trigger portscan rule.? Moreover i observed that the traffic destined to port 135. but again i didnt understand which traffic uses 135 that cause this issue. please help me as sson as possible. thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 08:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3809646#M990905</guid>
      <dc:creator>ccna_security</dc:creator>
      <dc:date>2019-02-26T08:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower IPS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3809753#M990910</link>
      <description>Hi, You need to specify correct variable set to detect the network in you environment. You need to specify Home_Net &amp;amp; External_Net.&lt;BR /&gt;</description>
      <pubDate>Tue, 26 Feb 2019 09:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3809753#M990910</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-02-26T09:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower IPS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3809759#M990914</link>
      <description>&lt;P&gt;hi. i have already specified my private network on variable set. Firepower is internal and i added only private ranges that i use into variable set. i use 172.16.0.0 192.168.0.0 private range. But server on 172.16.0.1(for example) request 192.168.10.1 host. Portscan then detect as if there is anomaly occurs.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 10:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3809759#M990914</guid>
      <dc:creator>ccna_security</dc:creator>
      <dc:date>2019-02-26T10:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower IPS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3810788#M990917</link>
      <description>&lt;P&gt;it could be a false positive. you can change the rules going into a snort rule and change according to your requirements.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 11:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips/m-p/3810788#M990917</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-02-27T11:53:13Z</dc:date>
    </item>
  </channel>
</rss>

