<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower, IPS Rule Update frequency for internal FTD firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3752620#M994067</link>
    <description>Hi fatalXerror,&lt;BR /&gt;&lt;BR /&gt;Thanks for your attention.&lt;BR /&gt;&lt;BR /&gt;In the beginning we are going to monitor-only, but in the long run the customer wants to drop-inline. I'm starting with an intrusion policy with "Drop when Inline" un-checked.&lt;BR /&gt;&lt;BR /&gt;//Erik</description>
    <pubDate>Mon, 26 Nov 2018 09:24:06 GMT</pubDate>
    <dc:creator>ejans</dc:creator>
    <dc:date>2018-11-26T09:24:06Z</dc:date>
    <item>
      <title>Firepower, IPS Rule Update frequency for internal FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749350#M994020</link>
      <description>&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;Hi,&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;I'm working with a new FTD HA-setup (Firepower 21x0) that will replace an old ASA-pair. We plan on running the latest 6.2.3.x-patch.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;The FTD will handle internal traffic only (another FTD HA pair is handling Internet/WAN-traffic). However, the FTD will handle traffic for a 24/7 live production network with time-critical sensitive applications/protocols.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;I have a big question in my mind as to how to best handle IPS Rule Updates that cause SNORT Service Interruptions in this environment. The customer wants to have IPS active to gain visibility, but they do not want the SNORT service interruptions for sensitive flows.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;I believe I can work-around this problem by preparing Fastpath Pre-filter rules that can be enabled before the customer wants to do a manual Rule Update. This way critical traffic could be manually excluded from the SNORT Service Interruption (I've also looked at "&lt;SPAN&gt;snort preserve-connection" as an option but this only preserves existing flows, not new ones)&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;My question bottles down to how often we would recommend installing Rule Updates in an environment such as this. As the Rule Update will be a manual procedure I expect the customer does not want to do it every day/every week.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;Considering this FTD will only handle internal traffic, how often would be best practise to do a manual Rule Update?&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;Would the customer miss out on a lot of features if they only did it once a month? Once a quarter?&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;Thanks,&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;Regards,&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 10.0pt;"&gt;Erik&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749350#M994020</guid>
      <dc:creator>ejans</dc:creator>
      <dc:date>2020-02-21T16:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower, IPS Rule Update frequency for internal FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749407#M994024</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/351112"&gt;@ejans&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Nice question you have there.&lt;/P&gt;
&lt;P&gt;Nothing we can do since it is the behavior of the SNORT process when deploying the policy with the updated intrusion rules but I would recommend to pick a day every week which you think it has a less transactions happening (e.g. weekend night).&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 17:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749407#M994024</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2018-11-19T17:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower, IPS Rule Update frequency for internal FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749431#M994031</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Thanks for your reply.&lt;BR /&gt;&lt;BR /&gt;I think I was a bit unclear. This is an always-on (24 hours/7 days a week) production environment with large industrial appliances. No interruption is allowed at all. As I mentioned I think I have a "sort of" manual workaround that would be run regularly. I just wonder how often this environment would get a value out of Rule Updates (also considering it's an internal firewall).&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Regards&lt;BR /&gt;Erik&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Nov 2018 17:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749431#M994031</guid>
      <dc:creator>ejans</dc:creator>
      <dc:date>2018-11-19T17:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower, IPS Rule Update frequency for internal FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749503#M994049</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/351112"&gt;@ejans&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Question, in terms of the IPS capability do you need to monitor it only or you also need proactively drop the traffic once intrusion is detected?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 19:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3749503#M994049</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2018-11-19T19:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower, IPS Rule Update frequency for internal FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3752620#M994067</link>
      <description>Hi fatalXerror,&lt;BR /&gt;&lt;BR /&gt;Thanks for your attention.&lt;BR /&gt;&lt;BR /&gt;In the beginning we are going to monitor-only, but in the long run the customer wants to drop-inline. I'm starting with an intrusion policy with "Drop when Inline" un-checked.&lt;BR /&gt;&lt;BR /&gt;//Erik</description>
      <pubDate>Mon, 26 Nov 2018 09:24:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-rule-update-frequency-for-internal-ftd-firewall/m-p/3752620#M994067</guid>
      <dc:creator>ejans</dc:creator>
      <dc:date>2018-11-26T09:24:06Z</dc:date>
    </item>
  </channel>
</rss>

