cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3325
Views
1
Helpful
3
Replies

FMC and FTD, a block rule ALLOWS data to flow?

itsupport
Level 1
Level 1

I am running FMC to administer an FTD 5508. Both have version 6.2.21 of thier respective software.

I have a rule set up as pictured below, rule4 Outbound Blocked. Idea is for it to block some "non business" sites. I expected the rule evaluation logic to do the following:

1. Evaluate each rule in order.
2. When evaluating rule4:
    If a match occurs, deny the packet, and stop processing further rules.
    If a match does not occur, move onto the next rule.

Oddly to me, it seems that rule4 is ALLOWING through at least some traffic that does not match the rule. Specifically, rule4 is allowing SMTP traffic, on TCP port 25 through. The behaviour I expected was for this rule to only ever block traffic, not to let anything ever pass though it, regardless of if it matched or not.

Am I misunderstanding how the logic here should operate? Does  a block rule allow anything that does not match or something?  


Capture.JPG

 

1 Accepted Solution

Accepted Solutions

The problem here is time it takes for the evaluation. The firewall does not want to block all traffic until the evaluation is made. Your case should be easily fixed by re-ordering the rules. Cisco TAC generally recommends the Application and URL rules to be placed after the L3/L4 rules. So If you are really blocking that specific traffic below, that rule should be above this rule to block URL's. 

View solution in original post

3 Replies 3

Rahul Govindan
VIP Alumni
VIP Alumni

This might because URL filtering takes a few packets to start filtering urls. Till then, if all other conditions match (in your case is any any), it allows to go through so that the identification can complete. Documented below:

 

https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/rule_management.html#ID-2189-00000301

 

If early traffic matches all other rule conditions but identification is incomplete, the system allows the packet to pass and the connection to be established (or the SSL handshake to complete). After the system completes its identification, the system applies the appropriate rule action to the remaining session traffic.

Try adding ports to your url filtering rules to match http/https traffic only.

The firewall is not just allowing the first few packets, it allows at least dozens. Any traffic on port 25 at least is passed.

I have now added HTTP and HTTPS as destination ports, and this seems to stop this behaviour. It also means that questionable websites on port 8080 or 88 or 8000 or 8008 or 591 or  4433 or whatever are not blocked. Proxies often use these ports, and the most dodgy sites could use ANY port.  I would rather traffic to those destinations on ANY port was blocked, and the rest left for evaluation by other rules.


Is the behaviour I am seemng how the firewall is supposed to work? To my way of thinking, a BLOCK rule should; either cause no more rules to be evaluated, OR allow the next rule to be examined; I cannot understand the logic behind a block rule allowing traffic.

The problem here is time it takes for the evaluation. The firewall does not want to block all traffic until the evaluation is made. Your case should be easily fixed by re-ordering the rules. Cisco TAC generally recommends the Application and URL rules to be placed after the L3/L4 rules. So If you are really blocking that specific traffic below, that rule should be above this rule to block URL's. 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card