cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
21659
Views
24
Helpful
11
Replies

Firesight Allow vs Trust

moody
Level 1
Level 1

Not understanding the difference for an Access Control Policy if let's say I 'Trust' the facebook application vs 'Allow' the facebook application.  Is the only difference the ability to log?

11 Replies 11

If you choose the action "Trust", you don't do any more inspection on the traffic. There will be no intrusion protection and also no file-policy on this traffic.

Good advice!

You would still have SSL inspection with trusting the traffic correct?

SSL inspection (and decryption) is processed prior to Access Control Policy (ACP) rules so - yes, it still applies when the ACP action is trust.

Just to add to Karsten's answer: Trust rules are not subject to IPS, AVC and File inspection but are still subject to identity and QoS policies. If you want to completely skip all snort-based inspections then you can utilize pre-filter rules. 

I hope this helps!

Thank you for rating helpful posts!

nspasov
Cisco Employee
Cisco Employee

To add to what Karsten said (+5 from me):

1. Use this feature when you don't want to tax your Firewall for traffic that does not need inspection. For instance, DB server on dmz_1 doing a backup to a backup server on dmz_2. 

2. If you are running FirePOWER on the ASAs then instead of using "trust" you should exclude that type of traffic in your sfr redirection policy in the ASA directly.

I hope this helps!

Thank you for rating helpful posts!

This is good advice depending on what you want to accomplish. If you still want to see that traffic in your FirePower Events then you do not want to exclude that traffic on the ASA via Access List. If you don't care about seeing that traffic in FirePower then by all means exclude within the SFR Redirect Access List. If you do want to see that traffic in FirePower, then mark the traffic as "trusted" so that the events will still be logged, but not processed by the IPS.

This interesting. Two week ago FMC was blocking a traffic from amazon cloud we host services on the cloud. in order to fix the issue i created a rule to trust the connection amazon public ip to our dmz server. even though the rule was trust but it was still getting to the default intrusion policy. now again to fix the issue i went to sort rules and disable the rule which was alerts us. my understanding is even trust does not actually trust the traffic and still apply the defaut IPS rules. unless mentioned above to create a access-list on ASA.

please do not forget to rate.

It is also worth bearing in mind that each Access Control policy has a setting in the Advanced tab for 'Intrusion Policy used before Access Control rule is determined' where packets are sent through this policy using the default variable set before an action from the access policy can be determined. So it's worth noting that if you change your default action after you create the access control policy, the default intrusion policy does not automatically change. To change it manually, use the access control policy’s advanced options.

Trust rules do "trust" the traffic. What you're seeing is due to a setting in the advanced tab of the access control policy. "Intrusion poolicy before Access Control rule is determined".

this is exactly my case, we need to transfer backup/replication data between 2 datacenters and looks like the trust rules would help me out with the single snort instance behavior that limits totalthroughput

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card