02-03-2025 08:36 AM
Hello All,
We are migrating from ASA+SFR to FTD. I used the migration tool and migrated the ASA policies to FMC. I was tuning the policies after migration to the FMC and have some doubts regarding the variable sets. Please find the questions below.
I was planning to configure 3 variable sets:
Please advise.
BR
Shabeeb
02-03-2025 09:09 AM - edited 02-03-2025 09:14 AM
Variable sets are employe in order for you to manage and customize variables used in intrusion rules, the purpose is to help the defined/given network enviroment more grulner/fine-tune(improving the efficeny) to reduce the false positives. Variables like $HOME_NET (classified as protected network) and $EXTERNAL_NET (classified as unprotected network) these can be be customized to your specific network needs. Hence it is not mandatory to create new variable sets however doing so is recommended for best practice configuration for your(given) network rather then leave them default. here i have attached some reference guide for you Here and Here
In regards to planning your network.
Inside Segment $HOME_NET should include all internal subnets excluding the DMZ. $EXTERNAL_NET can be set as !$HOME_NET, representing everything outside the protected internal network.
DMZ Segment $HOME_NET should include DMZ subnets, while $EXTERNAL_NET can also be !$HOME_NET, ensuring external traffic is monitored.
Internet Segment: For traffic involving the Internet, $EXTERNAL_NET should represent all external traffic not included in $HOME_NET.
for your question you have asked have a read on this link it has explain in detail I have already shared above Here
you can set the logs into order to monitor them and fine tune according to your needs.
02-03-2025 09:15 AM
Hello Sheraz,
Thanks a lot for your response. I can see other parameters like DNS, FTP etc in the configuration. Should we configure it or configuring HOME_NET and EXTERNAL_NET is enough?
02-03-2025 09:34 AM
its really depends how and what level of grunality you want to acheive. HOME_NET and EXTERNAL_NET provides you as setting up the base-line and best-security practice to start with in order to enhance the protection of network and elimante the false positives. configuration of DNS,FTD setting with HOME_NET and EXTERNAL can be highly benefical and recommanded as many snort rules can target specific protocols like DNS, FTP. I think you should be fine but if your enviroment is security sensitive in that case you might need to look into it and fine tune according to your needs.
02-03-2025 10:28 AM
Please check this post of mine about using the Snort variables and a gotcha that might make Snort unaware of an attack:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide