08-22-2020 03:19 AM - edited 08-22-2020 03:19 AM
Hello all,
I´m new using Friepower devices and I was looking information about all types of policies and data flow.
I found the attached image where you can see the flow after the Pre filter policy is first L3/L4 rules and then the traffic goes to snort engine.
In the snort engine goes first SI and SSL Policy and then L7 Rules.
My question is., How is it possible to manage in a different way the rules depending on the Layer and to keep at the same time the ACP sequence?
08-23-2020 05:02 AM
I'm not clear what you are trying to accomplish. Can you give an example use case?
08-23-2020 07:55 AM
First of all, thank you for your answer.
For example, I get an email every time that there is a security intelligence event. Let`s say that I´m receiving a lot of emails because an event coming from an IP x.x.x.x
If I create a rule in the first ACP line denying the traffic to this IP over port 80 and 443, I will not receive any more SI event emails because L3/L4 rules in the ACP come first than SI.
If I create a rule in the first ACP line denying the traffic to this IP and HTTP (Application, not port), I will receive the same emails because L7 rules come after SI.
If I have only 1 rule it´s clear but, What happens when I have 10 more rules before that one? All L3/4 rules are processed first and then L7 (Then the ACP secuence is broken)?, the traffic goes from lina to snort in every rule beeing processed every time by SI?
How it works? I don´t get it.
08-25-2020 11:28 PM
Security Intelligence (SI) inspection comes before any Access Control Policy (ACP) entries - whether they are configured as L3/L4 or Application aware. Prefilter rules come before SI - are you thinking about those instead? If prefilter rule is set to Trust the flow it bypasses Snort altogether (SI and ACP and everything else) via the "Fastpath". In any case the behavior is always deterministic and the ACP rule sequence is not broken. Rules are processed from the top down with first match ending the process (except where the action is "monitor"in which case the subsequent rules are also evaluated for a match).
See this more detailed reference:
11-22-2023 07:51 AM
@Marvin Rhoads what type of analysis can the Firepower IPS perform on encrypted traffic? Based on the image you shared, it looks like it's mandatory for the intrusion policy to work, to have an SSL policy configured. Is it possible to apply any Snort rules on encrypted traffic whatsoever?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide