cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
618
Views
1
Helpful
6
Replies

FMC Prefilter-Fastpath error

RWarr100
Level 1
Level 1

Morning,

I am having an issue with our Fastpath rules, hoping for some advice:

I have added our scanning IP ranges in to Network Objects and then created a prefilter policy to fastpath traffic from or to these addresses.

I'm unsure why but we are still seeing intrusion alerts being generated from these addresses during our periodic scans. As far as I understand the fastpath should prevent the traffic from those IPs from being inspected by the snort engine. Do I need to put it in the ACP as a Trust rule to capture existing connections as well?

6 Replies 6

Did you attach the prefilter policy to you ACP policy? if so, do you see any counters on the "show snort statistics" command on FTD CLISH mode ">"?

Yes, it's attached to the ACP. I had a look in the FTDs CLI and I didn't have the option for snort statistics under the "show" command.

Thanks, I read that however when I use the show and look at all potential commands there are no snort entries. They are old devices so maybe the OS doesn't support the command? 

Mmm, not sure. One thing you could try would be to remove that prefilter rule and create it in the ACP with a trust action. The end result would be the same.

prefilter is bypass Snort but as I understand you config prefilter after traffic pass FTD 

this make FTD build conn and hence it bypass any prefilter and make traffic inspect by snort 

MHM

Review Cisco Networking for a $25 gift card