10-22-2024 01:52 AM
Morning,
I am having an issue with our Fastpath rules, hoping for some advice:
I have added our scanning IP ranges in to Network Objects and then created a prefilter policy to fastpath traffic from or to these addresses.
I'm unsure why but we are still seeing intrusion alerts being generated from these addresses during our periodic scans. As far as I understand the fastpath should prevent the traffic from those IPs from being inspected by the snort engine. Do I need to put it in the ACP as a Trust rule to capture existing connections as well?
10-22-2024 03:39 AM
Did you attach the prefilter policy to you ACP policy? if so, do you see any counters on the "show snort statistics" command on FTD CLISH mode ">"?
10-23-2024 04:13 AM
Yes, it's attached to the ACP. I had a look in the FTDs CLI and I didn't have the option for snort statistics under the "show" command.
10-23-2024 04:38 AM
Please refer to this link for the "show snort statistics" command:
10-24-2024 01:43 AM
Thanks, I read that however when I use the show and look at all potential commands there are no snort entries. They are old devices so maybe the OS doesn't support the command?
10-24-2024 02:34 AM
Mmm, not sure. One thing you could try would be to remove that prefilter rule and create it in the ACP with a trust action. The end result would be the same.
10-31-2024 12:27 AM
prefilter is bypass Snort but as I understand you config prefilter after traffic pass FTD
this make FTD build conn and hence it bypass any prefilter and make traffic inspect by snort
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide