04-08-2019 10:11 AM - edited 02-21-2020 09:01 AM
After reading the NGFW Policy Order of Operations guide here, https://www.cisco.com/c/dam/en/us/td/docs/security/firepower/Self-Help/NGFW_Policy_Order_of_Operations.pdf
I am even more confused about how the firepower device processes rules. According to this guide, if I want to block all port 443, but allow access to google drive, I would need to put a rule blocking 443 before the rule allowing google drive. This is on page 5 of the linked guide.
Could someone please explain how a setup like that would allow google drive while simultaneously blocking all 443 traffic? If the block for port 443 comes before the application detection rule for google drive, the application detection rule would never be able to identify a google drive connection, because it would be blocked at the very first packet.
04-11-2019 12:31 PM
05-11-2019 10:19 AM
Thanks Mike,
I think I understand the order of operations, but I'm trying to figure out if there is a discrepancy in the guide I'm reading, since it it proposing to make a 443 blacklist ACE in the ACP before the application detection ACE for allowing google drive.
It would seem to me that such a configuration would not properly allow google drive to work, since all 443 traffic would be blocked prior to the google drive allow - e.g. the application detection would not be able to do it's job because the 443 block ACE is preventing any packets from getting through. However the cisco published guide is clearly stating this is the preferred way to set up such a configuration.
Assuming you were in some ultra-high security environment where you were doing zero trust and whitelisting, blocking 443 at the top of the ACL would render any application detection useless, correct?
05-14-2019 08:08 AM
01-12-2022 08:02 PM
Is this document still available? I can not find it anywhere.
01-13-2022 12:29 AM
You can refer to this diagram:
02-03-2022 01:57 AM
Hello Legends.
Apologies for sabotaging the thread but I have a question along similar lines and somehting we may see a lot of in the coming years.
Picture the scene:
* SDA fabric with VNs
* Cisco FTDs being used as the Fusion router
* VNs temrinate on the FTDs (SVI)
* Different virtual routing instance run on the FTD for each VN (BGP)
* ISE updating FTDs with context info (ie SGTs to IP mapping) via SXP
* One instance/container being run on the FTD
OK, so let's say that Bob on VN-Blue wants to reach Jane on VN-Pink. How will that look?
Well firstly, the routes need to be leaked between the VNs. That can be done manually with route targets, etc.
Secondly, a rule needs to be created to allow Bob's IP address to be allowed to destination Jane's IP address.
Given that this may be a common requirement according to design requirements, Im wondering whether the pain is worth it. But that's a side note.
Question .. Where in that flow diagram will all this take place? Given that the packet will go from trusted VN zone to trusted VN zone, will the packet still have to pass through the SNORT engine, the standard ACLS, etc? My head is in a spin thinking about it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide