ā08-30-2024 09:46 AM
There might an obvious answer to this
My understanding is that, when you create an l7 ACP entry on Firepower, Few packets are sent through the DAQ engine to identify the app so it can evaluate the l7 ACL. Then based on l7 Evaulation its allowed or blocked
I assume when if you dont enable the IPS option under the rule then it simply does not do any IPS (same as File policy).
is my understanding correct ?
Solved! Go to Solution.
ā08-30-2024 09:50 AM
traffic is pass to snort' snort will detect APP ID then ues this ID in L7 rule deny or allow.
If IPS is enable the ACP L7 with app id will also inspect by ips allow or deny
MHM
ā08-30-2024 09:50 AM
traffic is pass to snort' snort will detect APP ID then ues this ID in L7 rule deny or allow.
If IPS is enable the ACP L7 with app id will also inspect by ips allow or deny
MHM
ā08-30-2024 09:52 AM
Cheers,
This was my understanding
ā08-30-2024 09:52 AM
All packets are send to DAQ (unless you are using ASA with firepower services).
If you put a trust rule, then it will bypass most of it, but it still uses resources as it is still received by SNORT.
there is pre-filter option to bypass SNORT completely for best performance for trusted flows.
ā08-30-2024 09:58 AM
Cheers, Thanks for clarifiying it.
Thanks, We've just moved over from ASAs with SFR to Full FTDs, thus making sure we understand the packet flow. Also it doesnt help when we SNORT/DAQ/IPS get used to descripe the same process (sometimes).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide