{"id":1223,"date":"2022-02-03T14:32:58","date_gmt":"2022-02-03T11:32:58","guid":{"rendered":"https:\/\/wiki.volu-t.ru\/?p=1223"},"modified":"2022-02-03T14:33:27","modified_gmt":"2022-02-03T11:33:27","slug":"which-ips-rules-does-cisco-enable-on-your-firepower-system-think-you-know-youre-probably-wrong","status":"publish","type":"post","link":"https:\/\/wiki.m-network.ru\/?p=1223","title":{"rendered":"Which IPS Rules does Cisco Enable on your Firepower System? Think you know? You\u2019re probably wrong!"},"content":{"rendered":"\n<p>So, think you know what IPS rules are enabled on your Firepower system, and do you feel comfortable with Cisco\u2019s defaults and sleep well at night? This blog may just start keeping you up at night!<\/p>\n\n\n\n<p>A couple weeks ago I was training\/consulting at a very large school district outside of Columbus, Ohio. They have all 9300 NGFW\u2019s to cover hundreds of thousands of students, so I immediately got to work on tuning these already configured systems, which a consulting company installed for them. They called me because their 10Gig links were saturated and they couldn\u2019t find the problem, and also wanted additional training on their Firepower\/FTD systems.<\/p>\n\n\n\n<p>What I found upon arrival was the basic defaults of&nbsp;<strong>Balanced Security and Connectivity<\/strong>&nbsp;as their IPS policy, but worse, the consultants disabled the Security Intelligence (SI) completely saying it would bring down the network. That\u2019s not true obviously, and the SI was a quick fix.<\/p>\n\n\n\n<p><strong>Question:<\/strong>&nbsp;Was their network secure because they had Cisco Firepower 6.3 code and the Cisco recommended IPS rules enabled on their systems? is&nbsp;<em>your<\/em>&nbsp;network secure by being configured this same way?<\/p>\n\n\n\n<p>Let\u2019s start by answering that question, and then I\u2019ll circle back to how a Cisco FTD 9300 was brought to it\u2019s knees (Never seen that before!), and how I solved this customers issues.<\/p>\n\n\n\n<p>If you follow Cisco\u2019s recommendations, your system will have both the IPS and NAP policies set to&nbsp;<strong>Balanced Security and Connectivity<\/strong>. Sounds reasonable, but will it protect you? Let\u2019s take a look:<\/p>\n\n\n\n<p>First, create a policy, and then choose to Create and Edit Policy:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"458\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/create-IPS-1024x458.jpg\" alt=\"\" class=\"wp-image-1224\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/create-IPS-1024x458.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/create-IPS-300x134.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/create-IPS-768x343.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/create-IPS-150x67.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/create-IPS.jpg 1094w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Notice the Drop when Inline and the default Base Policy. When you\u2019re first bringing up your system, the IPS policy needs to be tuned. I typically disable the Drop when Inline checkbox so the rules can be tweaked for the environment without dropping any traffic in the meantime. After a period of time (different for each network), I\u2019ll enable the Drop when Inline and start dropping the bad traffic. However, let\u2019s just concentrate on the Base Policy shown.<\/p>\n\n\n\n<p>To understand what this does, start by going into your IPS police(s), scroll down to the Cisco base policy, then click on Rules:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" width=\"619\" height=\"679\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/scroll-down.jpg\" alt=\"\" class=\"wp-image-1225\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/scroll-down.jpg 619w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/scroll-down-273x300.jpg 273w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/scroll-down-137x150.jpg 137w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/scroll-down-300x329.jpg 300w\" sizes=\"(max-width: 619px) 100vw, 619px\" \/><\/figure>\n\n\n\n<p>Now open the Rule Content in the Rule accordion and\u00a0scroll down to\u00a0<strong>Rule Overhead<\/strong>\u00a0as shown:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" width=\"1023\" height=\"720\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/rule-overhead-1.jpg\" alt=\"\" class=\"wp-image-1226\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rule-overhead-1.jpg 1023w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rule-overhead-1-300x211.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rule-overhead-1-768x541.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rule-overhead-1-150x106.jpg 150w\" sizes=\"(max-width: 1023px) 100vw, 1023px\" \/><\/figure>\n\n\n\n<p>What the arrows show is which rules are enabled by default with each policy \u2013 click on each Overhead (Low, Medium, High, and Very High) to see which are enabled and disabled. &nbsp;I am not making this up, Cisco\u2019s way of choosing which rules are enabled is&nbsp;<em>only<\/em>&nbsp;decided by&nbsp;<strong>Rule Overhead<\/strong>. They should just change the Overhead names from Low to&nbsp;<strong>Connectivity over Security<\/strong>, from Medium to&nbsp;<strong>Balanced Security and Connectivity<\/strong>, and High to S<strong>ecurity Over Connectivity,<\/strong>&nbsp;and make it easier on us. (reality check here: it\u2019s unlikely they use overhead only to make a rule determination, but there is no documentation to say otherwise [yet], so here we are).<\/p>\n\n\n\n<p>For example, and to demonstrate what I am saying; if you choose the useless\u00a0<strong>Connectivity over Security<\/strong>\u00a0base policy, then only the\u00a0<strong>Low Overhead<\/strong>\u00a0rules are enabled as shown below, or about 500 rules, with all other 35,000+ rules disabled:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"310\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/low-overhead-1024x310.jpg\" alt=\"\" class=\"wp-image-1227\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/low-overhead-1024x310.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/low-overhead-300x91.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/low-overhead-768x232.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/low-overhead-1536x465.jpg 1536w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/low-overhead-150x45.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/low-overhead.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Next, the default of\u00a0<strong>Balanced Security and Connectivity<\/strong>\u00a0enables the<strong>\u00a0Low\u00a0<em>and<\/em>\u00a0Medium Overhead\u00a0<\/strong>rules, which\u00a0again, is Cisco\u2019s recommendation. Add up the Low and Medium Overhead rules, that is the amount of rules enabled. Period.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"354\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/balanced-total-rules-1024x354.jpg\" alt=\"\" class=\"wp-image-1228\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/balanced-total-rules-1024x354.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/balanced-total-rules-300x104.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/balanced-total-rules-768x266.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/balanced-total-rules-150x52.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/balanced-total-rules.jpg 1136w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>With\u00a0<strong>Balanced Security and Connectivity<\/strong>, the High and Very High Overhead rules are all disabled.<\/p>\n\n\n\n<p>Now understand that f you choose the\u00a0<strong>Security over Connectivity\u00a0<\/strong>policy, then the Low, Medium, and High rules are enabled, which gives us now 15,493 enabled rules (in this example).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"313\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/SoC-1024x313.jpg\" alt=\"\" class=\"wp-image-1230\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/SoC-1024x313.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/SoC-300x92.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/SoC-768x235.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/SoC-150x46.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/SoC.jpg 1263w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>However, none of the three policies I\u2019ve mentioned would ever enable a<strong>\u00a0Very High<\/strong>\u00a0overhead rules, which means that 21,498 rules are disabled by default.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"241\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-1024x241.jpg\" alt=\"\" class=\"wp-image-1231\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-1024x241.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-300x71.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-768x181.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-1536x361.jpg 1536w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-2048x482.jpg 2048w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-150x35.jpg 150w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If you double click on any of these disabled rules, you can see they are Very High overhead<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" width=\"300\" height=\"88\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-300x88-1.jpg\" alt=\"\" class=\"wp-image-1232\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-300x88-1.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/very-high-disabled-300x88-1-150x44.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure>\n\n\n\n<p>So if you are using the default IPS policy, you\u2019ll then ask yourself: \u201cBut what about this zero day attack that is occurring, and Cisco IPS rules just downloaded automatically; these important rules must be enabled by Cisco, so I am safe and secure, yes?\u201d No, not unless all the rules imported are\u00a0<strong>Low and Medium Overhead<\/strong>. The\u00a0<strong>High and Very High Overhead<\/strong>\u00a0rules are imported to your system, but they are disabled by default, even if the rules are all-so-important!<\/p>\n\n\n\n<h3><strong>So, how many rules do you have&nbsp;available?<\/strong><\/h3>\n\n\n\n<p>You can see the amount of rules on your system by going to the Rules option (click any of them) in any policy with no filter, which is 37,426 in this example:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"243\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/rules-rules-ruls-1024x243.jpg\" alt=\"\" class=\"wp-image-1233\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rules-rules-ruls-1024x243.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rules-rules-ruls-300x71.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rules-rules-ruls-768x182.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rules-rules-ruls-1536x365.jpg 1536w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rules-rules-ruls-150x36.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/rules-rules-ruls.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>By looking at the IPS policy summary, I have 10,514 rules enabled by default (the amount of low and medium overhead rules found on the systems). This means over 25,000 rules are disabled.&nbsp;Cisco\u2019s reasoning for this default recommendation is that you need low latency. True, but my customer had $1.2M dollar NGFW\u2019s that can easily handle tens of thousands of rules enabled! Even with 2110\u2019s you can enable thousands more and be just fine.<\/p>\n\n\n\n<p>You may be saying \u201cWell Cisco knows what they are doing, and if they never enable a Very High Overhead rule, then neither shall I.\u201d<\/p>\n\n\n\n<p>Let\u2019s go take a look at something. Shown here is a Rule update that came into my FMC (Rules are released twice a week \u2013 Tuesdays and Thursdays, so on Wednesday and Friday mornings you should be checking these!).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"294\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/new-iups-download-1024x294.jpg\" alt=\"\" class=\"wp-image-1234\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/new-iups-download-1024x294.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/new-iups-download-300x86.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/new-iups-download-768x220.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/new-iups-download-1536x441.jpg 1536w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/new-iups-download-150x43.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/new-iups-download.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In this example, seven rules changed, and 35 rules were added. Seems that if Cisco added these, they might be important. So why are the first four rules here disabled? Because they are not important? No, they are very important, they are just&nbsp;<strong>Very High Overhead<\/strong>.<\/p>\n\n\n\n<p>Is your network better off with&nbsp;<strong>Security over Connectivity<\/strong>&nbsp;as a base policy? Sure, but it can still be better. \u201cCan I just forget about it then\u201d, you ask? No, but you probably will, as most of my customers do. It\u2019s better to go in twice a week and look for the new downloaded rules and enable the&nbsp;<strong>Very High<\/strong>&nbsp;overhead rules you think are needed for your network. But again, most of my customers only do this for a few weeks after I leave; just like when you go to the gym the first two weeks of January\u2026you mean to go back to the gym, but hey, you\u2019re busy!<\/p>\n\n\n\n<h3><strong>Can My System Handle Security Over Connectivity (SoC)?<\/strong><\/h3>\n\n\n\n<p>There is a&nbsp;<strong><em>caveat<\/em><\/strong>&nbsp;here. If you have xx40\/50 (or the new 41\u00d75\u2019s!) or even 9300, enabling another 5-6000 rules going from Balanced policy to&nbsp;<strong>Security over Connectivity (SoC)<\/strong>&nbsp;should not cause you any issues, but maybe you just don\u2019t feel comfortable changing from Cisco\u2019s recommended settings because you know you\u2019ll never login and check it.<\/p>\n\n\n\n<p>Regardless, there may be a use-case for enabling the larger number of rules for a short time on any system without stressing or losing sleep, just to verify your data, then set it back to Balanced if you feel this will lower your stress level.<\/p>\n\n\n\n<p>Understand that enabling a very large amount of rules for the long term may not be a good idea as you may see many of these rules ignored due to PPM (packet latency). This can be found in the\u00a0<strong>Advanced tab of your ACP<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"444\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/advanced-tab-1024x444.jpg\" alt=\"\" class=\"wp-image-1235\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/advanced-tab-1024x444.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/advanced-tab-300x130.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/advanced-tab-768x333.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/advanced-tab-1536x665.jpg 1536w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/advanced-tab-150x65.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/advanced-tab.jpg 1886w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Since the PPM will make sure you don\u2019t have latency when you enable more rules, why not just turn all the rules on? Because you will not get complete inspection, that\u2019s the key.&nbsp; You think you\u2019re getting better inspection but in fact, Snort is bypassing traffic to keep the latency low. Keep this in mind, especially when using lower power systems.<\/p>\n\n\n\n<p><strong>Important TIP!<\/strong>&nbsp;Lastly regarding enabling more rules:I always tell my customers that if you want to enable rules manually, that\u2019s great! &nbsp;But, you also need a regular process, maybe once every 6 months, where you go back and disable the rules you don\u2019t need anymore.<\/p>\n\n\n\n<h3><strong>What about Firepower&nbsp;Recommendations?<\/strong><\/h3>\n\n\n\n<p>So, if you use Firepower recommendations, first make sure your FTD box is North-South traffic (or don\u2019t use this at all!) or Firepower will probably disable most of \u00a0your rules. To match your SoC policy go to the Advanced configuration and move the slider bar to High, so that the<strong>\u00a0Low, Medium\u00a0<em>and<\/em>\u00a0High Overhead<\/strong>\u00a0rules will be enabled, because as usual, only the Low and Medium rules are enabled with Firepower.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"520\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/recomendations-1024x520.jpg\" alt=\"\" class=\"wp-image-1236\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/recomendations-1024x520.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/recomendations-300x152.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/recomendations-768x390.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/recomendations-1536x780.jpg 1536w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/recomendations-150x76.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/recomendations.jpg 1609w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Although you can still make your network more secure, this is still a lot better than the defaults.<\/p>\n\n\n\n<h3><strong>But There is Still One More Setting: MAXIMUM DETECTION<\/strong><\/h3>\n\n\n\n<p>I know this is a long post, and most of the people will never read this far, but if you did, you might as well keep going now!<\/p>\n\n\n\n<p>The mostly unused&nbsp;<strong>Maximum Detection<\/strong>&nbsp;is an odd bird and must be tested on your network with the Drop while Inline disabled for a quite a while.<\/p>\n\n\n\n<p>(<strong>UPDATE<\/strong>: This rule was update 5\/2\/19 and now has about 28k rules enabled, so I need to do a blog on just this policy soon)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"310\" src=\"https:\/\/wiki.volu-t.ru\/wp-content\/uploads\/2022\/02\/maximum-1024x310.jpg\" alt=\"\" class=\"wp-image-1237\" srcset=\"https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/maximum-1024x310.jpg 1024w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/maximum-300x91.jpg 300w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/maximum-768x232.jpg 768w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/maximum-150x45.jpg 150w, https:\/\/wiki.m-network.ru\/wp-content\/uploads\/2022\/02\/maximum.jpg 1320w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This policy is the only one that enables&nbsp;<em>some<\/em>&nbsp;<strong>Very High Overhead<\/strong>&nbsp;rules; 5784 to be exact (as of this writing). However, it disables thousands of&nbsp;<strong>High Overhead<\/strong>&nbsp;rules that would normally be enabled with&nbsp;<strong>Security over Connectivity<\/strong>. I\u2019ve never used this policy in production, nor do I know any customers that have, but again, you can use this, but &nbsp;just test it \u2013 and then please let me know what happens!<\/p>\n\n\n\n<h3><strong>Saturated 9300<\/strong><\/h3>\n\n\n\n<p>Lastly, what about my customer in Ohio and the 9300 that was brought to its knees? Yes, once we moved the IPS policy to a base of&nbsp;<strong>Security over Connectivity<\/strong>, we found the problems they were having quickly. The IPS events started triggering about 6000 hits a minute after we deployed, and the CPU on the 9300 spiked to over 80% as it was trying to process all the IPS events. That\u2019s a LOT of high overhead events to do that to a 9300! The FTD 9300 was no longer passing data\u2026<strong>wow<\/strong>, not only have I never seen this, I\u2019ve never even heard of this!<\/p>\n\n\n\n<p>After we were able to do some analysis on the new IPS events (which got to over 100,000 in just a few minutes!), I had to verify these weren\u2019t false positives and then find the culprits. Drilling down, we found that their entire server farm was infested heavily with CnC\u2019s, and only the High Overhead rules found these CnC\u2019s. Those attacks were so well drilled into these servers, they each had thousands of connections, which would explain the bandwidth issue!&nbsp;We immediately started blacklisting these servers and the CPU percentage dropped to less than 10%, and the bandwidth saturation went from 80% to less than 20%!<\/p>\n\n\n\n<p>The customer feared that they had these attacks on their systems for possibly years\u2026.and what found them? It wasn\u2019t the Cisco default settings\u2026<\/p>\n\n\n\n<p>The customer had some serious issues on their servers to fix, but my job here was done.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>\u041e\u0440\u0438\u0433\u0438\u043d\u0430\u043b https:\/\/www.lammle.com\/post\/which-ips-rules-does-cisco-enable-on-your-firepower-system-think-you-know-youre-probably-wrong\/<a href=\"https:\/\/www.lammle.com\/wp-content\/uploads\/2019\/04\/maximum.jpg\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So, think you know what IPS rules are enabled on your Firepower system, and do you feel comfortable with Cisco\u2019s defaults and sleep well at night? This blog may just start keeping you up at night! A couple weeks ago I was training\/consulting at a very large school district outside of Columbus, Ohio. They have ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/wiki.m-network.ru\/?p=1223\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[205,210,208],"tags":[],"_links":{"self":[{"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=\/wp\/v2\/posts\/1223"}],"collection":[{"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1223"}],"version-history":[{"count":2,"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=\/wp\/v2\/posts\/1223\/revisions"}],"predecessor-version":[{"id":1239,"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=\/wp\/v2\/posts\/1223\/revisions\/1239"}],"wp:attachment":[{"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wiki.m-network.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}