Snort3 Configuration Guide v70

Download as pdf or txt
Download as pdf or txt
You are on page 1of 90
At a glance
Powered by AI
The document discusses Snort inspection engine, network analysis policies, intrusion policies and custom policies.

Snort is an open source intrusion prevention and detection system. It examines traffic using network analysis policies for decoding/preprocessing and intrusion policies for rule selection.

Network analysis policies handle decoding, normalizing and preprocessing of traffic. Intrusion policies select rules to inspect traffic and generate intrusion events.

Firepower Management Center Snort 3 Configuration Guide, Version

7.0
First Published: 2021-05-26

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.

All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.

Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2021 Cisco Systems, Inc. All rights reserved.
CONTENTS

CHAPTER 1 An Overview of Network Analysis and Intrusion Policies 1

Network Analysis and Intrusion Policy Basics 1


Snort Inspection Engine 2
Snort 3 2

How Policies Examine Traffic For Intrusions 4


Decoding, Normalizing, and Preprocessing: Network Analysis Policies 5
Access Control Rules: Intrusion Policy Selection 6
Intrusion Inspection: Intrusion Policies, Rules, and Variable Sets 6
Intrusion Event Generation 8
System-Provided and Custom Network Analysis and Intrusion Policies 8
System-Provided Network Analysis and Intrusion Policies 9
Benefits of Custom Network Analysis and Intrusion Policies 10
Benefits of Custom Network Analysis Policies 11
Benefits of Custom Intrusion Policies 12
Limitations of Custom Policies 12
License Requirements for Network Analysis and Intrusion Policies 15
Requirements and Prerequisites for Network Analysis and Intrusion Policies 15

CHAPTER 2 Migrating from Snort 2 to Snort 3 17

Snort 2 versus Snort 3 17

Feature Limitations of Snort 3 for FMC-Managed FTD 18


Migrating from Snort 2 to Snort 3 19

Conversion Tool for Snort 2 Custom Rules 19


Enable and Disable Snort 3 19

Enabling and Disabling Snort 3 on an Individual Device 20


Enabling and Disabling Snort 3 on Multiple Devices 20

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


iii
Contents

Viewing Snort 2 and Snort 3 Base Policy Mapping 21


Synchronize Snort 2 Rules with Snort 3 21

PART I Intrusion Detection and Prevention in Snort 3 23

CHAPTER 3 Getting Started with Snort 3 Intrusion Policies 25

Intrusion Policy Basics 25


License Requirements for Intrusion Policies 26
Requirements and Prerequisites for Intrusion Policies 27
Creating a Custom Snort 3 Intrusion Policy 27

Editing Snort 3 Intrusion Policies 28


Changing the Base Policy of an Intrusion Policy 30
Changing the Inspection Mode of an Intrusion Policy for Both Snort 2 and Snort 3 Versions 30
Managing Intrusion Policies 31
Access Control Rule Configuration to Perform Intrusion Prevention 32
Access Control Rule Configuration and Intrusion Policies 32
Configuring an Access Control Rule to Perform Intrusion Prevention 32
Deploy Configuration Changes 33

CHAPTER 4 Tuning Intrusion Policies Using Rules 35

Intrusion Rule Tuning Basics 35


Intrusion Rule Types 36
License Requirements for Intrusion Rules 37
Requirements and Prerequisites for Intrusion Rules 37
Custom Rules in Snort 3 37

Viewing Snort 3 Intrusion Rules in an Intrusion Policy 38


Intrusion Rule Action 38
Intrusion Rule Action Options 38
Setting Intrusion Rule Action 39
Intrusion Event Notification Filters in an Intrusion Policy 40
Intrusion Event Thresholds 40
Intrusion Event Thresholds Configuration 40
Setting Threshold for an Intrusion Rule in Snort 3 42

Viewing and Deleting Intrusion Event Thresholds 42

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


iv
Contents

Intrusion Policy Suppression Configuration 43


Intrusion Policy Suppression Types 43
Setting Suppression for an Intrusion Rule in Snort 3 43

Viewing and Deleting Suppression Conditions 44


Adding Intrusion Rule Comments 44
Converting Snort 2 Custom Rules to Snort 3 45

Converting all Snort 2 Custom Rules across all Intrusion Policies to Snort 3 45

Converting Snort 2 Custom Rules of a Single Intrusion Policy to Snort 3 45

Uploading Custom Rules 46


Adding Rule Groups with Custom Rules to an Intrusion Policy 47
Managing Custom Rules in Snort 3 48

Deleting Custom Rules 48


Deleting Rule Groups 49

CHAPTER 5 Tailoring Intrusion Protection to Your Network Assets 51

Snort 3 Rule Changes in LSP Updates 51

About Firepower Recommended Rules 51


Generating and Applying Firepower Recommendations in Snort 3 52

PART II Advanced Network Analysis in Snort 3 55

CHAPTER 6 Getting Started with Network Analysis Policies 57

Network Analysis Policy Basics 57


License Requirements for Network Analysis Policies 58
Requirements and Prerequisites for Network Analysis Policies 58
Managing Network Analysis Policies 58
Snort 3 Definitions and Terminologies for Network Analysis Policy 59
Custom Network Analysis Policy Creation for Snort 3 61

Network Analysis Policy Mapping 65


View Network Analysis Policy Mapping 65
Create a Network Analysis Policy 66
Modify the Network Analysis Policy 66
Search for an Inspector on the Network Analysis Policy Page 66
Copy the Inspector Configuration 67

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


v
Contents

Customize the Network Analysis Policy 67


Make Inline Edit for an Inspector to Override Configuration 70
Revert Unsaved Changes during Inline Edits 71

View the List of Inspectors with Overrides 72


Revert Overridden Configuration to Default Configuration 72
Examples of Custom Network Analysis Policy Configuration 73
Network Analysis Policy Settings and Cached Changes 84

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


vi
CHAPTER 1
An Overview of Network Analysis and Intrusion
Policies
The following topics provide an overview of the Snort inspection engine, and the network analysis and intrusion
policies:
• Network Analysis and Intrusion Policy Basics, on page 1
• Snort Inspection Engine, on page 2
• Snort 3, on page 2
• How Policies Examine Traffic For Intrusions, on page 4
• System-Provided and Custom Network Analysis and Intrusion Policies, on page 8
• License Requirements for Network Analysis and Intrusion Policies, on page 15
• Requirements and Prerequisites for Network Analysis and Intrusion Policies, on page 15

Network Analysis and Intrusion Policy Basics


Network analysis and intrusion policies work together as part of the Firepower System’s intrusion detection
and prevention feature.
• The term intrusion detection generally refers to the process of passively monitoring and analyzing network
traffic for potential intrusions and storing attack data for security analysis. This is sometimes referred to
as "IDS."
• The term intrusion prevention includes the concept of intrusion detection, but adds the ability to block
or alter malicious traffic as it travels across your network. This is sometimes referred to as "IPS."

In an intrusion prevention deployment, when the system examines packets:


• A network analysis policy governs how traffic is decoded and preprocessed so it can be further evaluated,
especially for anomalous traffic that might signal an intrusion attempt.
• An intrusion policy uses intrusion and preprocessor rules (sometimes referred to collectively as intrusion
rules) to examine the decoded packets for attacks based on patterns. Intrusion policies are paired with
variable sets, which allow you to use named values to accurately reflect your network environment.

Both network analysis and intrusion policies are invoked by a parent access control policy, but at different
times. As the system analyzes traffic, the network analysis (decoding and preprocessing) phase occurs before
and separately from the intrusion prevention (additional preprocessing and intrusion rules) phase. Together,

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


1
An Overview of Network Analysis and Intrusion Policies
Snort Inspection Engine

network analysis and intrusion policies provide broad and deep packet inspection. They can help you detect,
alert on, and protect against network traffic that could threaten the availability, integrity, and confidentiality
of hosts and their data.
The Firepower System is delivered with several similarly named network analysis and intrusion policies (for
example, Balanced Security and Connectivity) that complement and work with each other. By using
system-provided policies, you can take advantage of the experience of the Cisco Talos Intelligence Group
(Talos). For these policies, Talos sets intrusion and inspector rule states, as well as provides the initial
configurations for inspectors and other advanced settings.
You can also create custom network analysis and intrusion policies. You can tune settings in custom policies
to inspect traffic in the way that matters most to you so that you can improve both the performance of your
managed devices and your ability to respond effectively to the events they generate.
You create, edit, save, and manage network analysis and intrusion policies using similar policy editors in the
web interface. When you are editing either type of policy, a navigation panel appears on the left side of the
web interface; the right side displays various configuration pages.

Snort Inspection Engine


The Snort inspection engine is an integral part of the Firepower Threat Defense device. The inspection engine
analyzes traffic in real time to provide deep packet inspection. Network analysis and intrusion policies together
utilize the Snort inspection engine's capabilities to detect and protect against intrusions.

Snort 3
Snort 3 is the latest version of the Snort inspection engine, which has vast improvements compared to the
earlier version of Snort. The older version of Snort is Snort 2. Snort 3 is more efficient, and it provides better
performance and scalability.
Snort 3 is architecturally redesigned to inspect more traffic with equivalent resources when compared to Snort
2. Snort 3 provides simplified and flexible insertion of traffic parsers. Snort 3 also provides new rule syntax
that makes rule writing easier and shared object rule equivalents visible.
The other significant changes with Snort 3 are:
• Unlike Snort 2, which uses multiple Snort instances, Snort 3 associates multiple threads with a single
Snort instance. This uses less memory, improves Snort reload times, and supports more intrusion rules
and a larger network map. The number of Snort threads varies by platform and is the same as the number
of Snort 2 instances for each platform. Usage is virtually transparent.
• Snort version per Firepower Threat Defense—The Snort inspection engine is Firepower Threat Defense
(FTD) specific and not Firepower Management Center (FMC) specific. FMC can manage several FTDs,
each with either versions of Snort (Snort 2 and Snort 3). Although the FMC's intrusion policies are unique,
the system applies Snort 2 or Snort 3 version of an intrusion policy for intrusion protection depending
on the device's selected inspection engine. For more information on the inspection engine on the device,
see Enable and Disable Snort 3, on page 19.
• Decoder rules—Packet decoder rules fire only in the default intrusion policy. The system ignores decoder
rules that you enable in other policies.
• Shared object rules—Snort 3 supports some but not all shared object (SO) intrusion rules (rules with a
generator ID (GID) of 3). Enabled shared object rules that are not supported do not trigger.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


2
An Overview of Network Analysis and Intrusion Policies
Snort 3

• Multi-layer inspection for Security Intelligence—Snort 2 inspects two layers in multi-layer traffic. Snort
3 detects the innermost IP address regardless of the layer.
• Version support—Snort 3 is supported only on FTDs of version 7.0 and above.
• Managed Devices—An FMC with version 7.0 can simultaneously support version 6.4, 6.5, 6.6, 6.7,and
7.0 Snort 2 FTDs, and version 7.0 Snort 3 FTDs.
• Traffic interruption when switching Snort versions—Switching Snort versions interrupts traffic inspection
and a few packets might drop during deployment.
• Unified policies—Irrespective of the underlying Snort engine version that is enabled in the managed
FTDs, the access control policies, intrusion policies, and network access policies configured in the FMC
work seamlessly in applying the policies. All intrusion policies in FMC version 7.0 and above have two
versions available, Snort 2 version and Snort 3 version. The intrusion policy is unified in the sense that
it bears a unique name, base policy, and inspection mode, although there are two versions of the policy
(Snort 2 version and Snort 3 version). The Snort 2 and the Snort 3 versions of the intrusion policy can
be different in terms of the rule settings. However, when the intrusion policy is applied on a device, the
system automatically identifies the Snort version enabled on the device and applies the rule settings
configured for that version.
• Lightweight Security Package (LSP)—Replaces the SRU for Snort 3 next-generation intrusion rule and
configuration updates. Downloading updates downloads both the Snort 3 LSP and the Snort 2 SRU.
LSP updates provide new and updated intrusion rules and inspector rules, modified states for existing
rules, and modified default intrusion policy settings for FMC and FTD versions 7.0 or above. When you
upgrade an FMC from version 6.7 or lower to 7.0, it supports both LSPs and SRUs. LSP updates may
also delete system-provided rules, provide new rule categories and default variables, and modify default
variable values. For more information on LSP updates, see the Update Intrusion Rules topic in the latest
version of the Firepower Management Center Configuration Guide.
• Mapping of Snort 2 and Snort 3 rules and presets—Snort 2 and Snort 3 rules are mapped and the mapping
is system-provided. However, it is not a one-to-one mapping. The system-provided intrusion base policies
are pre-configured for both Snort 2 and Snort 3, and they provide the same intrusion prevention although
with different rule sets. The system-provided base policies for Snort 2 and Snort 3 are mapped with each
other for the same intrusion prevention settings. For more information, see Viewing Snort 2 and Snort
3 Base Policy Mapping, on page 21.
• Synchronizing Snort 2 and Snort 3 rule override—When an FTD is upgraded to 7.0, you can upgrade
the inspection engine of the FTD to the Snort 3 version. FMC maps all the overrides in the existing rules
of the Snort 2 version of the intrusion policies to the corresponding Snort 3 rules using the mapping
provided by Talos. However, if there are additional overrides performed after the upgrade or if you have
installed a new FTD of version 7.0, they have to be manually synchronized. For more information, see
Synchronize Snort 2 Rules with Snort 3 , on page 21.
• Custom intrusion rules—You can create custom intrusion rules in Snort 3. You can also import the custom
intrusion rules that exist for Snort 2 to Snort 3. For more information, see Custom Rules in Snort 3, on
page 37.
• Rule groups—FMC groups the Snort 3 rules that are a part of the system-provided base policies into rule
groups. Rule groups are logical groups of rules which provide an easy management interface to enhance
rule accessibility, rule navigation, and a better control over the rule group security level.
• Switching between Snort 2 and Snort 3 engines—FTDs that support Snort3 can also support Snort 2.
Switching from Snort 3 to Snort 2 is not recommended from the efficacy perspective. However, if a
switch is necessary, follow the instructions in Enable and Disable Snort 3, on page 19.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


3
An Overview of Network Analysis and Intrusion Policies
How Policies Examine Traffic For Intrusions

Important Although you can switch Snort versions freely, intrusion rule changes in one
version of Snort will not be updated in the other version automatically. If you
change the rule action for a rule in one version of Snort, ensure you replicate the
change in the other version before switching the Snort version. System provided
synchronization option only synchronizes the changes in the Snort 2 version of
the intrusion policy to the Snort 3 version, and not the other way around.

How Policies Examine Traffic For Intrusions


When the system analyzes traffic as part of your access control deployment, the network analysis (decoding
and preprocessing) phase occurs before and separately from the intrusion prevention (intrusion rules and
advanced settings) phase.
The following diagram shows, in a simplified fashion, the order of traffic analysis in an inline, intrusion
prevention and AMP for Networks deployment. It illustrates how the access control policy invokes other
policies to examine traffic, and in which order those policies are invoked. The network analysis and intrusion
policy selection phases are highlighted.

In an inline deployment (that is, where relevant configurations are deployed to devices using routed, switched,
or transparent interfaces, or inline interface pairs), the system can block traffic without further inspection at
almost any step in the illustrated process. Security Intelligence, the SSL policy, network analysis policies, file
policies, and intrusion policies can all either drop or modify traffic. Only the network discovery policy, which
passively inspects packets, cannot affect the flow of traffic.
Similarly, at each step of the process, a packet could cause the system to generate an event. Intrusion and
preprocessor events (sometimes referred to collectively as intrusion events) are indications that a packet or
its contents may represent a security risk.

Tip The diagram does not reflect that access control rules handle encrypted traffic when your SSL inspection
configuration allows it to pass, or if you do not configure SSL inspection. By default, the system disables
intrusion and file inspection of encrypted payloads. This helps reduce false positives and improve performance
when an encrypted connection matches an access control rule that has intrusion and file inspection configured.

Note that for a single connection, although the system selects a network analysis policy before an access
control rule as shown in the diagram, some preprocessing (notably application layer preprocessing) occurs

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


4
An Overview of Network Analysis and Intrusion Policies
Decoding, Normalizing, and Preprocessing: Network Analysis Policies

after access control rule selection. This does not affect how you configure preprocessing in custom network
analysis policies.

Decoding, Normalizing, and Preprocessing: Network Analysis Policies


Without decoding and preprocessing, the system could not appropriately evaluate traffic for intrusions because
protocol differences would make pattern matching impossible. Network analysis policies govern these
traffic-handling tasks:
• after traffic is filtered by Security Intelligence
• after encrypted traffic is decrypted by an optional SSL policy
• before traffic can be inspected by file or intrusion policies

A network analysis policy governs packet processing in phases. First the system decodes packets through the
first three TCP/IP layers, then continues with normalizing, preprocessing, and detecting protocol anomalies:
• The packet decoder converts packet headers and payloads into a format that can be easily used by the
inspectors and later, intrusion rules. Each layer of the TCP/IP stack is decoded in turn, beginning with
the data link layer and continuing through the network and transport layers. The packet decoder also
detects various anomalous behaviors in packet headers.
• In inline deployments, the inline normalization preprocessor reformats (normalizes) traffic to minimize
the chances of attackers evading detection. It prepares packets for examination by other inspectors and
intrusion rules, and helps ensure that the packets the system processes are the same as the packets received
by the hosts on your network.
• Various network and transport layers inspectors detect attacks that exploit IP fragmentation, perform
checksum validation, and perform TCP and UDP session preprocessing.
Note that some advanced transport and network inspector settings apply globally to all traffic handled
by the target devices of an access control policy. You configure these in the access control policy rather
than in a network analysis policy.
• Various application-layer protocol decoders normalize specific types of packet data into formats that the
intrusion rules engine can analyze. Normalizing application-layer protocol encodings allows the system
to effectively apply the same content-related intrusion rules to packets whose data is represented differently,
and to obtain meaningful results.
• The Modbus, DNP3, CIP, and s7commplus SCADA inspectors detect traffic anomalies and provide data
to intrusion rules. Supervisory Control and Data Acquisition (SCADA) protocols monitor, control, and
acquire data from industrial, infrastructure, and facility processes such as manufacturing, production,
water treatment, electric power distribution, airport and shipping systems, and so on.
• Several inspectors allow you to detect specific threats, such as Back Orifice, portscans, SYN floods and
other rate-based attacks.
Note that you configure the sensitive data inspector, which detects sensitive data such as credit card
numbers and Social Security numbers in ASCII text, in intrusion policies.

In a newly created access control policy, one default network analysis policy governs preprocessing for all
traffic for all intrusion policies invoked by the same parent access control policy. Initially, the system uses
the Balanced Security and Connectivity network analysis policy as the default, but you can change it to another
system-provided or custom network analysis policy. In a more complex deployment, advanced users can tailor

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


5
An Overview of Network Analysis and Intrusion Policies
Access Control Rules: Intrusion Policy Selection

traffic preprocessing options to specific security zones, networks, and VLANs by assigning different custom
network analysis policies to preprocess matching traffic.

Access Control Rules: Intrusion Policy Selection


After initial preprocessing, access control rules (when present) evaluate traffic. In most cases, the first access
control rule that a packet matches is the rule that handles that traffic; you can monitor, trust, block, or allow
matching traffic.
When you allow traffic with an access control rule, the system can inspect the traffic for discovery data,
malware, prohibited files, and intrusions, in that order. Traffic not matching any access control rule is handled
by the access control policy’s default action, which can also inspect for discovery data and intrusions.

Note All packets, regardless of which network analysis policy preprocesses them, are matched to configured access
control rules—and thus are potentially subject to inspection by intrusion policies—in top-down order.

The diagram in How Policies Examine Traffic For Intrusions, on page 4 shows the flow of traffic through
a device in an inline, intrusion prevention and AMP for Networks deployment, as follows:
• Access Control Rule A allows matching traffic to proceed. The traffic is then inspected for discovery
data by the network discovery policy, for prohibited files and malware by File Policy A, and then for
intrusions by Intrusion Policy A.
• Access Control Rule B also allows matching traffic. However, in this scenario, the traffic is not inspected
for intrusions (or files or malware), so there are no intrusion or file policies associated with the rule. Note
that by default, traffic that you allow to proceed is inspected by the network discovery policy; you do
not need to configure this.
• In this scenario, the access control policy’s default action allows matching traffic. The traffic is then
inspected by the network discovery policy, and then by an intrusion policy. You can (but do not have
to) use a different intrusion policy when you associate intrusion policies with access control rules or the
default action.

The example in the diagram does not include any blocking or trusting rules because the system does not
inspect blocked or trusted traffic.

Intrusion Inspection: Intrusion Policies, Rules, and Variable Sets


You can use intrusion prevention as the system’s last line of defense before traffic is allowed to proceed to
its destination. Intrusion policies govern how the system inspects traffic for security violations and, in inline
deployments, can block or alter malicious traffic. The main function of intrusion policies is to manage which
intrusion and preprocessor rules are enabled and how they are configured.

Intrusion and Inspector Rules


An intrusion rule is a specified set of keywords and arguments that detects attempts to exploit vulnerabilities
on your network; the system uses an intrusion rule to analyze network traffic to check if it matches the criteria
in the rule. The system compares packets against the conditions specified in each rule and, if the packet data
matches all the conditions specified in a rule, the rule triggers.
The system includes the following types of rules created by Cisco Talos Intelligence Group (Talos):

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


6
An Overview of Network Analysis and Intrusion Policies
Intrusion Inspection: Intrusion Policies, Rules, and Variable Sets

• shared object intrusion rules, which are compiled and cannot be modified (except for rule header
information such as source and destination ports and IP addresses)
• standard text intrusion rules, which can be saved and modified as new custom instances of the rule.
• preprocessor rules, which are rules associated with inspectors and packet decoder detection options in
the network analysis policy. You cannot copy or edit inspector rules. Most inspector rules are disabled
by default; you must enable them to use inspectors to generate events and, in an inline deployment, drop
offending packets.

When the system processes packets according to an intrusion policy, first a rule optimizer classifies all activated
rules in subsets based on criteria such as: transport layer, application protocol, direction to or from the protected
network, and so on. Then, the intrusion rules engine selects the appropriate rule subsets to apply to each packet.
Finally, a multi-rule search engine performs three different types of searches to determine if the traffic matches
the rule:
• The protocol field search looks for matches in particular fields in an application protocol.
• The generic content search looks for ASCII or binary byte matches in the packet payload.
• The packet anomaly search looks for packet headers and payloads that, rather than containing specific
content, violate well-established protocols.

In a custom intrusion policy, you can tune detection by enabling and disabling rules, as well as by writing
and adding your own standard text rules. You can also use Firepower recommendations to associate the
operating systems, servers, and client application protocols detected on your network with rules specifically
written to protect those assets.

Note When there are insufficient packets to process specific traffic against a block rule, the system continues to
evaluate the remaining traffic against other rules. If any of the remaining traffic matches a rule which is set
to block, then the session is blocked. However, if the system analyses the remaining traffic to be passed, then
the traffic status shows pending on the rule which is stuck for want of complete packets.

Variable Sets
Whenever the system uses an intrusion policy to evaluate traffic, it uses an associated variable set. Most
variables in a set represent values commonly used in intrusion rules to identify source and destination IP
addresses and ports. You can also use variables in intrusion policies to represent IP addresses in rule
suppressions and dynamic rule states.
The system provides a single default variable set, which is comprised of predefined default variables. Most
system-provided shared object rules and standard text rules use these predefined default variables to define
networks and port numbers. For example, the majority of the rules use the variable $HOME_NET to specify the
protected network and the variable $EXTERNAL_NET to specify the unprotected (or outside) network. In addition,
specialized rules often use other predefined variables. For example, rules that detect exploits against web
servers use the $HTTP_SERVERS and $HTTP_PORTS variables.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


7
An Overview of Network Analysis and Intrusion Policies
Intrusion Event Generation

Tip Even if you use system-provided intrusion policies, Cisco strongly recommends that you modify key default
variables in the default set. When you use variables that accurately reflect your network environment, processing
is optimized and the system can monitor relevant systems for suspicious activity. Advanced users can create
and use custom variable sets for pairing with one or more custom intrusion policies.

Intrusion Event Generation


When the system identifies a possible intrusion, it generates an intrusion or preprocessor event (sometimes
collectively called intrusion events). Managed devices transmit their events to the Firepower Management
Center, where you can view the aggregated data and gain a greater understanding of the attacks against your
network assets. In an inline deployment, managed devices can also drop or replace packets that you know to
be harmful.
Each intrusion event in the database includes an event header and contains information about the event name
and classification; the source and destination IP addresses; ports; the process that generated the event; and
the date and time of the event, as well as contextual information about the source of the attack and its target.
For packet-based events, the system also logs a copy of the decoded packet header and payload for the packet
or packets that triggered the event.
The packet decoder, the preprocessors, and the intrusion rules engine can all cause the system to generate an
event. For example:
• If the packet decoder (configured in the network analysis policy) receives an IP packet that is less than
20 bytes, which is the size of an IP datagram without any options or payload, the decoder interprets this
as anomalous traffic. If, later, the accompanying decoder rule in the intrusion policy that examines the
packet is enabled, the system generates a inspector event.
• If the IP defragmentation preprocessor encounters a series of overlapping IP fragments, the inspector
interprets this as a possible attack and, when the accompanying inspector rule is enabled, the system
generates a inspector event.
• Within the intrusion rules engine, most standard text rules and shared object rules are written so that they
generate intrusion events when triggered by packets.

As the database accumulates intrusion events, you can begin your analysis of potential attacks. The system
provides you with the tools you need to review intrusion events and evaluate whether they are important in
the context of your network environment and your security policies.

System-Provided and Custom Network Analysis and Intrusion


Policies
Creating a new access control policy is one of the first steps in managing traffic flow using the Firepower
System. By default, a newly created access control policy invokes system-provided network analysis and
intrusion policies to examine traffic.
The following diagram shows how a newly created access control policy in an inline, intrusion-prevention
deployment initially handles traffic. The preprocessing and intrusion prevention phases are highlighted.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


8
An Overview of Network Analysis and Intrusion Policies
System-Provided Network Analysis and Intrusion Policies

Note how:
• A default network analysis policy governs the preprocessing of all traffic handled by the access control
policy. Initially, the system-provided Balanced Security and Connectivity network analysis policy is the
default.
• The default action of the access control policy allows all non-malicious traffic, as determined by the
system-provided Balanced Security and Connectivity intrusion policy. Because the default action allows
traffic to pass, the discovery feature can examine it for host, application, and user data before the intrusion
policy can examine and potentially block malicious traffic.
• The policy uses default Security Intelligence options (global Block and Do Not Block lists only), does
not decrypt encrypted traffic with an SSL policy, and does not perform special handling and inspection
of network traffic using access control rules.

A simple step you can take to tune your intrusion prevention deployment is to use a different set of
system-provided network analysis and intrusion policies as your defaults. Cisco delivers several pairs of these
policies with the Firepower System.
Or, you can tailor your intrusion prevention deployment by creating and using custom policies. You may find
that the inspector options, intrusion rule, and other advanced settings configured in those policies do not
address the security needs of your network. By tuning your network analysis and intrusion policies you can
configure, at a very granular level, how the system processes and inspects the traffic on your network for
intrusions.

System-Provided Network Analysis and Intrusion Policies


Cisco delivers several pairs of network analysis and intrusion policies with the Firepower System. By using
system-provided network analysis and intrusion policies, you can take advantage of the experience of the
Cisco Talos Intelligence Group (Talos). For these policies, Talos provides intrusion and inspector rule states
as well as initial configurations for inspectors and other advanced settings.
No system-provided policy covers every network profile, traffic mix, or defensive posture. Each covers
common cases and network setups that provide a starting point for a well-tuned defensive policy. Although
you can use system-provided policies as-is, Cisco strongly recommends that you use them as the base for
custom policies that you tune to suit your network.

Tip Even if you use system-provided network analysis and intrusion policies, you should configure the system’s
intrusion variables to accurately reflect your network environment. At a minimum, modify key default variables
in the default set.

As new vulnerabilities become known, Talos releases intrusion rule updates also known as Lightweight Security
Package (LSP). These rule updates can modify any system-provided network analysis or intrusion policy,
and can provide new and updated intrusion rules and inspector rules, modified states for existing rules, and
modified default policy settings. Rule updates may also delete rules from system-provided policies and provide
new rule categories, as well as modify the default variable set.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


9
An Overview of Network Analysis and Intrusion Policies
Benefits of Custom Network Analysis and Intrusion Policies

If a rule update affects your deployment, the web interface marks affected intrusion and network analysis
policies as out of date, as well as their parent access control policies. You must re-deploy an updated policy
for its changes to take effect.
For your convenience, you can configure rule updates to automatically re-deploy affected intrusion policies,
either alone or in combination with affected access control policies. This allows you to easily and automatically
keep your deployment up-to-date to protect against recently discovered exploits and intrusions.
To ensure up-to-date preprocessing settings, you must re-deploy access control policies, which also deploys
any associated SSL, network analysis, and file policies that are different from those currently running, and
can also can update default values for advanced preprocessing and performance options.
Cisco delivers the following network analysis and intrusion policies with the Firepower System:
Balanced Security and Connectivity network analysis and intrusion policies
These policies are built for both speed and detection. Used together, they serve as a good starting point
for most organizations and deployment types. The system uses the Balanced Security and Connectivity
policies and settings as defaults in most cases.
Connectivity Over Security network analysis and intrusion policies
These policies are built for organizations where connectivity (being able to get to all resources) takes
precedence over network infrastructure security. The intrusion policy enables far fewer rules than those
enabled in the Security over Connectivity policy. Only the most critical rules that block traffic are enabled.
Security Over Connectivity network analysis and intrusion policies
These policies are built for organizations where network infrastructure security takes precedence over
user convenience. The intrusion policy enables numerous network anomaly intrusion rules that could
alert on or drop legitimate traffic.
Maximum Detection network analysis and intrusion policies
These policies are built for organizations where network infrastructure security is given even more
emphasis than is given by the Security Over Connectivity policies, with the potential for even greater
operational impact. For example, the intrusion policy enables rules in a large number of threat categories
including malware, exploit kit, old and common vulnerabilities, and known in-the-wild exploits.
No Rules Active intrusion policy
In the No Rules Active intrusion policy, all intrusion rules, and all advanced settings except intrusion
rule thresholds, are disabled. This policy provides a starting point if you want to create your own intrusion
policy instead of basing it on the enabled rules in one of the other system-provided policies.

Note Depending on the system-provided base policy that is selected, the settings of the policy vary. To view the
policy settings, click the Edit icon next to the policy and then click the Base Policy drop-down box.

Benefits of Custom Network Analysis and Intrusion Policies


You may find that the inspector options, intrusion rules, and other advanced settings configured in the
system-provided network analysis and intrusion policies do not fully address the security needs of your
organization.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


10
An Overview of Network Analysis and Intrusion Policies
Benefits of Custom Network Analysis Policies

Building custom policies can improve the performance of the system in your environment and can provide a
focused view of the malicious traffic and policy violations occurring on your network. By creating and tuning
custom policies you can configure, at a very granular level, how the system processes and inspects the traffic
on your network for intrusions.
All custom policies have a base policy, also called a base layer, which defines the default settings for all
configurations in the policy. A layer is a building block that you can use to efficiently manage multiple network
analysis or intrusion policies.
In most cases, you base custom policies on system-provided policies, but you can use another custom policy.
However, all custom policies have a system-provided policy as the eventual base in a policy chain. Because
rule updates can modify system-provided policies, importing a rule update may affect you even if you are
using a custom policy as your base. If a rule update affects your deployment, the web interface marks affected
policies as out of date.

Benefits of Custom Network Analysis Policies


By default, one network analysis policy preprocesses all unencrypted traffic handled by the access control
policy. That means that all packets are decoded and preprocessed according to the same settings, regardless
of the intrusion policy (and therefore intrusion rule set) that later examines them.
Initially, the system-provided Balanced Security and Connectivity network analysis policy is the default. A
simple way to tune preprocessing is to create and use a custom network analysis policy as the default.
Tuning options available vary by inspector, but some of the ways you can tune inspectors and decoders include:
• You can disable inspectors that do not apply to the traffic you are monitoring. For example, the HTTP
Inspect inspector normalizes HTTP traffic. If you are confident that your network does not include any
web servers using Microsoft Internet Information Services (IIS), you can disable the inspector option
that looks for IIS-specific traffic and thereby reduce system processing overhead.

Note If you disable a inspector in a custom network analysis policy, but the system needs to use that inspector to
later evaluate packets against an enabled intrusion or inspector rule, the system automatically enables and
uses the inspector although the inspector remains disabled in the network analysis policy web interface.

• Specify ports, where appropriate, to focus the activity of certain inspectors. For example, you can identify
additional ports to monitor for DNS server responses or encrypted SSL sessions, or ports on which you
decode telnet, HTTP, and RPC traffic.

For advanced users with complex deployments, you can create multiple network analysis policies, each tailored
to preprocess traffic differently. Then, you can configure the system to use those policies to govern the
preprocessing of traffic using different security zones, networks, or VLANs. (Note that ASA FirePOWER
modules cannot restrict preprocessing by VLAN.)

Note Tailoring preprocessing using custom network analysis policies—especially multiple network analysis
policies—is an advanced task. Because preprocessing and intrusion inspection are so closely related, you
must be careful to allow the network analysis and intrusion policies examining a single packet to complement
each other.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


11
An Overview of Network Analysis and Intrusion Policies
Benefits of Custom Intrusion Policies

Benefits of Custom Intrusion Policies


In a newly created access control policy initially configured to perform intrusion prevention, the default action
allows all traffic, but first inspects it with the system-provided Balanced Security and Connectivity intrusion
policy. Unless you add access control rules or change the default action, all traffic is inspected by that intrusion
policy.
To customize your intrusion prevention deployment, you can create multiple intrusion policies, each tailored
to inspect traffic differently. Then, configure an access control policy with rules that specify which policy
inspects which traffic. Access control rules can be simple or complex, matching and inspecting traffic using
multiple criteria including security zone, network or geographical location, VLAN, port, application, requested
URL, or user.
The main function of intrusion policies is to manage which intrusion and inspector rules are enabled and how
they are configured, as follows:
• Within each intrusion policy, you should verify that all rules applicable to your environment are enabled,
and improve performance by disabling rules that are not applicable to your environment. You can specify
which rules should drop or modify malicious packets.
• Firepower recommendations allow you to associate the operating systems, servers, and client application
protocols detected on your network with rules specifically written to protect those assets.
• You can modify existing rules and write new standard text rules as needed to catch new exploits or to
enforce your security policies.

Other customizations you might make to an intrusion policy include:


• The sensitive data preprocessor detects sensitive data such as credit card numbers and Social Security
numbers in ASCII text. Note that other inspectors that detect specific threats (back orifice attacks, several
portscan types, and rate-based attacks that attempt to overwhelm your network with excessive traffic)
are configured in network analysis policies.
• Global thresholds cause the system to generate events based on how many times traffic matching an
intrusion rule originates from or is targeted to a specific address or address range within a specified time
period. This helps prevent the system from being overwhelmed with a large number of events.
• Suppressing intrusion event notifications and setting thresholds for individual rules or entire intrusion
policies can also can prevent the system from being overwhelmed with a large number of events.
• In addition to the various views of intrusion events within the web interface, you can enable logging to
syslog facilities or send event data to an SNMP trap server. Per policy, you can specify intrusion event
notification limits, set up intrusion event notification to external logging facilities, and configure external
responses to intrusion events. Note that in addition to these per-policy alerting configurations, you can
globally enable or disable email alerting on intrusion events for each rule or rule group. Your email alert
settings are used regardless of which intrusion policy processes a packet.

Limitations of Custom Policies


Because preprocessing and intrusion inspection are so closely related, you must be careful that your
configuration allows the network analysis and intrusion policies processing and examining a single packet to
complement each other.
By default, the system uses one network analysis policy to preprocess all traffic handled by managed devices
using a single access control policy. The following diagram shows how a newly created access control policy

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


12
An Overview of Network Analysis and Intrusion Policies
Limitations of Custom Policies

in an inline, intrusion-prevention deployment initially handles traffic. The preprocessing and intrusion
prevention phases are highlighted.

Notice how a default network analysis policy governs the preprocessing of all traffic handled by the access
control policy. Initially, the system-provided Balanced Security and Connectivity network analysis policy is
the default.
A simple way to tune preprocessing is to create and use a custom network analysis policy as the default.
However, if you disable a inspector in a custom network analysis policy but the system needs to evaluate
preprocessed packets against an enabled intrusion or inspector rule, the system automatically enables and uses
the inspector although it remains disabled in the network analysis policy web interface.

Note In order to get the performance benefits of disabling an inspector, you must make sure that none of your
intrusion policies have enabled rules that require that inspector.

An additional challenge arises if you use multiple custom network analysis policies. For advanced users with
complex deployments, you can tailor preprocessing to specific security zones, networks, and VLANs by
assigning custom network analysis policies to preprocess matching traffic. (Note that ASA FirePOWER cannot
restrict preprocessing by VLAN.) To accomplish this, you add custom network analysis rules to your access
control policy. Each rule has an associated network analysis policy that governs the preprocessing of traffic
that matches the rule.

Tip You configure network analysis rules as an advanced setting in an access control policy. Unlike other types
of rules in the Firepower System, network analysis rules invoke—rather than being contained by—network
analysis policies.

The system matches packets to any configured network analysis rules in top-down order by rule number.
Traffic that does not match any network analysis rule is preprocessed by the default network analysis policy.
While this allows you a great deal of flexibility in preprocessing traffic, keep in mind that all packets, regardless
of which network analysis policy preprocessed them, are subsequently matched to access control rules—and
thus to potential inspection by intrusion policies—in their own process. In other words, preprocessing a packet
with a particular network analysis policy does not guarantee that the packet will be examined with any
particular intrusion policy. You must carefully configure your access control policy so it invokes the correct
network analysis and intrusion policies to evaluate a particular packet.
The following diagram shows in focused detail how the network analysis policy (preprocessing) selection
phase occurs before and separately from the intrusion prevention (rules) phase. For simplicity, the diagram
eliminates the discovery and file/malware inspection phases. It also highlights the default network analysis
and default-action intrusion policies.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


13
An Overview of Network Analysis and Intrusion Policies
Limitations of Custom Policies

In this scenario, an access control policy is configured with two network analysis rules and a default network
analysis policy:
• Network Analysis Rule A preprocesses matching traffic with Network Analysis Policy A. Later, you
want this traffic to be inspected by Intrusion Policy A.
• Network Analysis Rule B preprocesses matching traffic with Network Analysis Policy B. Later, you
want this traffic to be inspected by Intrusion Policy B.
• All remaining traffic is preprocessed with the default network analysis policy. Later, you want this traffic
to be inspected by the intrusion policy associated with the access control policy’s default action.

After the system preprocesses traffic, it can examine the traffic for intrusions. The diagram shows an access
control policy with two access control rules and a default action:
• Access Control Rule A allows matching traffic. The traffic is then inspected by Intrusion Policy A.
• Access Control Rule B allows matching traffic. The traffic is then inspected by Intrusion Policy B.
• The access control policy’s default action allows matching traffic. The traffic is then inspected by the
default action’s intrusion policy.

Each packet’s handling is governed by a network analysis policy and intrusion policy pair, but the system
does not coordinate the pair for you. Consider a scenario where you misconfigure your access control policy
so that Network Analysis Rule A and Access Control Rule A do not process the same traffic. For example,
you could intend the paired policies to govern the handling of traffic on a particular security zone, but you
mistakenly use different zones in the two rules’ conditions. This could cause traffic to be incorrectly
preprocessed. For this reason, tailoring preprocessing using network analysis rules and custom policies is an
advanced task.
Note that for a single connection, although the system selects a network analysis policy before an access
control rule, some preprocessing (notably application layer preprocessing) occurs after access control rule
selection. This does not affect how you configure preprocessing in custom network analysis policies.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


14
An Overview of Network Analysis and Intrusion Policies
License Requirements for Network Analysis and Intrusion Policies

License Requirements for Network Analysis and Intrusion


Policies
FTD License
Threat

Classic License
Protection

Requirements and Prerequisites for Network Analysis and


Intrusion Policies
Model Support
Any.

Supported Domains
Any

User Roles
• Admin
• Supported Domains

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


15
An Overview of Network Analysis and Intrusion Policies
Requirements and Prerequisites for Network Analysis and Intrusion Policies

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


16
CHAPTER 2
Migrating from Snort 2 to Snort 3
The following topics provide a coverage of the various aspects of migrating from Snort 2 to Snort 3.
• Snort 2 versus Snort 3, on page 17
• Feature Limitations of Snort 3 for FMC-Managed FTD, on page 18
• Migrating from Snort 2 to Snort 3, on page 19
• Enable and Disable Snort 3, on page 19
• Viewing Snort 2 and Snort 3 Base Policy Mapping, on page 21
• Synchronize Snort 2 Rules with Snort 3 , on page 21

Snort 2 versus Snort 3


Snort 3 is architecturally redesigned to inspect more traffic with equivalent resources when compared to Snort
2. Snort 3 provides simplified and flexible insertion of traffic parsers. Snort 3 also provides new rule syntax
that makes rule writing easier and shared object rule equivalents visible.
The table below lists the differences between the Snort 2 and the Snort 3 versions in terms of the inspection
engine capabilities.

Feature Snort 2 Snort 3

Packet threads One per process Any number per process

Configuration memory use Number of processes * x GB x GB in total; more memory


available for packets

Configuration reload Slower Faster; one thread can be pinned to


separate cores

Rule syntax Inconsistent and requires line Uniform system with arbitrary
escapes whitespace

Rule comments Comments only #, #begin and #end marks; C


language style

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


17
Migrating from Snort 2 to Snort 3
Feature Limitations of Snort 3 for FMC-Managed FTD

Feature Limitations of Snort 3 for FMC-Managed FTD


The following table lists the features that are supported on Snort 2 but not supported on Snort 3 for
FMC-managed FTD devices.

Table 1: Feature Limitations of Snort 3

Policy/Area Features not supported

Access Control Policy The following applications settings:


• Safe Search
• YouTube EDU

Threat Intelligence Detector When IPv4 or IPv6 traffic is:


• blocked:
• No TID incident
• No SI event

• monitored:
• No ITD incident

Intrusion Policy • Firepower recommendations


• Policy layers
• Global rule thresholding
• Sensitive data detection
• Logging configuration:
• Syslog
• SNMP

• SRU rule updates as Snort 3 supports only LSP


rule updates

Application Detection In Snort 3, by default, application detection is enabled


for all networks. Unlike in Snort 2, you cannot control
enabling or disabling application detection to only
specific networks using network filters of the network
discovery policy. For more information, see the
Application Detection in Snort 2 and Snort 3 topic in
the latest version of the Firepower Management
Center Configuration Guide.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


18
Migrating from Snort 2 to Snort 3
Migrating from Snort 2 to Snort 3

Policy/Area Features not supported

Network Discovery/RNA • Host port/service identification (as seen on the


network map)
• OS fingerprinting (you cannot tune your intrusion
policy to your network map)

Other features Event logging with FQDN names

Migrating from Snort 2 to Snort 3


Migrating from Snort 2 to Snort 3 requires you to switch the inspection engine of the Firepower Threat Defense
device from Snort 2 to Snort 3. Note that only devices of version 7.0 and above support Snort 3.
When Snort 3 is enabled as the inspection engine of the device, the Snort 3 version of the intrusion policy
that is applied on the device (through the access control policies) is activated and applied to all the traffic
passing through the device. To enable Snort 3 on a supported device, see Enable and Disable Snort 3, on page
19.

Conversion Tool for Snort 2 Custom Rules


If you are using custom rules, make sure you are prepared to manage that rule set for Snort 3 prior to conversion
from Snort 2 to Snort 3. If you are using a rule set from a third-party vendor, contact that vendor to confirm
that their rules will successfully convert to Snort 3 or to obtain a replacement rule set written natively for
Snort 3. If you have custom rules that you have written yourself, familiarize with writing Snort 3 rules prior
to conversion, so you can update your rules to optimize Snort 3 detection after conversion. See the links below
to learn more about writing rules in Snort 3.
• https://blog.snort.org/2020/08/how-rules-are-improving-in-snort-3.html
• https://blog.snort.org/2020/10/talos-transition-to-snort-3.html

You can refer to other blogs at https://blog.snort.org/ to learn more about Snort 3 rules.
To use the system-provided tool to convert Snort 2 rules to Snort 3 rules, see Converting Snort 2 Custom
Rules to Snort 3, on page 45.

Enable and Disable Snort 3


Snort 3 is the default inspection engine for newly registered FTD devices of version 7.0 and above. However,
for FTD devices of lower versions, Snort 2 is the default inspection engine. When you upgrade a managed
FTD device to version 7.0 or above, the inspection engine remains on Snort 2. To use Snort 3 in upgraded
FTDs of version 7.0 and above, you must explicitly enable it. Note that you can always switch back from
Snort 3 to Snort 2 when required.
You can switch Snort versions when required. Snort 2 and Snort 3 intrusion rules are mapped and the mapping
is system-provided. However, you may not find a one-to-one mapping of all the intrusion rules in Snort 2 and
Snort 3. If you change the rule action for one rule in Snort 2, that change is not retained if you switch to Snort

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


19
Migrating from Snort 2 to Snort 3
Enabling and Disabling Snort 3 on an Individual Device

3 without synchronizing Snort 2 with Snort 3. For more information on synchronization, see Synchronize
Snort 2 Rules with Snort 3 , on page 21.

Enabling and Disabling Snort 3 on an Individual Device


Before you begin
The supported user roles that can perform the steps are:
• Admin
• Intrusion Admin

Step 1 Choose Devices > Device Management.


Step 2 Click the device to go to the device home page.
Note The device is marked as Snort 2 or Snort 3, showing the current version on the device.

Step 3 Click the Device tab.


Step 4 In the Inspection Engine section, click Upgrade.
Note To disable Snort 3, click Revert to Snort 2 in the Inspection Engine section.

Step 5 Click Yes.

What to do next
Deploy the changes on the device. See, Deploy Configuration Changes, on page 33.
The system converts your policy configurations during the deployment process to make them compatible with
the selected Snort version.

Important During the deployment process, there will be a momentary traffic loss since the current inspection engine
needs to be shut down.

Enabling and Disabling Snort 3 on Multiple Devices


To enable Snort 3 on multiple devices, ensure all the required Firepower Threat Defense (FTD) devices are
on version 7.0 or above.

Before you begin


The supported user roles that can perform the steps are:
• Admin
• Intrusion Admin

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


20
Migrating from Snort 2 to Snort 3
Viewing Snort 2 and Snort 3 Base Policy Mapping

Step 1 Choose Devices > Device Management.


Step 2 Select all the devices on which you want to enable or disable Snort 3.
Note The devices are marked as Snort 2 or Snort 3, showing the current version on the device.

Step 3 Click Select Bulk Action drop-down list.


Step 4 Click Upgrade to Snort 3.
Note To disable Snort 3, click Downgrade to Snort 2.

Step 5 Click Yes.

What to do next
Deploy the changes on the device. See, Deploy Configuration Changes, on page 33.
The system converts your policy configurations during the deployment process to make them compatible with
the selected Snort version.

Important During the deployment process, there will be a momentary traffic loss since the current inspection engine
needs to be shut down.

Viewing Snort 2 and Snort 3 Base Policy Mapping


Step 1 Choose Policies > Intrusion.
Step 2 Ensure the Intrusion Policies tab is selected.
Step 3 Click IPS Mapping.

Synchronize Snort 2 Rules with Snort 3


Snort 2 and Snort 3 versions of an intrusion policy can be independently changed to suit your requirement.
However, this can lead to disparity when you want to switch from Snort 2 to Snort 3. To ensure that the Snort
2 version settings and custom rules are retained and carried over to Snort 3, FMC provides the synchronization
functionality. Synchronization helps Snort 2 rule override settings and custom rules, which you may have
altered and added over the last few months or years to be replicated on the Snort 3 version.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


21
Migrating from Snort 2 to Snort 3
Synchronize Snort 2 Rules with Snort 3

Important • Only the Snort 2 rule overrides and custom rules are copied to Snort 3 and not the other way around.
You may not find a one-to-one mapping of all the intrusion rules in Snort 2 and Snort 3.Your changes
to rule actions for rules that exist in both versions are synchronized when you perform the following
procedure.
• Synchronization does not migrate the threshold and supression settings of any custom or system-provided
rules from Snort 2 to Snort 3.

Step 1 Choose Policies > Intrusion.


Step 2 Ensure the Intrusion Policies tab is selected.
Step 3 Click Show Snort 3 Sync status.
Step 4 Identify the intrusion policy that is out-of-sync.
Step 5 Click the Sync icon ( ).
Note If the Snort 2 and the Snort 3 versions of the intrusion policy are synchronized, then the Sync icon is in green
( ).

Step 6 Read through the summary and download a copy of the summary if required.
Step 7 Click Re-Sync.
Note • The synchronized settings will be applicable on the Snort 3 intrusion engine only if it is applied on a
device, and after a successful deployment.
• Snort 2 custom rules can be converted to Snort 3 using the system-provided tool. If you have any Snort 2
custom rules click the Custom Rules tab and follow the on-screen instructions to convert the rules. For
more information, see Converting Snort 2 Custom Rules of a Single Intrusion Policy to Snort 3, on page
45.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


22
PA R T I
Intrusion Detection and Prevention in Snort 3
• Getting Started with Snort 3 Intrusion Policies, on page 25
• Tuning Intrusion Policies Using Rules, on page 35
• Tailoring Intrusion Protection to Your Network Assets, on page 51
CHAPTER 3
Getting Started with Snort 3 Intrusion Policies
The following topics explain how to get started with Snort 3 intrusion policies.
• Intrusion Policy Basics, on page 25
• License Requirements for Intrusion Policies, on page 26
• Requirements and Prerequisites for Intrusion Policies, on page 27
• Creating a Custom Snort 3 Intrusion Policy , on page 27
• Editing Snort 3 Intrusion Policies, on page 28
• Changing the Base Policy of an Intrusion Policy, on page 30
• Changing the Inspection Mode of an Intrusion Policy for Both Snort 2 and Snort 3 Versions, on page 30
• Managing Intrusion Policies, on page 31
• Access Control Rule Configuration to Perform Intrusion Prevention, on page 32
• Deploy Configuration Changes, on page 33

Intrusion Policy Basics


Intrusion policies are defined sets of intrusion detection and prevention configurations that inspect traffic for
security violations and, in inline deployments, can block or alter malicious traffic. Intrusion policies are
invoked by your access control policy and are the system’s last line of defense before traffic is allowed to its
destination.
At the heart of each intrusion policy are the intrusion rules. An enabled rule causes the system to generate
intrusion events for (and optionally block) traffic matching the rule. Disabling a rule stops processing of the
rule.
The Firepower System delivers several base intrusion policies, which enable you to take advantage of the
experience of the Cisco Talos Intelligence Group (Talos). For these policies, Talos sets intrusion and
preprocessor rule states (enabled or disabled), as well as provides the initial configurations for other advanced
settings.

Tip System-provided intrusion and network analysis policies are similarly named but contain different
configurations. For example, the Balanced Security and Connectivity network analysis policy and the Balanced
Security and Connectivity intrusion policy work together and can both be updated in intrusion rule updates.
However, the network analysis policy governs mostly preprocessing options, whereas the intrusion policy
governs mostly intrusion rules.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


25
Intrusion Detection and Prevention in Snort 3
License Requirements for Intrusion Policies

If you create a custom intrusion policy, you can:


• Tune detection by enabling and disabling rules, as well as by writing and adding your own rules.
• Use Firepower recommendations to associate the operating systems, servers, and client application
protocols detected on your network with rules specifically written to protect those assets.
• Configure various advanced settings such as external alerting, sensitive data preprocessing, and global
rule thresholding.
• Use layers as building blocks to efficiently manage multiple intrusion policies.

An intrusion policy can drop matching packets and generate intrusion events. To configure an intrusion or
preprocessor drop rule, set its state to Block.
When tailoring your intrusion policy, especially when enabling and adding rules, keep in mind that some
intrusion rules require that traffic first be decoded or preprocessed in a certain way. Before an intrusion policy
examines a packet, the packet is preprocessed according to configurations in a network analysis policy. If you
disable a required inspector, the system automatically uses it with its current settings, although the inspector
remains disabled in the network analysis policy web interface.

Caution Because preprocessing and intrusion inspection are so closely related, the network analysis and intrusion
policies examining a single packet must complement each other. Tailoring preprocessing, especially using
multiple custom network analysis policies, is an advanced task.

After you configure a custom intrusion policy, you can use it as part of your access control configuration by
associating the intrusion policy with one or more access control rules or an access control policy’s default
action. This forces the system to use the intrusion policy to examine certain allowed traffic before the traffic
passes to its final destination. A variable set that you pair with the intrusion policy allows you to accurately
reflect your home and external networks and, as appropriate, the servers on your network.
Note that by default, the system disables intrusion inspection of encrypted payloads. This helps reduce false
positives and improve performance when an encrypted connection matches an access control rule that has
intrusion inspection configured.

License Requirements for Intrusion Policies


FTD License
Threat

Classic License
Protection

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


26
Intrusion Detection and Prevention in Snort 3
Requirements and Prerequisites for Intrusion Policies

Requirements and Prerequisites for Intrusion Policies


Model Support
Any.

Supported Domains
Any

User Roles
• Admin
• Intrusion Admin

Creating a Custom Snort 3 Intrusion Policy


Step 1 Choose Policies > Intrusion.
Step 2 Click Create Policy.
Ensure the Intrusion Policies tab is selected.

Step 3 Enter a unique Name and, optionally, a Description.


Step 4 Choose the Inspection Mode.
The selected action determines whether intrusion rules block and alert (Prevention mode) or only alert (Detection mode).
Note Before selecting the prevention mode, you might want block rules to alert only so you can identify rules that
cause a lot of false positives.

Step 5 Choose the Base Policy.


You can use either a system-provided or another custom policy as your base policy.

Step 6 Click Save.


The new policy has the same settings as its base policy.

What to do next
To customize the policy, see Editing Snort 3 Intrusion Policies, on page 28.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


27
Intrusion Detection and Prevention in Snort 3
Editing Snort 3 Intrusion Policies

Editing Snort 3 Intrusion Policies


Step 1 Choose Policies > Intrusion.
Step 2 Ensure the Intrusion Policies tab is selected.
Step 3 Click Snort 3 Version next to the intrusion policy you want to configure.
Step 4 Edit your policy:
• Change the mode—Click the Mode drop-down to change the inspection mode.
• Prevention—Triggered Block rules create an event (alert) and drop the connection.
• Detection—Triggered Block rules alert.
You can choose to select detection mode before going in for prevention. For example, before selecting the
prevention mode, you might want block rules to alert only, so that you can identify rules that cause a lot of
false positives.

Note The inspection mode is changed only for the Snort 3 version of the policy. The existing inspection mode
is retained in the Snort 2 version as is.

• Modify Rule Action—To modify rule actions, choose either of the following:
• Bulk edit—Select one or more rules, then select the required action from the Rule Action drop-down list; and
click Save.
Note Bulk rule action changes are supported only for the first 500 rules.

• Single rule edit—Select the action for the rule from the drop-down box in the Rule Action column.

Note Rule actions are:


• Block—Creates an event when this rule matches traffic, and also drops the connection.
• Alert—Creates an event when this rule matches traffic, but does not drop the connection.
• Disable—Does not match traffic against this rule. No events are generated.
• Revert to default—Reverts to the system default action.

• Search rules—Use the search field to filter the display. You can enter the GID, SID, or reference info. For example,
GID:1; SID:9621—to display only rule 1:962, SID:9621,9622,9623—to display multiple rules with different SIDs.
You can also select any of the following options:
• apply the filters Action = Alert, or Action: Block
• apply the Disabled Rules filter
• show Custom/User Defined Rules
• filter by GID, SID, or GID:SID
• filter by cve

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


28
Intrusion Detection and Prevention in Snort 3
Editing Snort 3 Intrusion Policies

• filter by comment

• Search Rule Groups—Enter the key words to search for rule groups or select any of the following preset filter options
below the search bar:
• Excluded—for excluded rule groups
• Included—for included rule groups
• Overridden—for rule groups with overridden rules

• Set the security level for a rule group—Navigate to the required rule group on the left pane and select it. Click Edit
next to the Security Level of the rule group to increase or decrease the security level based on system-defined rule
settings.
The FMC automatically changes the action for the rules of the rule group for the configured security level. Notice
the change in the Block Rules and Disabled Rules in the Preset Filters every time you change the security level.
• View filtered rules—Select any of the Preset Filters to view rules which are set to alert, block, disabled, or overridden.
Overridden rules indicate the rules where the rule action has been changed from the default action to a different
action. Note that, once changed, the rule action status is Overridden even if you change it back to its original default
action. However, if you select Revert to default from the Rule Action drop-down list, the Overridden status is
removed.
Advanced Filters provides filter options based on the Lightweight Security Package (LSP) releases, Classifications
of intrusions, and Microsoft Vulnerabilities.
• Include or exclude Rule Groups—The rule groups displayed are the default rule groups associated with the
system-provided base intrusion policy. You can include and exclude rule groups from the intrusion policy. An
excluded rule group is removed from the intrusion policy and its rules are not applied on the traffic. Custom rules
uploaded in FMC need to be included to enforce the rules in the policy. For information on uploading custom rules
in FMC, see Uploading Custom Rules, on page 46.
To exclude a rule group:
a. Navigate the Rule Groups pane and select the rule group.
b. Click the Exclude link on the right-pane.
c. Optionally, check the Do you want to remove rule overrides? check box if you want to revert the rule overrides
in the rule group to the default setting.
Note This check box is displayed only if there are any overridden rules.
d. Click Exclude.

To include a new rule group with the uploaded custom rules or a previously excluded rule group:

a. Click Add ( ) next to the Rule Group search bar.


b. Select all the rule groups you want to add by checking the check box next to it.
c. Click Save.

• View rule documentation—Click the rule ID or the Rule Documentation icon to display TALOS documentation
for the rule.
• View a rule details—Click the Expand Arrow ( ) icon in a rule row to view the rule details.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


29
Intrusion Detection and Prevention in Snort 3
Changing the Base Policy of an Intrusion Policy

• Add rule comments—Click Comment ( ) under the Comments column to add comments for a rule.
Note • To change the base policy, see Changing the Base Policy of an Intrusion Policy, on page 30.
• All the changes are saved instantaneously. No additional action is required to save the changes.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Changing the Base Policy of an Intrusion Policy


You can choose a different system-provided or custom policy as your base policy.
You can chain up to five custom policies, with four of the five using one of the other four previously created
policies as its base policy; the fifth must use a system-provided policy as its base.

Step 1 Choose Policies > Intrusion.

Step 2 Click Edit ( ) next to the intrusion policy you want to configure.
Step 3 Choose a policy from the Base Policy drop-down list.
Step 4 Click Save.

What to do next
Deploy configuration changes; see .

Changing the Inspection Mode of an Intrusion Policy for Both


Snort 2 and Snort 3 Versions
You can choose to have a different inspection mode for an existing intrusion policy. The change is applied
on the device after a successful deployment. Follow the steps in this topic to change the inspection mode for
both Snort 2 and Snort 3 versions of an intrusion policy.

Step 1 Choose Policies > Intrusion.

Step 2 Click Edit ( ) next to the intrusion policy you want to change.
Step 3 Select the Inspection Mode that you want to apply to the policy.
Step 4 Click Save.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


30
Intrusion Detection and Prevention in Snort 3
Managing Intrusion Policies

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Managing Intrusion Policies


On the Intrusion Policy page (Policies > Intrusion) you can view your current custom intrusion policies,
along with the following information:
• the time and date the policy was last modified (in local time) and the user who modified it
• which access control policies and devices are using the intrusion policy to inspect traffic
• whether a policy has unsaved changes, as well as information about who (if anyone) is currently editing
the policy
• in a multidomain deployment, the domain where the policy was created

In a multidomain deployment, the system displays policies created in the current domain, which you can edit.
It also displays policies created in ancestor domains, which you cannot edit. To view and edit policies created
in a lower domain, switch to that domain.

Step 1 Choose Policies > Intrusion.


Step 2 Manage your intrusion policy:
• Compare — Click Compare Policies; see the Comparing Policies topic in the latest version of the Firepower
Management Center Configuration Guide.
• Create — Click Create Policy; see Creating a Custom Snort 3 Intrusion Policy , on page 27.

• Delete — Click Delete ( ) next to the policy you want to delete. The system prompts you to confirm and informs
you if another user has unsaved changes in the policy. Click OK to confirm.
If the controls are dimmed, the configuration belongs to an ancestor domain, or you do not have permission to modify
the configuration.

• Edit intrusion policy details — Click Edit ( ) next to the policy you want to edit. You can edit the Name, Inspection
Mode, and the Base Policy of the intrusion policy.
• Edit intrusion policy settings — Click Snort 3 Version; see Editing Snort 3 Intrusion Policies, on page 28.
• Export — If you want to export an intrusion policy to import on another Firepower Management Center, click Export;
see the Exporting Configurations topic in the latest version of the Firepower Management Center Configuration
Guide.
• Deploy — Choose Deploy > Deployment; see Deploy Configuration Changes, on page 33.
• Report — Click Report; see the Generating Current Policy Reports topic in the latest version of the Firepower
Management Center Configuration Guide.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


31
Intrusion Detection and Prevention in Snort 3
Access Control Rule Configuration to Perform Intrusion Prevention

Access Control Rule Configuration to Perform Intrusion


Prevention
An access control policy can have multiple access control rules associated with intrusion policies. You can
configure intrusion inspection for any Allow or Interactive Block access control rule, which permits you to
match different intrusion inspection profiles against different types of traffic on your network before it reaches
its final destination.
Whenever the system uses an intrusion policy to evaluate traffic, it uses an associated variable set. Variables
in a set represent values commonly used in intrusion rules to identify source and destination IP addresses and
ports. You can also use variables in intrusion policies to represent IP addresses in rule suppressions and
dynamic rule states.

Tip Even if you use system-provided intrusion policies, Cisco strongly recommends you configure the system’s
intrusion variables to accurately reflect your network environment. At a minimum, modify default variables
in the default set.

Understanding System-Provided and Custom Intrusion Policies


Cisco delivers several intrusion policies with the Firepower System. By using system-provided intrusion
policies, you can take advantage of the experience of the Cisco Talos Intelligence Group (Talos). For these
policies, Talos sets intrusion and preprocessor rule states, as well as provides the initial configurations for
advanced settings. You can use system-provided policies as-is, or you can use them as the base for custom
policies. Building custom policies can improve the performance of the system in your environment and provide
a focused view of the malicious traffic and policy violations occurring on your network.

Connection and Intrusion Event Logging


When an intrusion policy invoked by an access control rule detects an intrusion and generates an intrusion
event, it saves that event to the Firepower Management Center. The system also automatically logs the end
of the connection where the intrusion occurred to the Firepower Management Center database, regardless of
the logging configuration of the access control rule.

Access Control Rule Configuration and Intrusion Policies


The number of unique intrusion policies you can use in a single access control policy depends on the model
of the target devices; more powerful devices can handle more. Every unique pair of intrusion policy and
variable set counts as one policy. Although you can associate a different intrusion policy-variable set pair
with each Allow and Interactive Block rule (as well as with the default action), you cannot deploy an access
control policy if the target devices have insufficient resources to perform inspection as configured.

Configuring an Access Control Rule to Perform Intrusion Prevention


You must be an Admin, Access Admin, or Network Admin to perform this task.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


32
Intrusion Detection and Prevention in Snort 3
Deploy Configuration Changes

Step 1 In the access control policy editor, create a new rule or edit an existing rule; see the Access Control Rule Components
topic in the latest version of the Firepower Management Center Configuration Guide.
Step 2 Ensure the rule action is set to Allow, Interactive Block, or Interactive Block with reset.
Step 3 Click Inspection.
Step 4 Choose a system-provided or a custom intrusion policy, or choose None to disable intrusion inspection for traffic that
matches the access control rule.
Step 5 If you want to change the variable set associated with the intrusion policy, choose a value from the Variable Set drop-down
list.
Step 6 Click Save to save the rule.
Step 7 Click Save to save the policy.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Deploy Configuration Changes


After you change configurations, deploy them to the affected devices.

Note This topic covers the basic steps to deploy configuration changes. We strongly recommend that you refer the
Deploy Configuration Changes topic in the latest version of the Firepower Management Center Configuration
Guide to understand the prerequisites and the implications of deploying the changes before proceeding with
the steps.

Caution When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection.
Whether traffic drops during this interruption or passes without further inspection depends on how the target
device handles traffic.

Step 1 On the Firepower Management Center menu bar, click Deploy and then select Deployment.
The GUI page lists the devices with out-of-date configurations having the pending status.
• The Modified By column lists the users who have modified the policies or objects. On expanding the device listing,
you can view the users who have modified the policies against each policy listing.
Note Usernames are not provided for deleted policies and objects.

• The Inspect Interruption column indicates if traffic inspection interruption may be caused in the device during
deployment.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


33
Intrusion Detection and Prevention in Snort 3
Deploy Configuration Changes

If the entry is blank in this column for a device, then it indicates that there will be no traffic inspection interruptions
on that device during deployment.
• The Last Modified Time column specifies when you last made the configuration changes.
• The Preview column allows you to preview the changes for the next deployment.
• The Status column provides the status for each deployment.

Step 2 Identify and choose the devices on which you want to deploy configuration changes.
• Search—Search for the device name, type, domain, group, or status in the search box.
• Expand—Click Expand Arrow ( ) to view device-specific configuration changes to be deployed.
By selecting the device check box, all the changes for the device, which are listed under the device, are pushed for
deployment. However, you can use Policy selection ( ) to select individual policies or specific configurations to
deploy while withholding the remaining changes without deploying them.
Note • When the status in the Inspect Interruption column indicates (Yes) that deploying will interrupt
inspection, and perhaps traffic, on a Firepower Threat Defense device, the expanded list indicates
the specific configurations causing the interruption with the Inspect Interruption ( ).
• When there are changes to interface groups, security zones, or objects, the impacted devices are
shown as out-of-date on the Firepower Management Center (FMC). To ensure that these changes
take effect, the policies with these interface groups, security zones, or objects, also need to be deployed
along with these changes. The impacted policies are shown as out-of-date on the Preview page on
the FMC.

Step 3 Click Deploy.


Step 4 If the system identifies errors or warnings in the changes to be deployed, it displays them in the Validation Messages
window. To view complete details, click the arrow icon before the warnings or errors.
You have the following choices:
• Deploy—Continue deploying without resolving warning conditions. You cannot proceed if the system identifies
errors.
• Close—Exit without deploying. Resolve the error and warning conditions, and attempt to deploy the configuration
again.

What to do next
During deployment, if there is a deployment failure due to any reason, there is a possibility that the failure
may impact traffic. However, it depends on certain conditions. If there are specific configuration changes in
the deployment, the deployment failure may lead to traffic being interrupted. For details, see Deploy
Configuration Changes topic in the latest version of the Firepower Management Center Configuration Guide.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


34
CHAPTER 4
Tuning Intrusion Policies Using Rules
The following topics explain how to use rules to tune intrusion policies:
• Intrusion Rule Tuning Basics, on page 35
• Intrusion Rule Types, on page 36
• License Requirements for Intrusion Rules, on page 37
• Requirements and Prerequisites for Intrusion Rules, on page 37
• Custom Rules in Snort 3, on page 37
• Viewing Snort 3 Intrusion Rules in an Intrusion Policy, on page 38
• Intrusion Rule Action, on page 38
• Intrusion Event Notification Filters in an Intrusion Policy, on page 40
• Adding Intrusion Rule Comments, on page 44
• Converting Snort 2 Custom Rules to Snort 3, on page 45
• Uploading Custom Rules, on page 46
• Adding Rule Groups with Custom Rules to an Intrusion Policy, on page 47
• Managing Custom Rules in Snort 3, on page 48
• Deleting Custom Rules, on page 48
• Deleting Rule Groups, on page 49

Intrusion Rule Tuning Basics


You can configure rule states and other settings for shared object rules, standard text rules, and inspector rules.
You enable a rule by setting its rule state to Alert or to Block. Enabling a rule causes the system to generate
events on traffic matching the rule. Disabling a rule stops processing of the rule. You can also set your intrusion
policy so that a rule set to Block generates events on, and drops, matching traffic.
You can filter rules to display a subset of rules, enabling you to select the exact set of rules where you want
to change rule states or rule settings.
When an intrusion rule or rule argument requires a disabled inspector, the system automatically uses it with
its current configuration even though it remains disabled in the network analysis policy’s web interface.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


35
Intrusion Detection and Prevention in Snort 3
Intrusion Rule Types

Intrusion Rule Types


An intrusion rule is a specified set of keywords and arguments that the system uses to detect attempts to exploit
vulnerabilities in your network. As the system analyzes network traffic, it compares packets against the
conditions specified in each rule, and triggers the rule if the data packet meets all the conditions specified in
the rule.
An intrusion policy contains:
• intrusion rules, which are subdivided into shared object rules and standard text rules
• inspector rules, which are associated with a detection option of the packet decoder or with one of the
inspectors included with the Firepower System

The following table summarizes attributes of these rule types:

Table 2: Intrusion Rule Types

Type Generator ID Snort ID (SID) Source Can Copy? Can Edit?


(GID)

shared object rule 3 lower than Cisco Talos Intelligence Group (Talos) yes limited
1000000

standard text rule 1 lower than Talos yes limited


1000000
(Global
domain or
legacy GID)

1000 - 2000 1000000 or higher Created or imported by user yes yes


(descendant
domain)

preprocessor rule decoder- or lower than Talos no no


preprocessor- 1000000
specific
1000000 or higher Generated by the system during option no no
configuration

You cannot save changes to any rule created by Talos, but you can save a copy of a modified rule as a custom
rule. You can modify either variables used in the rule or rule header information (such as source and destination
ports and IP addresses). In a multidomain deployment, rules created by Talos belong to the Global domain.
Administrators in descendant domains can save local copies of the rules, which they can then edit.
For the rules it creates, Talos assigns default rule states in each default intrusion policy. Most preprocessor
rules are disabled by default and must be enabled if you want the system to generate events for preprocessor
rules and, in an inline deployment, drop offending packets.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


36
Intrusion Detection and Prevention in Snort 3
License Requirements for Intrusion Rules

License Requirements for Intrusion Rules


FTD License
Threat

Classic License
Protection

Requirements and Prerequisites for Intrusion Rules


Model Support
Any.

Supported Domains
Any

User Roles
• Admin
• Intrusion Admin

Custom Rules in Snort 3


You can create a custom intrusion rule by importing a local rule file. The rule file can either have a .txt or
.rules extension. The system saves the custom rule in the local rule category, regardless of the method you
used to create it. A custom rule must belong to a rule group. However, a custom rule can be a part of two or
more groups as well.
When you create a custom intrusion rule, the system assigns it a unique rule number, which has the format
GID:SID:Rev. The elements of this number are:

• GID—Generator ID. For custom rules, it is not necessary to specify the GID. The system automatically
generates the GID based on whether you are in the Global domain or a sub-domain while uploading the
rules. For all standard text rules, this value is 2000 for a Global domain.
• SID—Snort ID. Indicates whether the rule is a local rule of a system rule. When you create a new rule,
the system assigns the next available SID for a local rule.
SID numbers for local rules start at 1000000, and the SID for each new local rule is incremented by one.
• Rev—The revision number. For a new rule, the revision number is one. Each time you modify a custom
rule the revision number should be incremented by one.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


37
Intrusion Detection and Prevention in Snort 3
Viewing Snort 3 Intrusion Rules in an Intrusion Policy

In a custom standard text rule, you set the rule header settings and the rule keywords and arguments. You can
use the rule header settings to focus the rule to only match traffic using a specific protocol and traveling to or
from specific IP addresses or ports.

Note Snort 3 custom rules cannot be edited. Ensure custom rules have a valid classification message for classtype
within the rule text. If you import a rule without a classification or wrong classification, then delete and recreate
the rule.

Viewing Snort 3 Intrusion Rules in an Intrusion Policy


You can adjust how rules are displayed in the intrusion policy. You can also display the details for a specific
rule to see rule settings, rule documentation, and other rule specifics.

Step 1 Choose Policies > Intrusion.


Step 2 Click Snort 3 Version next to the policy.
Step 3 While viewing the rules, you can:
• Filter the rules.
• Select a different rule group to see rules related to that group.
• View an intrusion rule’s details.
• View rule comments.
• View rule documentation.

Intrusion Rule Action


Intrusion rule action allow you to enable or disable the rule within an individual intrusion policy, as well as
specify which action the system takes if monitored conditions trigger the rule.
The Cisco Talos Intelligence Group (Talos) sets the default action of each intrusion and inspector rule in each
default policy. For example, a rule may be enabled in the Security over Connectivity default policy and disabled
in the Connectivity over Security default policy. Talos sometimes uses a rule update to change the default
action of one or more rules in a default policy. If you allow rule updates to update your base policy, you also
allow the rule update to change the default action of a rule in your policy when the default action changes in
the default policy you used to create your policy (or in the default policy it is based on). Note, however, that
if you have changed the rule action, the rule update does not override your change.
When you create an intrusion rule, it inherits the default actions of the rules in the default policy you use to
create your policy.

Intrusion Rule Action Options


In an intrusion policy, you can set a rule’s action to the following values:

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


38
Intrusion Detection and Prevention in Snort 3
Setting Intrusion Rule Action

Alert
You want the system to detect a specific intrusion attempt and generate an intrusion event when it finds
matching traffic. When a malicious packet crosses your network and triggers the rule, the packet is sent
to its destination and the system generates an intrusion event. The malicious packet reaches its target,
but you are notified via the event logging.
Block
You want the system to detect a specific intrusion attempt, drop the packet containing the attack, and
generate an intrusion event when it finds matching traffic. The malicious packet never reaches its target,
and you are notified via the event logging.
Disable
You do not want the system to evaluate matching traffic.

Note Choosing either the Alert or Block options enables the rule. Choosing Disable disables the rule.
Cisco strongly recommends that you do not enable all the intrusion rules in an intrusion policy. The
performance of your managed device is likely to degrade if all rules are enabled. Instead, tune your rule set
to match your network environment as closely as possible.

Setting Intrusion Rule Action


Intrusion rule actions are policy-specific.

Step 1 Choose Policies > Intrusion.


Step 2 Click Snort 3 Version next to the policy you want to edit.
Tip This page indicates the total number of disabled rules, the total number of enabled rules set to Alert, the total
number of enabled rules set to Block, and the total number of Overridden rules.

Step 3 Choose the rule or rules where you want to set the rule action.
Step 4 Choose one of the following from the Rule Action drop-down box:
• Alert
• Block
• Disable

Step 5 Click Save.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


39
Intrusion Detection and Prevention in Snort 3
Intrusion Event Notification Filters in an Intrusion Policy

Intrusion Event Notification Filters in an Intrusion Policy


The importance of an intrusion event can be based on frequency of occurrence, or on source or destination
IP address. In some cases you may not care about an event until it has occurred a certain number of times.
For example, you may not be concerned if someone attempts to log into a server until they fail a certain number
of times. In other cases, you may only need to see a few occurrences to know there is a widespread problem.
For example, if a DoS attack is launched against your web server, you may only need to see a few occurrences
of an intrusion event to know that you need to address the situation. Seeing hundreds of the same event only
overwhelms your system.

Intrusion Event Thresholds


You can set thresholds for individual rules to limit the number of times the system logs and displays an
intrusion event based on how many times the event is generated within a specified time period. This can
prevent you from being overwhelmed with a large number of identical events. You can set thresholds per
shared object rule, standard text rule, or inspector rule.

Intrusion Event Thresholds Configuration


To set a threshold, first specify the thresholding type.

Table 3: Thresholding Options

Option Description

Limit Logs and displays events for the specified number of packets
(specified by the Count argument) that trigger the rule during the
specified time period. For example, if you set the type to Limit,
the Count to 10, and the Seconds to 60, and 14 packets trigger
the rule, the system stops logging events for the rule after
displaying the first 10 that occur within the same minute.

Threshold Logs and displays a single event when the specified number of
packets (specified by the Count argument) trigger the rule during
the specified time period. Note that the counter for the time restarts
after you hit the threshold count of events and the system logs
that event. For example, you set the type to Threshold, Count
to 10, and Seconds to 60, and the rule triggers 10 times by second
33. The system generates one event, then resets the Seconds and
Count counters to 0. The rule then triggers another 10 times in
the next 25 seconds. Because the counters reset to 0 at second 33,
the system logs another event.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


40
Intrusion Detection and Prevention in Snort 3
Intrusion Event Thresholds Configuration

Option Description

Both Logs and displays an event once per specified time period, after
the specified number (count) of packets trigger the rule. For
example, if you set the type to Both, Count to two, and Seconds
to 10, the following event counts result:
• If the rule is triggered once in 10 seconds, the system does
not generate any events (the threshold is not met)
• If the rule is triggered twice in 10 seconds, the system
generates one event (the threshold is met when the rule
triggers the second time)
• If the rule is triggered four times in 10 seconds, the system
generates one event (the threshold is met when the rule
triggers the second time, and following events are ignored)

Next, specify tracking, which determines whether the event threshold is calculated per source or destination
IP address.

Table 4: Thresholding IP Options

Option Description

Source Calculates event instance count per source IP address.

Destination Calculates event instance count per destination IP address.

Finally, specify the number of instances and time period that define the threshold.

Table 5: Thresholding Instance/Time Options

Option Description

Count The number of event instances per specified time period per
tracking IP address required to meet the threshold.

Seconds The number of seconds that elapse before the count resets. If you
set the threshold type to limit, the tracking to Source IP, the count
to 10, and the seconds to 10, the system logs and displays the first
10 events that occur in 10 seconds from a given source port. If
only 7 events occur in the first 10 seconds, the system logs and
displays those; if 40 events occur in the first 10 seconds, the
system logs and displays 10, then begins counting again when the
10-second time period elapses.

Note that you can use intrusion event thresholding alone or in any combination with rate-based attack
prevention, the detection_filter keyword, and intrusion event suppression.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


41
Intrusion Detection and Prevention in Snort 3
Setting Threshold for an Intrusion Rule in Snort 3

Tip You can also add thresholds from within the packet view of an intrusion event.

Setting Threshold for an Intrusion Rule in Snort 3


You can set a single threshold for a rule from the Rule Detail page. Adding a threshold overwrites any existing
threshold for the rule.

Step 1 Choose Objects > Intrusion Rules .


Step 2 Click Snort 3 All Rules tab.
Step 3 From an intrusion rule’s Alert Configuration column, click the None link.

Step 4 Click Edit ( ).


Step 5 In the Alert Configuration window, click the Threshold tab.
Step 6 From the Type drop-down list, choose the type of threshold you want to set:
• Choose Limit to limit notification to the specified number of event instances per time period.
• Choose Threshold to provide notification for each specified number of event instances per time period.
• Choose Both to provide notification once per time period after a specified number of event instances.

Step 7 Choose Source, or Destination in Track By to indicate whether you want the event instances tracked by source or
destination IP address.
Step 8 Enter the number of event instances you want to use as your threshold in the Count field.
Step 9 Enter a number that specifies the time period, in seconds, for which event instances are tracked in the Seconds field.
Step 10 Click OK.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Viewing and Deleting Intrusion Event Thresholds


You may want to view or delete an existing threshold setting for a rule. You can use the Rules Details view
to display the configured settings for a threshold to see if they are appropriate for your system. If they are not,
you can add a new threshold to overwrite the existing values.

Step 1 Choose Objects > Intrusion Rules.


Step 2 Click Snort 3 All Rules tab.
Step 3 Choose the rule with a configured threshold as mentioned in the Alert Configuration column.
Step 4 To remove the threshold for the rule, click Threshold link in the Alert Configuration column.
Step 5 Click Edit ( ).
Step 6 Click Threshold tab.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


42
Intrusion Detection and Prevention in Snort 3
Intrusion Policy Suppression Configuration

Step 7 Click Reset.


Step 8 Click Save.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Intrusion Policy Suppression Configuration


You can suppress intrusion event notification when a specific IP address or range of IP addresses triggers a
specific rule or inspector. This is useful for eliminating false positives. For example, if you have a mail server
that transmits packets that look like a specific exploit, you might suppress event notification for that event
when it is triggered by your mail server. The rule triggers for all packets, but you only see events for legitimate
attacks.

Intrusion Policy Suppression Types


Note that you can use intrusion event suppression alone or in any combination with rate-based attack prevention,
the detection_filter keyword, and intrusion event thresholding.

Tip You can add suppressions from within the packet view of an intrusion event. You can also access suppression
settings by using the Alert Configuration column on the intrusion rules editor page (Objects > Intrusion
Rules > Snort 3 All Rules).

Setting Suppression for an Intrusion Rule in Snort 3


You can set one or more suppressions for a rule in your intrusion policy.

Before you begin


Ensure you create the required network objects to be added for source or destination suppression.

Step 1 Choose Objects > Intrusion Rules.


Step 2 Click Snort 3 All Rules tab.
Step 3 Click the None link in the intrusion rule’s Alert Configuration column,.

Step 4 Click Edit ( ).


Step 5 From the Suppressions tab, click the add icon (+) next to any of the following options:
• Choose Source Networks to suppress events generated by packets originating from a specified source IP address.
• Choose Destination Networks to suppress events generated by packets going to a specified destination IP address.

Step 6 Select any of the preset networks in the Network drop-down list.
Step 7 Click Save.
Step 8 (Optional) Repeat the last three steps if required.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


43
Intrusion Detection and Prevention in Snort 3
Viewing and Deleting Suppression Conditions

Step 9 Click Save in the Alert Configuration window.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Viewing and Deleting Suppression Conditions


You may want to view or delete an existing suppression condition. For example, you can suppress event
notification for packets originating from a mail server IP address because the mail server normally transmits
packets that look like exploits. If you then decommission that mail server and reassign the IP address to another
host, you should delete the suppression conditions for that source IP address.

Step 1 Choose Objects > Intrusion Rules.


Step 2 Click Snort 3 All Rules tab.
Step 3 Choose the rule for which you want to view or delete suppressions.
Step 4 Click Supression in the Alert Configuration column.
Step 5 Click Edit ( ).
Step 6 Click Supressions tab.

Step 7 Remove the supression by clicking Clear ( ) next to the supression.


Step 8 Click Save.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Adding Intrusion Rule Comments


You can add comments to rules in your intrusion policy. Comments added this way are policy-specific; that
is, comments you add to a rule in one intrusion policy are not visible in other intrusion policies.

Step 1 Choose Policies > Intrusion.


Step 2 Click Snort 3 Version next to the policy you want to edit.
Step 3 Choose the rule where you want to add a comment.

Step 4 Click Comment ( ) under the Comments column.


Step 5 In the Comments field, enter the rule comment.
Step 6 Click Add Comment.
Step 7 Click Save.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


44
Intrusion Detection and Prevention in Snort 3
Converting Snort 2 Custom Rules to Snort 3

Tip
The system displays a Comment ( ) next to the rule in the Comments column.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Converting Snort 2 Custom Rules to Snort 3


You can either convert all the custom Snort 2 rules across all the different intrusion policies in the FMC to
Snort 3 in one go, or you can individually convert the Snort 2 custom rules per intrusion policy to Snort 3.
Follow the steps which are suitable to you.

Converting all Snort 2 Custom Rules across all Intrusion Policies to Snort 3

Step 1 Choose Objects > Intrusion Rules .


Step 2 Click Snort 3 All Rules tab.
Step 3 Ensure All Rules is selected in the left pane.
Step 4 Click the Tasks drop-down list and choose:
• Convert and import—To automatically convert all the Snort 2 custom rules across all the intrusion policies to
Snort 3 and import them into FMC as Snort 3 custom rules.
• Convert and download—To automatically convert all the Snort 2 custom rules across all the intrusion policies to
Snort 3 and download them into your local system.

Step 5 Click OK.


Note • If you selected Convert and import in the previous step, then all the converted rules are saved under a
newly created rule group All Snort 2 Converted Global under Local Rules.
• If you selected Convert and download in the previous step, then save the rules file locally. You can
review the converted rules in the downloaded file and later upload them by following the steps in Uploading
Custom Rules, on page 46.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Converting Snort 2 Custom Rules of a Single Intrusion Policy to Snort 3

Step 1 Select Policies > Intrusion.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


45
Intrusion Detection and Prevention in Snort 3
Uploading Custom Rules

Step 2 In the Intrusion Policies tab, click Show Snort 3 Sync status.
Step 3 Click the Sync icon ( ) of the intrusion policy.
Note If the Snort 2 and the Snort 3 versions of the intrusion policy are synchronized, then the Sync icon is in green
( ). It indicates that there are no custom rules to be converted.

Step 4 Read through the summary and click the Custom Rules tab.
Step 5 Choose:
• Import converted rules to this policy—To convert the Snort 2 custom rules in the intrusion policy to Snort 3 and
import them into FMC as Snort 3 custom rules.
• Download converted rules—To convert the Snort 2 custom rules in the intrusion policy to Snort 3 and download
them into your local system. You can review the converted rules in the downloaded file and later upload the file by
clicking the upload icon.

Step 6 Click Re-Sync.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Uploading Custom Rules


Uploading custom rules in the FMC adds the custom rules that you have created locally to the list of all the
Snort 3 rules.

Step 1 Choose Objects > Intrusion Rules.


Step 2 Click Snort 3 All Rules tab.
Step 3 Click the Tasks drop-down list.
Step 4 Click Upload.
Step 5 Drag and drop the .txt or .rules file that contains the Snort 3 custom rules that you have created.
Note You may also click the dotted-line box to browse to a local folder to select the file.

Step 6 Click OK.


Note If there are any errors in the selected file, then you cannot proceed further. You can download the file with
errors and Replace it after fixing the errors.

Step 7 Select a local rule group to add the new rules to that group.
You can also create a new custom rule group (by clicking the Create New Custom Rule Group link) and then add
the rules to the new group.
Note If there are no existing local rule groups, then proceed by clicking Create New Custom Rule Group to
proceed. Enter a Name for the new rule group and click Save.

Step 8 Choose either of the following:

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


46
Intrusion Detection and Prevention in Snort 3
Adding Rule Groups with Custom Rules to an Intrusion Policy

• Merge Rules to merge the new rules that you are adding with the existing rules in the rule group.
• Replace all rules in the group with file contents to replace all the exiting rules with the new rules that you are
adding.

Note If you have selected more than one rule group in the previous step, then only the Merge Rules option is
available.

Step 9 Click Next.


Review the summary to know the new rule IDs that are being added and optionally download it.

Step 10 Click Finish.

Important The rule action of all the uploaded rules is in the disabled state. You have to change them to the required state
to ensure the rules are active.

What to do next
• Uploading custom rules in the FMC adds the custom rules that you have created to the list of all the Snort
3 rules. To enforce these custom rules on the traffic, add and enable these rules in the required intrusion
policies. For information on adding rule groups with custom rules to an intrusion policy, see Adding
Rule Groups with Custom Rules to an Intrusion Policy, on page 47. For information on enabling custom
rules, see Managing Custom Rules in Snort 3, on page 48.
• Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Adding Rule Groups with Custom Rules to an Intrusion Policy


Custom rules that are uploaded in the system have to be enabled in an intrusion policy to enforce those rules
on the traffic. After uploading custom rules on FMC, add the rule group with the new custom rules in the
intrusion policy.

Step 1 Choose Policies > Intrusion.


Step 2 In the Intrusion Policies tab, click the Snort 3 Version of the intrusion policy.
Step 3 Click Add (+) next to the Rule Groups search bar.
Step 4 Expand the Local Rules group.
Step 5 Check the check box next to the uploaded custom rules group.
Step 6 Click Save.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


47
Intrusion Detection and Prevention in Snort 3
Managing Custom Rules in Snort 3

Managing Custom Rules in Snort 3


Custom rules that are uploaded in the system have to be added to an intrusion policy and enabled to enforce
those rules on the traffic. You can enable the uploaded custom rules across all policies or selectively on
individual policies.
Follow the steps to enable custom rules in one or many intrusion policies:

Step 1 Choose Objects > Intrusion Rules.


Step 2 Click Snort 3 All Rules tab.
Step 3 Expand Local Rules.
Step 4 Select the required rule group.
Step 5 Select the rules by checking the check boxes next to them.
Step 6 Select Per Intrusion Policy from the Rule Actions drop-down list.
Step 7 Choose:
• All Policies—to have the same rule actions for all the rules to be added.
• Per Intrusion Policy—to have different rule actions for each intrusion policy.

Step 8 Set the rule actions:


• If you selected All Policies in the previous step, then select the required rule action from the Select Override state
drop-down list.
• If you selected Per Intrusion Policy in the previous step, then select the Rule Action against the policy name. To
add more policies, click Add Another.

Step 9 Optionally, add a comment in the Comments text box.


Step 10 Click Save.

What to do next
Deploy the changes on the device. See, Deploy Configuration Changes, on page 33.

Deleting Custom Rules


Step 1 Choose Objects > Intrusion Rules.
Step 2 Click Snort 3 All Rules tab.
Step 3 Expand Local Rules in the left pane.
Step 4 Select the folder that contains the rules.
Step 5 Check the check boxes of the rules you want to delete.
Step 6 Ensure that the rule action for all the rules that you have selected is Disable.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


48
Intrusion Detection and Prevention in Snort 3
Deleting Rule Groups

If required, follow the steps below to disable the rule action for multiple selected rules:
a) From the Rule Actions drop-down box, select Per Intrusion Policy.
b) Select All Policies radio button.
c) Select Disable from the Select Override state drop-down list.
d) Click Save.
e) Check the check boxes of the rules you want to delete.
Step 7 From the Rule Actions drop-down box, select Delete.
Step 8 Click Delete in the Delete Rules pop-up window.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Deleting Rule Groups


Before you begin
Exclude the rule group you want to delete from all intrusion policies where you have included it. For steps
on excluding a rule group from an intrusion policy, see Editing Snort 3 Intrusion Policies, on page 28.

Step 1 Choose Objects > Intrusion Rules.


Step 2 Click Snort 3 All Rules tab.
Step 3 Expand Local Rules in the left pane.
Step 4 Select the rule group to be deleted.
Step 5 Ensure the rule action for all the rules in the group is set to Disable before proceeding.
If the rule action for any of the rules is anything other than Disable, then you cannot delete the rule group. If required,
follow the steps below to disable the rule action for all the rules:
a) Check the check box below the Rule Actions drop-down list to select all the rules in the group.
b) From the Rule Actions drop-down box, select Per Intrusion Policy.
c) Select All Policies radio button.
d) Select Disable from the Select Override state drop-down list.
e) Click Save.

Step 6 Click the Delete ( ) next to the rule group.


Step 7 Click OK in the Delete Rule Group pop-up window.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


49
Intrusion Detection and Prevention in Snort 3
Deleting Rule Groups

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


50
CHAPTER 5
Tailoring Intrusion Protection to Your Network
Assets
The following topics describe how to use Firepower recommended rules:
• Snort 3 Rule Changes in LSP Updates , on page 51
• About Firepower Recommended Rules, on page 51
• Generating and Applying Firepower Recommendations in Snort 3, on page 52

Snort 3 Rule Changes in LSP Updates


During regular Snort 3 intrusion rule (LSP) updates, an existing system-defined intrusion rule may be replaced
with a new intrusion rule. There could be possibilities of a single rule being replaced with multiple rules, or
multiple rules being replaced with a single rule. This would occur in case where better detection is possible
for which rules are combined or expanded. For better management, some existing system-defined rules may
also be removed as a part of the LSP update.
To get notifications for changes to any overridden system-defined rules during LSP updates, ensure that the
Retain user overrides for deleted Snort 3 rules check box is checked. As a system default, this check box
is checked. When this check box is checked, the system retains the rule overrides in the new replacement rules
that are added as a part of the LSP update. The notifications are shown in the Tasks tab under the Notifications
icon that is located next to Cog ( ).

To navigate to the Retain user overrides for deleted Snort 3 rules check box, click Cog ( ), and then
choose Configuration > Intrusion Policy Preferences.

About Firepower Recommended Rules


You can use Firepower intrusion rule recommendations to associate the operating systems, servers, and client
application protocols detected on your network with rules specifically written to protect those assets. This
allows you to tailor your intrusion policy to the specific needs of your monitored network.
The system makes an individual set of recommendations for each intrusion policy. It typically recommends
rule state changes for standard text rules and shared object rules. However, it can also recommend changes
for inspector and decoder rules.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


51
Intrusion Detection and Prevention in Snort 3
Generating and Applying Firepower Recommendations in Snort 3

When you generate rule state recommendations, you can use the default settings or configure advanced settings.
Advanced settings allow you to:
• Redefine which hosts on your network the system monitors for vulnerabilities
• Influence which rules the system recommends based on rule overhead
• Specify whether to generate recommendations to disable rules

You can also choose either to use the recommendations immediately or to review the recommendations (and
affected rules) before accepting them.
Choosing to use recommended rule states adds a read-only Firepower Recommendations layer to your intrusion
policy, and subsequently choosing not to use recommended rule states removes the layer.
You can schedule a task to generate recommendations automatically based on the most recently saved
configuration settings in your intrusion policy.
The system does not change rule states that you set manually:
• Manually setting the states of specified rules before you generate recommendations prevents the system
from modifying the states of those rules in the future.
• Manually setting the states of specified rules after you generate recommendations overrides the
recommended states of those rules.

Tip The intrusion policy report can include a list of rules with rule states that differ
from the recommended state.

While displaying the recommendation-filtered Rules page, or after accessing the Rules page directly from the
navigation panel or the Policy Information page, you can manually set rule states, sort rules, and take any of
the other actions available on the Rules page, such as suppressing rules, setting rule thresholds, and so on.

Note The Cisco Talos Intelligence Group (Talos) determines the appropriate state of each rule in the system-provided
policies. If you use a system-provided policy as your base policy, and you allow the system to set your rules
to the Firepower recommended rule state, the rules in your intrusion policy match the settings recommended
by Cisco for your network assets.

Generating and Applying Firepower Recommendations in Snort


3
Starting or stopping use of Firepower recommendations may take several minutes, depending on the size of
your network and intrusion rule set.
Firepower recommendations cannot be generated for the Snort 3 version directly. Generate the Firepower
recommendations for Snort 2 version of the intrusion policy and then follow the steps listed here to migrate
the recommended rule settings to Snort 3.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


52
Intrusion Detection and Prevention in Snort 3
Generating and Applying Firepower Recommendations in Snort 3

Before you begin


Firepower recommendations have the following requirements:
• FTD License—Threat
• Classic License—Protection
• User Roles—Admin or Intrusion Admin

Step 1 Choose Policies > Intrusion.


Step 2 Click Snort 2 Version button of the intrusion policy.
Step 3 Generate and apply recommendations in the Snort 2 version of the intrusion policy.
Refer the Generating and Applying Firepower Recommendations topic in the latest version of the Firepower Management
Center Configuration Guide, and perform the steps provided in the topic.

Step 4 Synchoronize the Snort 2 rule changes with Snort 3.


For steps, see Synchronize Snort 2 Rules with Snort 3 , on page 21.

What to do next
Deploy configuration changes; see Deploy Configuration Changes, on page 33.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


53
Intrusion Detection and Prevention in Snort 3
Generating and Applying Firepower Recommendations in Snort 3

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


54
PA R T II
Advanced Network Analysis in Snort 3
• Getting Started with Network Analysis Policies, on page 57
CHAPTER 6
Getting Started with Network Analysis Policies
The following topics describe how to get started with network analysis policies:
• Network Analysis Policy Basics, on page 57
• License Requirements for Network Analysis Policies, on page 58
• Requirements and Prerequisites for Network Analysis Policies, on page 58
• Managing Network Analysis Policies, on page 58
• Snort 3 Definitions and Terminologies for Network Analysis Policy, on page 59
• Custom Network Analysis Policy Creation for Snort 3, on page 61
• Network Analysis Policy Settings and Cached Changes, on page 84

Network Analysis Policy Basics


Network analysis policies govern many traffic preprocessing options, and are invoked by advanced settings
in your access control policy. Network analysis-related preprocessing occurs after Security Intelligence
matching and SSL decryption, but before intrusion or file inspection begins.
By default, the system uses the Balanced Security and Connectivity network analysis policy to preprocess all
traffic handled by an access control policy. However, you can choose a different default network analysis
policy to perform this preprocessing. For your convenience, the system provides a choice of several
non-modifiable network analysis policies, which are tuned for a specific balance of security and connectivity
by the Cisco Talos Intelligence Group (Talos). You can also create a custom network analysis policy with
custom preprocessing settings.

Tip System-provided intrusion and network analysis policies are similarly named but contain different
configurations. For example, the Balanced Security and Connectivity network analysis policy and the Balanced
Security and Connectivity intrusion policy work together and can both be updated in intrusion rule updates.
However, the network analysis policy governs mostly preprocessing options, whereas the intrusion policy
governs mostly intrusion rules. Network analysis and intrusion policies work together to examine your traffic.

You can also tailor traffic preprocessing options to specific security zones, networks, and VLANs by creating
multiple custom network analysis policies, then assigning them to preprocess different traffic. (Note that ASA
FirePOWER cannot restrict preprocessing by VLAN.)

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


57
Advanced Network Analysis in Snort 3
License Requirements for Network Analysis Policies

License Requirements for Network Analysis Policies


FTD License
Threat

Classic License
Protection

Requirements and Prerequisites for Network Analysis Policies


Model Support
Any

Supported Domains
Any

User Roles
• Admin
• Intrusion Admin

Managing Network Analysis Policies


In a multidomain deployment, the system displays policies created in the current domain, which you can edit.
It also displays policies created in ancestor domains, which you cannot edit. To view and edit policies created
in a lower domain, switch to that domain.

Step 1 Choose one of the following paths to acess the nework analysis policy.
• Policies > Access Control, then click Network Analysis Policy
• Policies > Access Control > Intrusion, then click Network Analysis Policy
• Policies > Intrusion > Network Analysis Policy

Note If your custom user role limits access to the first path listed here, use the second path to access the policy.

Step 2 Manage your network analysis policy:


• Compare—Click Compare Policies; see Comparing Policies in the Firepower Management Center Configuration
Guide.
• Create—If you want to create a new network analysis policy, click Create Policy.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


58
Advanced Network Analysis in Snort 3
Snort 3 Definitions and Terminologies for Network Analysis Policy

Two versions of the network analysis policy are created, a Snort 2 Version and a Snort 3 Version.
• For the Snort 2 version, proceed as described in Custom Network Analysis Policy Creation for Snort 2 in the
Firepower Management Center Configuration Guide.
• For the Snort 3 version, proceed as described in Custom Network Analysis Policy Creation for Snort 3, on page
61.

• Delete—If you want to delete a network analysis policy, click Delete icon, then confirm that you want to delete the
policy. You cannot delete a network analysis policy if an access control policy references it.
If the controls are dimmed, the configuration belongs to an ancestor domain, or you do not have permission to modify
the configuration.
• Edit—If you want to edit an existing network analysis policy, click Edit icon.
If View ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have permission to
modify the configuration.
• Report—Click Report icon; see Generating Current Policy Reports in the Firepower Management Center
Configuration Guide.

Snort 3 Definitions and Terminologies for Network Analysis


Policy
The following table lists the Snort 3 concepts and terms used in the Network Analysis Policy.

Table 6: Snort 3 Definitions and Terminologies for Network Analysis Policy

Term Description

Inspectors Inspectors are plugins that process packets (similar


to the Snort 2 preprocessor).

Binder inspector Binder inspector defines the flow when a particular


inspector has to be accessed and taken into
consideration.
When the traffic matches the conditions defined in
the binder inspector, only then do the
values/configurations for that inspector come into
effect.
For more information, see Binder Inspector in Custom
Network Analysis Policy Creation for Snort 3, on
page 61.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


59
Advanced Network Analysis in Snort 3
Snort 3 Definitions and Terminologies for Network Analysis Policy

Term Description

Singleton inspectors Singleton inspectors contain one instance. These


inspectors do not support adding more instances like
multiton inspectors. Settings of singleton inspector
are applied to the entire traffic matching that inspector
and not to a specific traffic segment.
For more information, see Singleton Inspectors in
Custom Network Analysis Policy Creation for Snort
3, on page 61.

Multiton inspectors Multiton inspectors contain multiple instances which


you can configure as needed. These inspectors support
configuring settings based on specific conditions, such
as network, port, and VLAN. One set of supported
settings is called an instance.
For more information, see Multiton Inspectors in
Custom Network Analysis Policy Creation for Snort
3, on page 61.

Schema The schema file is based on the OpenAPI JSON


specification, and it validates the content that you
upload or download. You can download the schema
file and open it using any third-party JSON editor,
such as Swagger editor. The schema file helps you to
identify what parameters can be configured for
inspectors with their corresponding allowed values,
range, and accepted patterns to be used.
For more information, see Customize the Network
Analysis Policy, on page 67.

Sample file It is a pre-existing template that contains example


configurations to help you with configuring the
inspectors.
You can refer to the example configurations included
in the sample file and make any changes that you may
require.
For more information, see Customize the Network
Analysis Policy, on page 67.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


60
Advanced Network Analysis in Snort 3
Custom Network Analysis Policy Creation for Snort 3

Term Description

Full configuration You can download the entire inspector configurations


in a single file.
All information regarding the inspector configuration
is available in this file.
The full configuration is a merged configuration of
the default configuration (rolled out as a part of the
LSP updates by Cisco Talos) and the custom NAP
inspector configurations.
For more information, see Customize the Network
Analysis Policy, on page 67.

Overridden configuration In the Snort 3 Version of the network analysis policy


page:
• Under Actions > Upload, you can click
Overridden Configuration to upload the JSON
file that contains the overridden configuration.
• Under Actions > Download, you can click
Overridden Configuration to download the
inspector configuration that has been overridden.
If you have not overridden any inspector
configuration, then this option is disabled. When
you override the inspector configuration, then
this option is enabled automatically to allow you
to download.

For more information, see Customize the Network


Analysis Policy, on page 67.

Related Topics
Custom Network Analysis Policy Creation for Snort 3, on page 61
Customize the Network Analysis Policy, on page 67
Network Analysis Policy Mapping, on page 65

Custom Network Analysis Policy Creation for Snort 3


The default network analysis policy is tuned for typical network requirements and optimal performance.
Usually, the default network analysis policy suffices most network requirements and you might not need to
customize the policy. However, when you have a specific network requirement or when you are facing
performance issues, the default network analysis policy can be customized. Note that customising the network
analysis policy is an advanced configuration that should be done only by advanced users or Cisco support.
Network analysis policy configuration for Snort 3 is a data-driven model, which is based on JSON and JSON
Schema. Schema is based on the OpenAPI specification, and it helps you get a view of the supported inspectors,
settings, settings type, and valid values. The Snort 3 inspectors are plugins that process packets (similar to
the Snort 2 preprocessor). Network analysis policy configuration is available to download in the JSON format.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


61
Advanced Network Analysis in Snort 3
Custom Network Analysis Policy Creation for Snort 3

In Snort 3, the list of inspectors and settings are not in a one-to-one mapping with the Snort 2 list of
preprocessors and settings. Also, the number of inspectors and settings available in FMC is a subset of the
inspectors and settings that Snort 3 supports. See https://snort.org/snort3 for more information on Snort 3.
See https://www.cisco.com/go/snort3-inspectors for more information on the inspectors available in FMC.

Note • While upgrading the FMC to the 7.0 release, the changes that were done in the Snort 2 version of the
network analysis policy are not migrated to Snort 3 after the upgrade.
• Unlike the intrusion policy, there is no option to synchronize Snort 2 network analysis policy settings to
Snort 3.

Default Inspector Updates


Lightweight Security Package (LSP) updates may contain new inspectors or modifications to integer ranges
for existing inspector configurations. Following the installation of an LSP, new inspectors and/or updated
ranges will be available under Inspectors in the Snort 3 Version of your network analysis policy.

Binder Inspector
Binder inspector defines the flow when a particular inspector has to be accessed and taken into consideration.
When the traffic matches the conditions defined in the binder inspector, only then the values/configurations
for that inspector come into effect. For example:
For the imap inspector, the binder defines the following condition when it has to be accessed. That is when:
• Service is equal to imap.
• Role is equal to any.

If these conditions are met, then use the type imap.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


62
Advanced Network Analysis in Snort 3
Custom Network Analysis Policy Creation for Snort 3

Singleton Inspectors
Singleton inspectors contain a single instance. These inspectors do not support adding more instances like
multiton inspectors. Settings of singleton inspector are applied to the entire traffic and not to a specific traffic
segment.
For example:

{
"normalizer":{
"enabled":true,
"type":"singleton",
"data":{
"ip4":{
"df":true
}
}
}
}

Multiton Inspectors
Multiton inspectors contain multiple instances which you can configure as needed. These inspectors support
configuring settings based on specific conditions, such as network, port, and VLAN. One set of supported

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


63
Advanced Network Analysis in Snort 3
Custom Network Analysis Policy Creation for Snort 3

settings is called an instance. There is a default instance, and you can also add additional instances based on
specific conditions. If the traffic matches that condition, the settings from that instance are applied. Otherwise,
the settings from the default instance are applied. Also, the name of the default instance is the same as the
inspector's name.
For a multiton inspector, when you upload the overridden inspector configuration, you also need to
include/define a matching binder condition (conditions under when the inspector has to be accessed or used)
for each instance in the JSON file, otherwise, the upload will result in an error. You can also create new
instances, but make sure that you include a binder condition for every new instance that you create to avoid
errors.
For example:
• Multiton inspector where the default instance is modified.
{
"http_inspect":{
"enabled":true,
"type":"multiton",
"instances":[
{
"name":"http_inspect",
"data":{
"response_depth":5000
}
}
]
}
}

• Multiton inspector where the default instance and default binder is modified.
{
"http_inspect":{
"enabled":true,
"type":"multiton",
"instances":[
{
"name":"http_inspect",
"data":{
"response_depth":5000
}
}
]
},
"binder":{
"type":"binder",
"enabled":true,
"rules":[
{
"use":{
"type":"http_inspect"
},
"when":{
"role":"any",
"ports":"8080",
"proto":"tcp",
"service":"http"
}
}
]
}
}

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


64
Advanced Network Analysis in Snort 3
Network Analysis Policy Mapping

• Multiton inspector where a custom instance and a custom binder is added.


{
"http_inspect":{
"enabled":true,
"type":"multiton",
"instances":[
{
"name":"http_inspect1",
"data":{
"response_depth":5000
}
}
]
},
"binder":{
"type":"binder",
"enabled":true,
"rules":[
{
"use":{
"type":"http_inspect",
"name":"http_inspect1"
},
"when":{
"role":"any",
"ports":"8080",
"proto":"tcp",
"service":"http"
}
}
]
}
}

Network Analysis Policy Mapping


For network analysis policies, Cisco Talos provides mapping information, which is used to find the
corresponding Snort 2 version of the policies for the Snort 3 version.
This mapping ensures that the Snort 3 version of policies has its equivalent Snort 2 version.

View Network Analysis Policy Mapping

Step 1 Go to Policies > Intrusion > Network Analysis Policies.


Step 2 Click NAP Mapping.
Step 3 Expand the arrow for View Mappings.
The Snort 3 network analysis policies that are automatically mapped to a Snort 2 equivalent policy are displayed.

Step 4 Click OK.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


65
Advanced Network Analysis in Snort 3
Create a Network Analysis Policy

Create a Network Analysis Policy


All the existing network analysis policies are available in FMC with their corresponding Snort 2 and Snort 3
versions. When you create a new network analysis policy, it is created with both the Snort 2 version and the
Snort 3 version.

Step 1 Go to Policies > Intrusion > Network Analysis Policies.


Step 2 Click Create Policy.
Step 3 Enter the Name and Description.
Step 4 Choose the Inspection Mode from the available choices.
• Detection
• Prevention

Step 5 Select a Base Policy and click Save.

The new network analysis policy is created with its corresponding Snort 2 Version and Snort 3 Version.

Modify the Network Analysis Policy


You can modify the network analysis policy to change its name, description, or the base policy.

Step 1 Go to Policies > Intrusion > Network Analysis Policies.


Step 2 Click Edit to change the name, description, inspection mode, or the base policy.
Note If you edit the network analysis policy name, description, base policy, and inspection mode, the edits are applied
to both the Snort 2 and Snort 3 versions. If you want to change the inspection mode for a specific version, then
you can do that from within the network analysis policy page for that respective version.

Step 3 Click Save.

Search for an Inspector on the Network Analysis Policy Page


On the Snort 3 version of the network analysis policy page, you may need to search for an inspector by entering
any relevant text in the search bar.

Step 1 Go to the Snort 3 Version of the network analysis policy.


Step 2 Enter an inspector's name or any relevant text to search for in the Search bar.
All the inspectors matching the text you search for are displayed.
For example, if you enter pop, then the pop inspector and the binder inspector are shown as matching results on the
screen.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


66
Advanced Network Analysis in Snort 3
Copy the Inspector Configuration

Related Topics
Examples of Custom Network Analysis Policy Configuration, on page 73
View the List of Inspectors with Overrides, on page 72
Snort 3 Definitions and Terminologies for Network Analysis Policy, on page 59
Customize the Network Analysis Policy, on page 67
Make Inline Edit for an Inspector to Override Configuration, on page 70

Copy the Inspector Configuration


You can copy the inspector configuration for the Snort 3 version of the network analysis policy according to
your requirements.

Step 1 Under Inspectors in the Snort 3 Version of the network analysis policy, expand the required inspector for which you
want to copy the configuration.
The default configuration is displayed on the left column and the overridden configuration is displayed on the right column
under the inspector.

Step 2 Click the Copy to clipboard icon to copy the inspector configuration to the clipboard for one or both of the following.
• Default Configuration on the left column
• Overridden Configuration on the right column

Step 3 Paste the copied inspector configuration to a JSON editor to make any edits you may require.

Related Topics
Customize the Network Analysis Policy, on page 67

Customize the Network Analysis Policy


You can customize the Snort 3 version of the network analysis policy according to your requirements.

Step 1 Click the Actions drop-down menu in the Snort 3 Version of the network analysis policy.
The following options are displayed:
• View Schema
• Download
• Schema
• Sample File / Template
• Full Configuration
• Overridden Configuration

• Upload

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


67
Advanced Network Analysis in Snort 3
Customize the Network Analysis Policy

• Overridden Configuration

Step 2 Click View Schema to open the schema file directly in a browser.

Step 3 Under Download, you can make use of the following options to download the schema file, sample file, full configuration,
or overridden configuration as needed.
These options provide you an insight about the allowed values, range, and patterns, existing and default inspector
configurations, and overridden inspector configurations.
a) Click Schema to download the schema file.
The schema file validates the content that you upload or download.You can download the schema file and open it
using any third-party JSON editor. The schema file helps you to identify what parameters can be configured for
inspectors with their corresponding allowed values, range, and accepted patterns to be used.
For example, for the arp_spoof_snort inspector, you can configure the hosts. The hosts include the mac and ip address
values. The schema file shows the following accepted pattern for these values.
• mac – pattern: ^([0-9A-Fa-f]{2}[:-]){5}([0-9A-Fa-f]{2})$
• ip – pattern: ^([0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}(/[0-9]{1,2}){0,1})$

You must provide the values, range, patterns according to the accepted ones in the schema file to be able to successfully
override the inspector configuration, otherwise, you get an error message.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


68
Advanced Network Analysis in Snort 3
Customize the Network Analysis Policy

b) Click Sample File / Template to use a pre-existing template that contains example configurations to help you with
configuring the inspectors.
You can refer to the example configurations included in the sample file and make any changes that you may require.
See for information.
c) Click Full Configuration to download the entire inspector configurations in a single file.
Instead of expanding the inspectors separately, you can download the full configuration to look out for the information
you need. All information regarding the inspector configuration is available in this file.
d) Click Overridden Configuration to download the inspector configuration that has been overridden.
If you have not overridden any inspector configuration, then this option is disabled. When you override the inspector
configuration, then this option is enabled automatically to allow you to download.

Step 4 To override the existing configuration, follow the steps.


You can choose to override an inspector configuration using the following ways.
• Make inline edits for an inspector directly on the FMC. See for steps on how you can make inline edits.
• Continue to follow the current procedure of using the Actions drop-down menu to upload the overridden configuration
file.
If you chose to make inline edits directly on the FMC, then you don't need to follow the current procedure further.
Otherwise, you must follow this procedure completely.
a) Under Inspectors, expand the required inspector for which you want to override the default configuration.
The default configuration is displayed on the left column and the overridden configuration is displayed on the right
column under the inspector.
You may need to search for an inspector by entering any relevant text in in the search bar.
b) Click the Copy to clipboard icon to copy the default inspector configuration to the clipboard.
c) Create a JSON file and paste the default configuration in it.
d) Keep the inspector configuration that you want to override, and remove all the other configuration and instances from
the JSON file.
You can also use the Sample File / Template to understand how to override the default configuration. This is a
sample file that includes JSON snippets explaining how you can customize the network analysis policy for Snort
3.See for more information.
e) Make changes to the inspector configuration as needed.
Validate the changes and make sure they conform to the schema file. For multiton inspectors, make sure that the
binder conditions for all instances are included in the JSON file. See Multiton Inspectors in Custom Network Analysis
Policy Creation for Snort 3, on page 61for more information.
f) If you are copying any further default inspector configurations, append that inspector configuration to the existing
file that contains the overridden configuration.
Note The copied inspector configuration must comply with the JSON standards.

g) Save the overridden configuration file to your system.


h) Upload the overridden configuration to the FMC as described in the next step.
Step 5 Under Upload, you can click Overridden Configuration to upload the JSON file that contains the overridden
configuration.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


69
Advanced Network Analysis in Snort 3
Make Inline Edit for an Inspector to Override Configuration

Caution Upload only the changes that you require. You should not upload the entire configuration as it makes the
overrides sticky in nature and therefore, any subsequent changes to the default configuration as part of the LSP
updates would not be applied.

You can drag and drop a file or click to browse to the JSON file saved in your system that contains the overridden inspector
configuration.
• Merge inspector overrides – Content in the uploaded file is merged with the existing configuration if there is no
common inspector. If there are common inspectors, then the content in the uploaded file (for common inspectors)
takes precedence over the previous content, and it replaces the previous configuration for those inspectors.
• Replace inspector overrides – Removes all previous overrides and replaces them with the new content in the
uploaded file.
Attention As choosing this option deletes all the previous overrides, make an informed decision before you override
the configuration using this option.

If any error occurs while uploading the overridden inspectors, you see the error on the Upload Overridden Configuration
File pop-up window. You can also download the file with the error, then fix the error and reupload the file.

Step 6 In the Upload Overridden Configuration File pop-up window, click the Import button to upload the overridden
inspector configuration.
After you upload the overridden inspector configuration, you will see an Orange-colored circle next to the inspector that
signifies that it’s an overridden inspector.
Also, the Overridden Configuration column under the inspector shows the overridden value.
You can also view all the overridden inspectors using the Show Overrides Only checkbox adjacent to the Search bar.
Note Make sure that you always download the Overridden Configurations under Download, then open the JSON
file and append any new changes/overrides to the inspector configurations to this file. This action is needed so
that you don’t lose the old overridden configurations.

Step 7 (Optional) Take a backup of the overridden configuration file on your system before making any new inspector configuration
changes.
Tip We recommend that you take the backup from time to time as you override the inspector configuration.

Related Topics
Revert Overridden Configuration to Default Configuration, on page 72
View the List of Inspectors with Overrides, on page 72
Examples of Custom Network Analysis Policy Configuration, on page 73
Search for an Inspector on the Network Analysis Policy Page, on page 66
Copy the Inspector Configuration , on page 67

Make Inline Edit for an Inspector to Override Configuration


For the Snort 3 version of the network analysis policy, you can make an inline edit for the inspector
configuration to override the configuration according to your requirements.
Alternatively, you can also use the Actions drop-down menu to upload the overridden configuration file. See
Customize the Network Analysis Policy, on page 67 for more information.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


70
Advanced Network Analysis in Snort 3
Revert Unsaved Changes during Inline Edits

Step 1 Under Inspectors in the Snort 3 Version of the network analysis policy, expand the required inspector for which you
want to override the default setting.
The default configuration is displayed on the left column and the overridden configuration is displayed on the right column
under the inspector.

Step 2 Under the Overridden Configuration on the right column, click Edit Inspector (Pencil) icon to make changes to the
inspector configuration.
The Override Configuration pop-up appears where you can make the required edits.
Note • Make sure that you keep only those settings that you want to override. If you leave a setting with the same
value, that field becomes sticky. This means if that setting is changed in the future by Talos, the current
value will be retained.
• If you are adding or deleting any custom instance, make sure that you add or delete a binder rule for that
instance in the binder inspector as well.

Step 3 Click OK.


If there are any errors according to the JSON standards, it shows you as an error message.

Step 4 Click Save to save the changes.


If the changes conform to the OpenAPI schema specification, the FMC allows you to save the configuration, otherwise,
the Error saving overridden configuration pop-up appears that shows the errors. You can also download the file with
the errors.

Related Topics
Customize the Network Analysis Policy, on page 67
Revert Unsaved Changes during Inline Edits , on page 71
Revert Overridden Configuration to Default Configuration, on page 72
Examples of Custom Network Analysis Policy Configuration, on page 73

Revert Unsaved Changes during Inline Edits


While making inline edits to override the configuration for an inspector or while reverting to the default
configuration for an inspector, you can revert any unsaved changes. Note that this action reverts all unsaved
changes to the most recently saved value, but does not revert the configuration to the default configuration
for an inspector.
See Revert Overridden Configuration to Default Configuration for information on how to revert the
configuration to the default.

Step 1 Under Inspectors in the Snort 3 Version of the network analysis policy, expand the required inspector for which you
want to revert the unsaved changes.
The default configuration is displayed on the left column and the overridden configuration is displayed on the right column
under the inspector.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


71
Advanced Network Analysis in Snort 3
View the List of Inspectors with Overrides

Step 2 Under the Overridden Configuration on the right column, click the Cross (X) icon to revert any unsaved changes for
the inspector.
Alternatively, you can click Cancel to cancel the changes.
If you don’t have any unsaved changes to the inspector configuration, then this option is not visible.

Related Topics
Revert Overridden Configuration to Default Configuration, on page 72
Make Inline Edit for an Inspector to Override Configuration, on page 70

View the List of Inspectors with Overrides


You can view all the overridden inspectors using the Show Overrides Only checkbox adjacent to the Search
bar.

Step 1 Go to the Snort 3 Version of the network analysis policy.


Step 2 Click the Show Overrides Only checkbox to view the list of overridden inspectors.
All the overridden inspectors are shown with an Orange-colored circle next to their names to help you identify them.

Related Topics
Search for an Inspector on the Network Analysis Policy Page, on page 66
Make Inline Edit for an Inspector to Override Configuration, on page 70
Customize the Network Analysis Policy, on page 67

Revert Overridden Configuration to Default Configuration


You can revert any changes that you made to override the default configuration for an inspector. This action
reverts the overridden configuration to the default configuration for an inspector.

Step 1 Under Inspectors in the Snort 3 Version of the network analysis policy, expand the required inspector for which you
want to revert the overridden configuration.
The overridden inspectors are shown with the Orange-colored circle next to their name.
The default configuration is displayed on the left column and the overridden configuration is displayed on the right column
under the inspector. Under the Overridden Configuration on the right column, click Revert to default configuration
(back arrow) icon to revert the overridden configuration for the inspector to the default configuration.
If you did not make any changes to the default configuration for the inspector, then this option is disabled.

Step 2 Click Revert to confirm the decision.


Step 3 Click Save to save the changes.
If you don't want to save the changes, you can click Cancel or the Cross (X) icon.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


72
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

Related Topics
Revert Unsaved Changes during Inline Edits , on page 71
Customize the Network Analysis Policy, on page 67
Make Inline Edit for an Inspector to Override Configuration, on page 70
Examples of Custom Network Analysis Policy Configuration, on page 73

Examples of Custom Network Analysis Policy Configuration


This is a sample file that includes JSON snippets explaining how you can customize the network analysis
policy for Snort 3. You can choose to override an inspector configuration using the following ways:
• Make inline edits for an inspector directly on the FMC. See .
• Use the Actions drop-down menu to upload the overridden configuration file. See Customize the Network
Analysis Policy, on page 67.

Before you choose any of these options, review all the following details and examples that will help you in
defining the network analysis policy overrides successfully. You must read and understand the examples for
various scenarios explained here to avoid any risks and errors.
If you choose to override an inspector configuration from the Actions drop-down menu, you need to construct
a JSON file for the network analysis policy overrides and upload the file.
For overriding an inspector configuration in the network analysis policy, you must upload only the changes
that you require. You should not upload the entire configuration because it makes the overrides sticky in
nature and therefore, any subsequent changes to the default values or configuration as part of the LSP updates
would not be applied.
Here are the examples for various scenarios:

Enabling a Singleton Inspector when the Default State in the Base Policy is Disabled
{
"rate_filter": {
"enabled": true,
"type": "singleton",
"data": []
}
}

Disabling a Singleton Inspector when the Default State in the Base Policy is Enabled
{
"rate_filter": {
"enabled": false,
"type": "singleton",
"data": []
}
}

Enabling a Multiton Inspector when the Default State in the Base Policy is Disabled
{
"ssh": {
"enabled": true,
"type": "multiton",
"instances": []

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


73
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

}
}

Disabling a Multiton Inspector when the Default State in the Base Policy is Enabled
{
"ssh": {
"enabled": false,
"type": "multiton",
"instances": []
},
"iec104": {
"type": "multiton",
"enabled": false,
"instances": []
}
}

Overriding the Default Value of Specific Setting(s) for Singleton Inspector


{
"normalizer": {
"enabled": true,
"type": "singleton",
"data": {
"tcp": {
"block": true
},
"ip6": true
}
}
}

Overriding Specific Setting(s) of a Default Instance (where Instance Name Matches with Inspector Type) in
Multiton Inspector
{
"http_inspect": {
"enabled": true,
"type": "multiton",
"instances": [
{
"data": {
"unzip": false
},
"name": "http_inspect"
}
]
}
}

Adding Binder Rule for a Default Instance with Required Changes

Note Default binder rules can't be edited, they are always appended at the end.

{
"binder": {
"enabled": true,
"type": "binder",

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


74
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

"rules": [
{
"use": {
"type": "http_inspect"
},
"when": {
"role": "server",
"service": "http",
"dst_nets": "10.1.1.0/24"
}
}
]
}
}

Adding a New Custom Instance

Note Corresponding binder rule entry must be defined in the binder inspector.

{
"telnet": {
"enabled": true,
"type": "multiton",
"instances": [
{
"name": "telnet_my_instance",
"data": {
"encrypted_traffic": true
}
}
]
},
"binder": {
"enabled": true,
"type": "binder",
"rules": [
{
"when": {
"role": "any",
"service": "telnet"
},
"use": {
"type": "telnet",
"name": "telnet_my_instance"
}
}
]
}
}

Overriding a Singleton Instance, Multiton Default Instance, and Creating a New Multiton Instance in a Single
JSON Override
Example to show the following in a single JSON override:
• Overriding a Singleton instance (normalizer inspector)
• Overriding a Multiton default instance (http_inspect inspector)

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


75
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

• Creating a new Multiton instance (telnet inspector)

{
"normalizer": {
"enabled": true,
"type": "singleton",
"data": {
"tcp": {
"block": true
},
"ip6": true
}
},
"http_inspect": {
"enabled": true,
"type": "multiton",
"instances": [
{
"data": {
"unzip": false,
"xff_headers": "x-forwarded-for true-client-ip x-another-forwarding-header"
},
"name": "http_inspect"
}
]
},
"telnet": {
"enabled": true,
"type": "multiton",
"instances": [
{
"name": "telnet_my_instance",
"data": {
"encrypted_traffic": true
}
}
]
},
"binder": {
"enabled": true,
"type": "binder",
"rules": [
{
"when": {
"role": "any",
"service": "telnet"
},
"use": {
"type": "telnet",
"name": "telnet_my_instance"
}
},
{
"use": {
"type": "http_inspect"
},
"when": {
"role": "server",
"service": "http",
"dst_nets": "10.1.1.0/24"
}
}
]

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


76
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

}
}

Note You don't need to give the name attribute for the default instance in binder rules.

Configuring arp_spoof
Example for configuring arp_spoof:
Ther arp_spoof inspector does not have any default configurations for any attributes. This demonstrates
the case where you can provide the overrides.
{
"arp_spoof": {
"type": "singleton",
"data": {
"hosts": [
{
"ip": "1.1.1.1",
"mac": "ff:0f:f1:0f:0f:ff"
},
{
"ip": "2.2.2.2",
"mac": "ff:0f:f2:0f:0f:ff"
}
]
},
"enabled": true
}
}

Configuring rate_filter
{
"rate_filter": {
"data": [
{
"apply_to": "[10.1.2.100, 10.1.2.101]",
"count": 5,
"gid": 135,
"new_action": "alert",
"seconds": 1,
"sid": 1,
"timeout": 5,
"track": "by_src"
}
],
"enabled": true,
"type": "singleton"
}
}

Configuring Binder Rules when Multi-Hierarchy Network Analysis Policy is Used


This example illustrates adding a new custom instance in child policy and the way binder rules should be
written. Binder rules are defined as a list and therefore, it is important to pick up the rules defined in the parent
policy and build the new rules on top of it as rules will not be merged automatically. The binder rules available
in child policy are a source of truth in totality.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


77
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

On the FTD, the default Cisco Talos policy rules are appended on these user-defined overrides.
Parent Policy:
We have defined a custom instance by the name telnet_parent_instance and the corresponding
binder rule.
{
"telnet": {
"type": "multiton",
"instances": [
{
"data": {
"normalize": true,
"encrypted_traffic": true
},
"name": "telnet_parent_instance"
}
],
"enabled": true
},
"binder": {
"enabled": true,
"type": "binder",
"rules": [
{
"when": {
"role": "any",
"service": "telnet"
},
"use": {
"type": "telnet",
"name": "telnet_parent_instance"
}
}
]
}
}

Child Policy:
This network analysis policy has the aforementioned policy as its base policy. We have defined a custom
instance by the name telnet_child_instance and have also defined the binder rules for this instance.
The binder rules from parent policy need to be copied here, and then child policy binder rules can be prepended
or appended on top of it based on the nature of the rule.
{
"telnet": {
"type": "multiton",
"instances": [
{
"data": {
"normalize": true,
"encrypted_traffic": false
},
"name": "telnet_child_instance"
}
],
"enabled": true
},
"binder": {
"enabled": true,
"type": "binder",
"rules": [

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


78
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

{
"when": {
"role": "any",
"service": "telnet",
"nets": "10.2.2.0/24"
},
"use": {
"type": "telnet",
"name": "telnet_child_instance"
}
},
{
"when": {
"role": "any",
"service": "telnet"
},
"use": {
"type": "telnet",
"name": "telnet_parent_instance"
}
}
]
}
}

Configuring List Inspector Attribute in General


While changing overrides for any attribute of type list, it is important to pass the full contents rather than
partial override. This means if a base policy attributes are defined as:
{
"list-attribute": [
{
"entry1": {
"key1": "value1"
}
},
{
"entry2": {
"key2": "value2"
}
}
]
}

If you want to modify value1 to value1-new, the override payload must look like the following:
Correct Way:
{
"list-attribute": [
{
"entry1": {
"key1": "value1-new"
}
},
{
"entry2": {
"key2": "value2"
}
}
]
}

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


79
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

Inorrect Way:
{
"list-attribute": [
{
"entry1": {
"key1": "value1-new"
}
}
]
}

You can understand this configuration by taking the trimmed values of the alt_max_command_line_len
attribute in the smtp inspector. Suppose the default (base) policy configuration for smtp inspector is as
follows:
{
"smtp": {
"type": "multiton",
"instances": [
{
"name": "smtp",
"data": {
"decompress_zip": false,
"normalize_cmds": "ATRN AUTH BDAT CHUNKING DATA DEBUG EHLO
EMAL ESAM ESND ESOM ETRN EVFY EXPN HELO HELP IDENT MAIL
NOOP ONEX QUEU QUIT RCPT RSET SAML SEND SOML STARTTLS TICK
TIME TURN TURNME VERB VRFY X-ADAT XADR XAUTH XCIR X-DRCP X-
ERCP XEXCH50 X-EXCH50 X-EXPS XGEN XLICENSE X-LINK2STATE XQUE
XSTA XTRN XUSR",
"ignore_data": false,
"max_command_line_len": 512,
"max_header_line_len": 1000,
"log_rcptto": false,
"decompress_swf": false,
"max_response_line_len": 512,
"b64_decode_depth": -1,
"max_auth_command_line_len": 1000,
"log_email_hdrs": false,
"xlink2state": "alert",
"binary_data_cmds": "BDAT XEXCH50",
"auth_cmds": "AUTH XAUTH X-EXPS",
"log_filename": false,
"uu_decode_depth": -1,
"ignore_tls_data": false,
"data_cmds": "DATA",
"bitenc_decode_depth": -1,
"alt_max_command_line_len": [
{
"length": 255,
"command": "ATRN"
},
{
"command": "AUTH",
"length": 246
},
{
"length": 255,
"command": "BDAT"
},
{
"length": 246,
"command": "DATA"
}

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


80
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

],
"log_mailfrom": false,
"decompress_pdf": false,
"normalize": "none",
"email_hdrs_log_depth": 1464,
"valid_cmds": "ATRN AUTH BDAT CHUNKING DATA DEBUG EHLO
EMAL ESAM ESND ESOM ETRN EVFY EXPN HELO HELP IDENT MAIL
NOOP ONEX QUEU QUIT RCPT RSET SAML SEND SOML STARTTLS TICK
TIME TURN TURNME VERB VRFY X-ADAT XADR XAUTH XCIR X-DRCP X-
ERCP XEXCH50 X-EXCH50 X-EXPS XGEN XLICENSE X-LINK2STATE XQUE
XSTA XTRN XUSR",
"qp_decode_depth": -1
}
}
],
"enabled": true
}
}

Now, if you want to add two more objects to the alt_max_command_line_len list:
{
"length": 246,
"command": "XEXCH50"
},
{
"length": 246,
"command": "X-EXPS"
}

Then the custom network analysis policy override JSON would look like the following:
{
"smtp": {
"type": "multiton",
"instances": [
{
"name": "smtp",
"data": {
"alt_max_command_line_len": [
{
"length": 255,
"command": "ATRN"
},
{
"command": "AUTH",
"length": 246
},
{
"length": 255,
"command": "BDAT"
},
{
"length": 246,
"command": "DATA"
},
{
"length": 246,
"command": "XEXCH50"
},
{
"length": 246,
"command": "X-EXPS"
}
]

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


81
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

}
}
],
"enabled": true
}
}

Configuring Overrides when Multi-Hierarchy Network Analysis Policy is used in Multiton Inspector
This example illustrates overriding attributes in child policy and how the merged configuration will be used
in the child policy for any instance. Any overrides defined in the child policy will be merged with the parent
policy. Thus, if attribute1 and attribute2 are overridden in parent policy and attribute2 and attribute3 are
overridden in the child policy, the merged configurations are for child policy. This means that attribute1
(defined in parent policy), attribute2 (defined in child policy), and attribute3 (defined in child policy) will be
configured on the device.
Parent Policy:
Here we have defined a custom instance by the name telnet_parent_instance and overridden 2
attributes namely, normalize and encrypted_traffic in the custom instance.
{
"telnet": {
"type": "multiton",
"instances": [
{
"data": {
"normalize": true,
"encrypted_traffic": false
},
"name": "telnet_parent_instance"
}
],
"enabled": true
},
"binder": {
"enabled": true,
"type": "binder",
"rules": [
{
"when": {
"role": "any",
"service": "telnet"
},
"use": {
"type": "telnet",
"name": "telnet_parent_instance"
}
}
]
}
}

Child Policy:
This network analysis policy has the aforementioned policy as its base policy. We have overridden attribute
encrypted_traffic from parent policy and also overridden new attribute ayt_attack_thresh.
{
"telnet": {
"type": "multiton",
"instances": [
{

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


82
Advanced Network Analysis in Snort 3
Examples of Custom Network Analysis Policy Configuration

"data": {
"encrypted_traffic": true,
"ayt_attack_thresh": 1
},
"name": "telnet_parent_instance"
}
],
"enabled": true
}
}

With the above policy JSON, when you deploy the network analysis policy the following merged JSON will
be configured on the device.
{
"telnet": {
"type": "multiton",
"instances": [
{
"data": {
"normalize": true,
"encrypted_traffic": true,
"ayt_attack_thresh": 1
},
"name": "telnet_parent_instance"
}
],
"enabled": true
},
"binder": {
"enabled": true,
"type": "binder",
"rules": [
{
"when": {
"role": "any",
"service": "telnet"
},
"use": {
"type": "telnet",
"name": "telnet_parent_instance"
}
}
]
}
}

This example illustrates details for the custom network analysis policy. The same behavior is also exhibited
in the default instance. Also, a similar merging would be done for Singleton inspectors.

Removing all the Inspector Overrides for the Network Analysis Policy:
Whenever you want to remove all the overrides for a specific network analysis policy, you can upload an
empty JSON. While uploading the overrides, choose the option Replace inspector overrides.
{
}

Related Topics
Snort 3 Definitions and Terminologies for Network Analysis Policy, on page 59
Network Analysis Policy Mapping, on page 65
Custom Network Analysis Policy Creation for Snort 3, on page 61

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


83
Advanced Network Analysis in Snort 3
Network Analysis Policy Settings and Cached Changes

Search for an Inspector on the Network Analysis Policy Page, on page 66


Copy the Inspector Configuration , on page 67
Customize the Network Analysis Policy, on page 67
Make Inline Edit for an Inspector to Override Configuration, on page 70
View the List of Inspectors with Overrides, on page 72

Network Analysis Policy Settings and Cached Changes


When you create a new network analysis policy, it has the same settings as its base policy.
When tailoring a network analysis policy, especially when disabling inspectors, keep in mind that some
inspectors and intrusion rules require that traffic first be decoded or preprocessed in a certain way. If you
disable a required inspector, the system automatically uses it with its current settings, although the inspector
remains disabled in the network analysis policy web interface.

Note Because preprocessing and intrusion inspection are so closely related, the network analysis and intrusion
policies examining a single packet must complement each other. Tailoring preprocessing, especially using
multiple custom network analysis policies, is an advanced task.

The system caches one network analysis policy per user. While editing a network analysis policy, if you select
any menu or other path to another page, your changes stay in the system cache even if you leave the page.

Firepower Management Center Snort 3 Configuration Guide, Version 7.0


84

You might also like