Preview Tool

Cisco Bug: CSCvv21292 - FMC doc suggests that PPM rules can block traffic in inline deployments

Last Modified

Sep 22, 2020

Products (1)

  • Sourcefire Defense Center

Known Affected Releases

6.3.0 6.4.0 6.5.0 6.6.0

Description (partial)

When PPM IPS rules (GID:134) are set to 'Drop and Generate Events' in an inline deployment, no events are generated for a match on any of these PPM rules because Snort is not able to block PPM events. The PPM action was designed to fast-path the latent packets, otherwise the results would be unpredictable, if they were blocked.

PPM (Packet Performance Monitor) rule (GID:134) is enabled in the IPS policy set to 'Drop and Generate Events' (following what the documentation suggests for inline deployments) and Latency-Based Performance Settings has Packet Handling enabled with default threshold (manually enabled or per custom NAP)
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.