<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitoring with FTD firepower 2100 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761360#M1012124</link>
    <description>&lt;P&gt;sorry, but what is ACP?&lt;/P&gt;</description>
    <pubDate>Tue, 11 Dec 2018 15:14:40 GMT</pubDate>
    <dc:creator>marcio.tormente</dc:creator>
    <dc:date>2018-12-11T15:14:40Z</dc:date>
    <item>
      <title>Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761239#M1012119</link>
      <description>&lt;P&gt;Hello guys!&lt;/P&gt;&lt;P&gt;I have no experience with FTD firepower and I'm lost with the monitoring.&lt;/P&gt;&lt;P&gt;In the ASA using ASDM I can make monitoring in real time to se where the traffic is blocking or not, but I have no idea how can I do it using Firepower.&lt;/P&gt;&lt;P&gt;Anyone can help me with this case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Marcio&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761239#M1012119</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2020-02-21T16:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761256#M1012120</link>
      <description>&lt;P&gt;Hi Marcio&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With in the FMC (Firepower Management Center), you can use Analysis &amp;gt; Connection events to filter and drill down on standard connection events that pass through the managed devices.&lt;/P&gt;
&lt;P&gt;You can use Analysis &amp;gt; Intrusion Events to assess what is being blocked/monitored by the Snort engine.&lt;/P&gt;
&lt;P&gt;Also, if you have the network discovery policy configured to build up host intelligence of your internal protected nodes (Desktops, laptops, servers etc), Analysis &amp;gt; Context Explorer will give you accurate IOCs (Indications of Compromise) and what devices/alerts should be triaged first.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a general rule of thumb, the Intrusion alerts are rated 1-4 then 0 (1 being critical, 0 being informational). Look at the critical ones first.&lt;/P&gt;
&lt;P&gt;The Access Control Policy ties in all the 'sub policies' together (File/Malware, Prefilter (Layer 1-4), Intrusion (&amp;gt; Layer 7), SSL, DNS etc.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phil&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 13:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761256#M1012120</guid>
      <dc:creator>phil.hydea</dc:creator>
      <dc:date>2018-12-11T13:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761274#M1012121</link>
      <description>&lt;P&gt;Hello Phil!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your support.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried as you said, but after go to "Analysis &amp;gt; Connection events", I have many option in the "jump to" as I can show in the attached, if I change to "host" for example, I have no result.&lt;/P&gt;&lt;P&gt;Or If I make a filter by network and put the IP of the host, again I have no result. Do you know why?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 13:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761274#M1012121</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2018-12-11T13:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761353#M1012122</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have an ACP configured with logging enabled?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;Phil&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 15:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761353#M1012122</guid>
      <dc:creator>phil.hydea</dc:creator>
      <dc:date>2018-12-11T15:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761354#M1012123</link>
      <description>Also, as well as ACP configured with logging, have you tried increasing the time window (top right of the table)?</description>
      <pubDate>Tue, 11 Dec 2018 15:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761354#M1012123</guid>
      <dc:creator>phil.hydea</dc:creator>
      <dc:date>2018-12-11T15:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761360#M1012124</link>
      <description>&lt;P&gt;sorry, but what is ACP?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 15:14:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761360#M1012124</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2018-12-11T15:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761362#M1012125</link>
      <description>&lt;P&gt;ACP is access control policy. It's where all the ACL (Access control list) style rules and additional upto Layer 7 inspection is configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check this out:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://networkdirection.net/articles/asa/firepowermanagementcentre/fmcaccesscontrolpolicies/" target="_blank"&gt;https://networkdirection.net/articles/asa/firepowermanagementcentre/fmcaccesscontrolpolicies/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you added your FTD devices to the FMC already? do you have licensing sorted? (if not, no problem, use evaluation mode for a 90 day window)&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 15:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761362#M1012125</guid>
      <dc:creator>phil.hydea</dc:creator>
      <dc:date>2018-12-11T15:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761366#M1012126</link>
      <description>&lt;P&gt;Yes I have the ACP configured and the device is on the FMC phisical appliance with the the normal license (not evaluation).&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 15:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761366#M1012126</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2018-12-11T15:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring with FTD firepower 2100</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761381#M1012127</link>
      <description>So do have you ACP rules configured with logging:&lt;BR /&gt;&lt;BR /&gt;Edit the rule, click Logging tab, either Log at Beginning and/or End of&lt;BR /&gt;Connection&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Dec 2018 15:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-with-ftd-firepower-2100/m-p/3761381#M1012127</guid>
      <dc:creator>phil.hydea</dc:creator>
      <dc:date>2018-12-11T15:49:52Z</dc:date>
    </item>
  </channel>
</rss>

