<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Doubt - ASA and Firepower as Gateway in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3408379#M1024918</link>
    <description>&lt;P&gt;Hi Francesco&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Follow answers, tks !!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can you detail what are your requirements in terms of throughput?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The custommer will access internet over this ASA, im afraid if i enable antimalware and IPS beetween interfaces , decrease internet access and server access, for example file server.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What's your wan bandwidth?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Two Internet Links of 100 Mb, one active another as backup.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;How many users will go through this asa/ftd?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Around 300 users&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do you need vpn? If yes how many remote users?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We need around 50 connections anyconnect simulaneous&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;For the design:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- will you have done layer 3 at the core level?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I have a layer, but i want ASA as default gateway of these 13 subnets, to security.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;- is your goal to filter all communications between all ftd zones?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I will block communication between these 13 subnets, these subnets will only access some ports of server subnet, for example file server.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 30 Jun 2018 13:39:06 GMT</pubDate>
    <dc:creator>crusier2015</dc:creator>
    <dc:date>2018-06-30T13:39:06Z</dc:date>
    <item>
      <title>Doubt - ASA and Firepower as Gateway</title>
      <link>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3407677#M1024912</link>
      <description>&lt;P&gt;Hi Friends,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will implement the follow topology, I have the follow doubts, can you help me?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1-) What model of ASA do you recommend to running firepower , with URL filter and Antimalware to Internet access, and IPS and Antimalware beetween all subnets to protect communication beetween these subnets? I need security and perfomance(throughput).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2-) Do you recommend any change on this topology?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="doubt-asa.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/14082i58752ED8449161BF/image-size/large?v=v2&amp;amp;px=999" role="button" title="doubt-asa.jpg" alt="doubt-asa.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3407677#M1024912</guid>
      <dc:creator>crusier2015</dc:creator>
      <dc:date>2020-02-21T15:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Doubt - ASA and Firepower as Gateway</title>
      <link>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3407722#M1024914</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Can you detail what are your requirements in terms of throughput?&lt;BR /&gt;What's your wan bandwidth?&lt;BR /&gt;How many users will go through this asa/ftd?&lt;BR /&gt;Do you need vpn? If yes how many remote users?&lt;BR /&gt;&lt;BR /&gt;For the design:&lt;BR /&gt;- will you have done layer 3 at the core level?&lt;BR /&gt;- is your goal to filter all communications between all ftd zones?&lt;BR /&gt;</description>
      <pubDate>Fri, 29 Jun 2018 03:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3407722#M1024914</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-06-29T03:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: Doubt - ASA and Firepower as Gateway</title>
      <link>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3408379#M1024918</link>
      <description>&lt;P&gt;Hi Francesco&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Follow answers, tks !!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can you detail what are your requirements in terms of throughput?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The custommer will access internet over this ASA, im afraid if i enable antimalware and IPS beetween interfaces , decrease internet access and server access, for example file server.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What's your wan bandwidth?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Two Internet Links of 100 Mb, one active another as backup.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;How many users will go through this asa/ftd?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Around 300 users&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do you need vpn? If yes how many remote users?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We need around 50 connections anyconnect simulaneous&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;For the design:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- will you have done layer 3 at the core level?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I have a layer, but i want ASA as default gateway of these 13 subnets, to security.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;- is your goal to filter all communications between all ftd zones?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I will block communication between these 13 subnets, these subnets will only access some ports of server subnet, for example file server.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jun 2018 13:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3408379#M1024918</guid>
      <dc:creator>crusier2015</dc:creator>
      <dc:date>2018-06-30T13:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Doubt - ASA and Firepower as Gateway</title>
      <link>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3408427#M1024920</link>
      <description>Ok, then yes you can use ASA as default gateway and when activating NGFW features, for sure your throughput will be decreased.&lt;BR /&gt;&lt;BR /&gt;Don't know the exact asa/ftd model, but you can check on this link to see the throughput and nb of sessions, nb of VPN users allowed simultaneously:&lt;BR /&gt;&lt;A href="https://apps.cisco.com/ccw/cpc/guest/content/ucsSeriesDetails/series_asa5500" target="_blank"&gt;https://apps.cisco.com/ccw/cpc/guest/content/ucsSeriesDetails/series_asa5500&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 30 Jun 2018 17:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/doubt-asa-and-firepower-as-gateway/m-p/3408427#M1024920</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-06-30T17:02:01Z</dc:date>
    </item>
  </channel>
</rss>

