<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic A quick fix is to create a in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576424#M1028269</link>
    <description>&lt;P&gt;A quick fix is to create a second health policy and turn off Interface Status. Then apply this new health policy to only the failover ASA.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Tue, 01 Nov 2016 21:43:44 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2016-11-01T21:43:44Z</dc:date>
    <item>
      <title>ASA+FirePower Bundle - policies not getting applied - Interface 'DataPlaneInterface0' is not receiving any packets.</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576407#M1028252</link>
      <description>&lt;P&gt;I'm evaluating ASA5500-X with FirePower bundle with Eval licenses.&lt;/P&gt;
&lt;P&gt;I'm facing 2 issues with FSMC,&lt;/P&gt;
&lt;P&gt;1, FSMC show 2 critical health errors for SFR &amp;amp; Sourcefire3D related to time synchronisation. - Module Time Sync is out.&lt;/P&gt;
&lt;P&gt;2, Nothing is displayed in "Connection Status" and policies are not getting applied. However the top Applications &amp;amp; Operating Systems are displayed in Dashboard !!!!.&lt;/P&gt;
&lt;P&gt;on ASA i've tried with the following and monitor-only modes.&lt;/P&gt;

&lt;PRE&gt;
policy-map global_policy
 class class-default
  sfr fail-open&lt;/PRE&gt;

&lt;P&gt;on FSMC, Zones are configured. And called in Access Control Policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FSMC Health Monitor says:&lt;/P&gt;
&lt;P style="margin-left: 40px;"&gt;SFR&lt;BR /&gt;Module Time Synchronization: "device" is out-of-sync.&lt;BR /&gt;Module Traffic status: Interface 'DataPlaneInterface0' is not receiving any packets.&lt;/P&gt;
&lt;P style="margin-left: 40px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Strange thing is on the ASA,&lt;/P&gt;
&lt;P&gt;internal-Control0/0, Internal-Data0/0, Internal-Data0/1, Internal-Data0/2 interfaces and line protocols are up and sending/receiving packets with no errors or drops !!!.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does the inside zone need to be on interface other than g0/0 or the interface names(ASA &amp;amp; FSMC) should match ?.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576407#M1028252</guid>
      <dc:creator>Eby Mani</dc:creator>
      <dc:date>2019-03-12T12:36:33Z</dc:date>
    </item>
    <item>
      <title>Did you ever find a solution</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576408#M1028253</link>
      <description>&lt;P&gt;Did you ever find a solution to this issue?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2015 22:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576408#M1028253</guid>
      <dc:creator>BEHowardGRDA</dc:creator>
      <dc:date>2015-02-11T22:14:08Z</dc:date>
    </item>
    <item>
      <title>Problem was with the FSMC</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576409#M1028254</link>
      <description>&lt;P&gt;Problem was with the FSMC license !!!.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 05:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576409#M1028254</guid>
      <dc:creator>Eby Mani</dc:creator>
      <dc:date>2015-02-25T05:31:47Z</dc:date>
    </item>
    <item>
      <title>Two Items:1.) Control</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576410#M1028255</link>
      <description>&lt;P&gt;Two Items:&lt;/P&gt;&lt;P&gt;1.) Control Licenses: These are provided by CGL (Cisco Global Licensing)&lt;/P&gt;&lt;P&gt;2.) Global Policy setting that says Any Traffic, and enable Sourcefire under the service Policy&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 12:31:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576410#M1028255</guid>
      <dc:creator>TechDude</dc:creator>
      <dc:date>2015-03-11T12:31:15Z</dc:date>
    </item>
    <item>
      <title>Could you specify the exact</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576411#M1028256</link>
      <description>&lt;P&gt;Could you specify the exact config lines you used in the Global Policy please? Is the name of the class important?&lt;/P&gt;&lt;P&gt;Presumably there's no difference whether the ASA is running in Transparent mode or not?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2015 10:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576411#M1028256</guid>
      <dc:creator>CopperBlue68</dc:creator>
      <dc:date>2015-03-17T10:11:18Z</dc:date>
    </item>
    <item>
      <title>I have a similiar problem too</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576412#M1028257</link>
      <description>&lt;P&gt;I have a similiar problem too..in Active/Standby deployment, the secondary ASA's SFR module is throwing the same error.&lt;/P&gt;&lt;P&gt;"Interface 'DataPlaneInterface0' is not receiving any packets"&lt;/P&gt;&lt;P&gt;I have all licenses installed and it was working until a week ago(upgrade to 5.4 recently)&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2015 21:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576412#M1028257</guid>
      <dc:creator>jai_chandra2001</dc:creator>
      <dc:date>2015-04-27T21:29:13Z</dc:date>
    </item>
    <item>
      <title>Folks,I too observed same</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576413#M1028258</link>
      <description>&lt;P&gt;Folks,&lt;/P&gt;&lt;P&gt;I too observed same error messages in Fire SIGHT health status and found that the policy map configuration not applied&amp;nbsp;in service policy globally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Post that it starts working.&lt;/P&gt;&lt;P&gt;"Interface 'DataPlaneInterface0' is not receiving any packets"&amp;nbsp;- Means that the traffic which hits ASA&amp;nbsp;is not redirected to security module for inspection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep post your queries.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 14:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576413#M1028258</guid>
      <dc:creator>balamuruganmanavalan</dc:creator>
      <dc:date>2015-05-11T14:24:05Z</dc:date>
    </item>
    <item>
      <title>In ASA HA deployment A/S,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576414#M1028259</link>
      <description>&lt;P&gt;In ASA HA deployment A/S, standby unit does not see traffic by default, that is why you are getting that DPI0 error.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 20:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576414#M1028259</guid>
      <dc:creator>Pavel Trinos</dc:creator>
      <dc:date>2015-05-20T20:04:58Z</dc:date>
    </item>
    <item>
      <title>If you have two ASA's in A/S,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576415#M1028260</link>
      <description>&lt;P&gt;If you have two ASA's in A/S, the standby ASA's FirePower unit will show a health error that it's not receiving any traffic. &amp;nbsp;This is normal as the standby ASA won't receive any traffic.&lt;/P&gt;&lt;P&gt;I had an issue with time sync yesterday at a client. &amp;nbsp;The clock was right on FireSight and both FirePower's, but it showed the time sync error. &amp;nbsp;It took about 10-15 minutes, but it worked itself out. &amp;nbsp;This happened after I upgraded FireSight to 5.4.1.1&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2015 13:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576415#M1028260</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2015-05-22T13:53:53Z</dc:date>
    </item>
    <item>
      <title>I have the same scenario, 2</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576416#M1028261</link>
      <description>&lt;P&gt;I have the same scenario, 2 ASA 5525-X in HA, how did you guys manage to configure the failover for the FirePower?, is it posible or you just configure the same thing in both including the IP address?&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2015 18:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576416#M1028261</guid>
      <dc:creator>sistematico</dc:creator>
      <dc:date>2015-09-05T18:11:15Z</dc:date>
    </item>
    <item>
      <title>Remember Firepower/Sourcefire</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576417#M1028262</link>
      <description>&lt;P&gt;Remember Firepower/Sourcefire within the ASA is just like the IPS modules, so theres no real load balancing, its just a policy. &amp;nbsp;Each unit should have its own policy and if you split contexts up same concept, as with any traffic coming in on contexts will be serviced.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2015 18:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576417#M1028262</guid>
      <dc:creator>TechDude</dc:creator>
      <dc:date>2015-09-05T18:23:08Z</dc:date>
    </item>
    <item>
      <title>Hi,Firepower is installed in</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576418#M1028263</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Firepower is installed in SSD. So it is like Cisco legacy SSM. There is HA concept in between two FirePower. Configure as 2 standalone. Whenever primary fw goes down, traffic will process through secondary. Like wise second FirePower will process the traffic.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2015 18:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576418#M1028263</guid>
      <dc:creator>balamuruganmanavalan</dc:creator>
      <dc:date>2015-09-05T18:57:04Z</dc:date>
    </item>
    <item>
      <title>It would be nice if there was</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576419#M1028264</link>
      <description>&lt;P&gt;It would be nice if there was a way to suppress the health alert for an HA pair for the standby unit. &amp;nbsp;Every time I set one up, I have to tell my client that this alert is a false positive.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2015 13:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576419#M1028264</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2015-09-06T13:46:36Z</dc:date>
    </item>
    <item>
      <title>If you have an HA Pair then</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576420#M1028265</link>
      <description>&lt;DIV&gt;If you have an HA Pair then you should split contexts up somehow so that you take advantage of the pair at all times vs just during a failover.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The other option is to create a policy that looks at the management interface and monitors it, then some form of traffic is still going.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;This error annoyed me as well, but I use the 5585-SSP60s so naturally you split contexts up&lt;/DIV&gt;</description>
      <pubDate>Sun, 06 Sep 2015 14:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576420#M1028265</guid>
      <dc:creator>TechDude</dc:creator>
      <dc:date>2015-09-06T14:03:37Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576421#M1028266</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have same problem with firesihgt cannot show any traffic. URL filtering:no and Malware: no.&lt;/P&gt;
&lt;P&gt;anyone can tell me!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show service-policy sfr&lt;/P&gt;
&lt;P&gt;Global policy: &lt;BR /&gt; Service-policy: my-sfr-policy&lt;BR /&gt; Class-map: my-sfr-class&lt;BR /&gt; SFR: card status Up, mode fail-open&lt;BR /&gt; &lt;STRONG&gt;packet input 0, packet output 0, drop 0, reset-drop 0&lt;/STRONG&gt;&lt;BR /&gt; Class-map: my-sfr-class2&lt;BR /&gt; SFR: card status Up, mode fail-open&lt;BR /&gt; &lt;STRONG&gt;packet input 0, packet output 0, drop 0, reset-drop 0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 10:22:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576421#M1028266</guid>
      <dc:creator>huucuonghumg</dc:creator>
      <dc:date>2016-05-06T10:22:54Z</dc:date>
    </item>
    <item>
      <title>Hi ,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576422#M1028267</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you have ASA failover setup because dataplane not receiving any traffic on standby unit is expected .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also you have 2 class-maps for SFR you might need to remove one and make sure its binded to the global_policy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Check link : http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/modules-sfr.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 13:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576422#M1028267</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2016-05-06T13:17:37Z</dc:date>
    </item>
    <item>
      <title>Hi everybne!</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576423#M1028268</link>
      <description>&lt;P&gt;Hi everyone!&lt;/P&gt;
&lt;P&gt;when I try convert from route mode to firewall transparent mode, I can show traffic but still error witch "show service-policy sfr" command:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;show service-policy sfr&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Service-policy: global_policy&lt;BR /&gt; Class-map: sfr&lt;BR /&gt; SFR: card status Up, mode fail-open monitor-only&lt;BR /&gt; packet input 0, packet output 0, drop 0, reset-drop&lt;/P&gt;
&lt;P&gt;normal&amp;nbsp;&lt;SPAN&gt;packet input 0 or&amp;nbsp;packet output 0 not is zero&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Everyone can tell me why and how can solved it?&lt;/P&gt;
&lt;P&gt;I should using firewall transparent mode or route mode?&lt;/P&gt;
&lt;P&gt;Thankyou very much!&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2016 01:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576423#M1028268</guid>
      <dc:creator>huucuonghumg</dc:creator>
      <dc:date>2016-05-18T01:38:50Z</dc:date>
    </item>
    <item>
      <title>A quick fix is to create a</title>
      <link>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576424#M1028269</link>
      <description>&lt;P&gt;A quick fix is to create a second health policy and turn off Interface Status. Then apply this new health policy to only the failover ASA.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2016 21:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firepower-bundle-policies-not-getting-applied-interface/m-p/2576424#M1028269</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2016-11-01T21:43:44Z</dc:date>
    </item>
  </channel>
</rss>

