<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The transmitted bytes is same in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918004#M1030805</link>
    <description>&lt;P&gt;The transmitted bytes is same as the recieved bytes... is it normal?&lt;/P&gt;</description>
    <pubDate>Fri, 13 May 2016 07:24:13 GMT</pubDate>
    <dc:creator>kelvin.lui11</dc:creator>
    <dc:date>2016-05-13T07:24:13Z</dc:date>
    <item>
      <title>how do i see firepower traffic in firesight?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917996#M1030791</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;After i set the traffic through the module and added the firepower device to the defense center .&amp;nbsp;In analysis &amp;gt; context explorer , it shows me that no data.Can i see the traffic in the defense center?&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917996#M1030791</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2019-03-12T13:00:55Z</dc:date>
    </item>
    <item>
      <title>(No subject)</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917997#M1030792</link>
      <description>&lt;P&gt;&lt;IMG src="http://i66.tinypic.com/2cy986.png" alt="" width="697" height="331" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 03:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917997#M1030792</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T03:38:29Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917998#M1030793</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Try changing the time on right hand top corner from 1 hr to last 1 week or so and see if that works.&lt;/P&gt;
&lt;P&gt;Also check under access control policy do you see any logging enabled ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you see connections under Analysis &amp;gt;Connections ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 03:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917998#M1030793</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2016-05-13T03:56:40Z</dc:date>
    </item>
    <item>
      <title>No changes in context</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917999#M1030794</link>
      <description>&lt;P&gt;No changes in context explorer.&lt;/P&gt;
&lt;P&gt;I had enabled the logging .&lt;/P&gt;
&lt;P&gt;Plus why my firepower configuration button missing in asdm after i added the device to the defense center?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 04:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2917999#M1030794</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T04:06:42Z</dc:date>
    </item>
    <item>
      <title>HI ,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918000#M1030795</link>
      <description>&lt;P&gt;HI ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can&amp;nbsp; only manage the device either by ASDM or Defense center , not both so that is expected. Do you see connection events under analysis &amp;gt;connections.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 04:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918000#M1030795</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2016-05-13T04:10:00Z</dc:date>
    </item>
    <item>
      <title>hi ,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918001#M1030796</link>
      <description>&lt;P&gt;hi ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can see there is 1 a connection.&lt;/P&gt;
&lt;P&gt;But i was wondering how to copy the traffic to the firepower module?&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 07:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918001#M1030796</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T07:19:34Z</dc:date>
    </item>
    <item>
      <title>hostname ciscoasaenable</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918002#M1030800</link>
      <description>&lt;P&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.1.90 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; nameif inside2&lt;BR /&gt; security-level 0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; nameif Manage&lt;BR /&gt; security-level 0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone HKST 8&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 10.10.1.0 255.255.255.0&lt;BR /&gt;object network abcd&lt;BR /&gt; subnet 10.10.1.0 255.255.255.0&lt;BR /&gt;object network qwert&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network source&lt;BR /&gt; range 10.10.1.2 10.10.1.100&lt;BR /&gt;object network aaaa&lt;BR /&gt; range 192.168.1.91 192.168.1.254&lt;BR /&gt;object network jjjjj&lt;BR /&gt; host 192.168.1.90&lt;BR /&gt;object network TestNet1&lt;BR /&gt; subnet 3.3.3.0 255.255.255.0&lt;BR /&gt;object network bbbb&lt;BR /&gt; range 192.168.1.1 192.168.1.89&lt;BR /&gt;object-group network d&lt;BR /&gt; network-object object aaaa&lt;BR /&gt;object-group network abcde&lt;BR /&gt; network-object object abcd&lt;BR /&gt;object-group network qwer&lt;BR /&gt; network-object object qwert&lt;BR /&gt;object-group network sourceaddress&lt;BR /&gt; network-object object source&lt;BR /&gt;object-group network s&lt;BR /&gt; network-object 10.10.1.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object ip&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object icmp6&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object tcp-udp destination eq www&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt; service-object ip&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object tcp-udp destination eq echo&lt;BR /&gt; service-object tcp-udp destination eq www&lt;BR /&gt; service-object tcp destination eq echo&lt;BR /&gt; service-object tcp destination eq www&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object tcp destination eq ssh&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt; service-object ip&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object tcp-udp destination eq www&lt;BR /&gt; service-object tcp destination eq echo&lt;BR /&gt; service-object tcp destination eq https&lt;BR /&gt; service-object tcp destination eq ssh&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt; service-object ip&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object icmp echo&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt; service-object ip&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object tcp-udp destination eq www&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object aaaa&lt;BR /&gt; network-object object jjjjj&lt;BR /&gt;object-group service DM_INLINE_SERVICE_6&lt;BR /&gt; service-object ip&lt;BR /&gt; service-object tcp-udp destination eq www&lt;BR /&gt; service-object tcp destination eq https&lt;BR /&gt;access-list global_access extended permit object-group DM_INLINE_SERVICE_1 any any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 any any&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_3 any any&lt;BR /&gt;access-list allow_ping_outside extended permit object-group DM_INLINE_SERVICE_4 any interface outside&lt;BR /&gt;access-list allow_ping extended permit object-group DM_INLINE_SERVICE_5 any any&lt;BR /&gt;access-list ASASFR extended permit tcp any any eq www&lt;BR /&gt;access-list sfr-direct extended permit ip any any&lt;BR /&gt;access-list sfr_redirect extended permit ip any any&lt;BR /&gt;access-list firepower extended permit object-group DM_INLINE_SERVICE_6 any any&lt;BR /&gt;access-list SFR extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu inside2 1500&lt;BR /&gt;mtu Manage 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any unreachable outside&lt;BR /&gt;icmp permit any echo outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any time-exceeded outside&lt;BR /&gt;icmp permit 192.168.1.0 255.255.255.0 outside&lt;BR /&gt;icmp permit 10.10.1.0 255.255.255.0 outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit 10.10.1.0 255.255.255.0 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic obj_any interface dns&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;!&lt;BR /&gt;route-map abc permit 1&lt;BR /&gt; match ip address global_access&lt;BR /&gt; match ip next-hop global_access&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.10.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt; no validation-usage&lt;BR /&gt; crl configure&lt;/P&gt;
&lt;P&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 outside&lt;BR /&gt;ssh 10.10.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map SFR&lt;BR /&gt; match access-list SFR&lt;BR /&gt;class-map global-class&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map my-sfr-class&lt;BR /&gt; match access-list ASASFR&lt;BR /&gt;class-map inside-class&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map sfr&lt;BR /&gt; match access-list sfr_redirect&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map firepower_class_map&lt;BR /&gt; match access-list firepower&lt;BR /&gt;class-map outside-class&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map inspection_default_class_map&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class SFR&lt;BR /&gt; sfr fail-open&lt;BR /&gt; class firepower_class_map&lt;BR /&gt; sfr fail-open&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect http&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt;policy-map pm-sfr&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;BR /&gt;policy-map outside-policy&lt;BR /&gt; class outside-class&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;BR /&gt;policy-map global-policy&lt;BR /&gt; class global-class&lt;BR /&gt; inspect icmp&lt;BR /&gt;policy-map inside-policy&lt;BR /&gt; class inside-class&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;BR /&gt;policy-map my-sfr-policy&lt;BR /&gt; class my-sfr-class&lt;BR /&gt; sfr fail-close&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:4cfe287fc9e033d86dbbe6d627f048cf&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 07:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918002#M1030800</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T07:20:52Z</dc:date>
    </item>
    <item>
      <title>Here is my config of my asa</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918003#M1030802</link>
      <description>&lt;P&gt;Here is my config of my asa firewall 5506-x&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but the traffic is not normal&lt;/P&gt;
&lt;P&gt;when i ssh to the firepower module it shows me this&lt;/P&gt;
&lt;P&gt;&lt;IMG src="http://i66.tinypic.com/15zldy.png" alt="" width="577" height="312" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 07:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918003#M1030802</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T07:23:29Z</dc:date>
    </item>
    <item>
      <title>The transmitted bytes is same</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918004#M1030805</link>
      <description>&lt;P&gt;The transmitted bytes is same as the recieved bytes... is it normal?&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 07:24:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918004#M1030805</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T07:24:13Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918005#M1030807</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you check if the below command shows counter incrementing which will indicate that module is getting the traffic:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;#show service-policy sfr&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;also, while running show conn on ASA do you see the X flag showing that traffic is inspected by sfr .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;rate if it helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ankita&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 07:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918005#M1030807</guid>
      <dc:creator>ankojha</dc:creator>
      <dc:date>2016-05-13T07:54:08Z</dc:date>
    </item>
    <item>
      <title>(No subject)</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918006#M1030810</link>
      <description>&lt;P&gt;&lt;IMG src="http://i67.tinypic.com/21zptt.png" alt="" width="577" height="306" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="http://i63.tinypic.com/s16z5g.png" alt="" width="577" height="106" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 08:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918006#M1030810</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T08:55:25Z</dc:date>
    </item>
    <item>
      <title>here are my show service</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918007#M1030812</link>
      <description>&lt;P&gt;here are my show service-policy sfr and show conn as above&lt;/P&gt;
&lt;P&gt;Please help.&lt;/P&gt;
&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 08:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918007#M1030812</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-13T08:59:02Z</dc:date>
    </item>
    <item>
      <title>Hi ,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918008#M1030814</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can see that you have multiple class maps for SFR binded to policy map which is a wrong practice and also in show service-polciy sfr , i dont see any traffic being redirected.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Remove all the class-maps under policy-maps for SFR . Just create 1 class-map like below :&lt;/P&gt;
&lt;P&gt;Access-list SFR extended permit SFR permit ip any any&lt;/P&gt;
&lt;P&gt;class-map SFR&lt;/P&gt;
&lt;P&gt;match access-list SFR&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;policy global-policy&lt;/P&gt;
&lt;P&gt;class SFR&lt;/P&gt;
&lt;P&gt;sfr fail-open&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Refer : http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/modules-sfr.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 11:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918008#M1030814</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2016-05-13T11:10:02Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918009#M1030816</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The traffic redirection doesn't seem to be working which is why you are not able to see traffic on the management centre.&lt;/P&gt;
&lt;P&gt;try to configure only one class map and bind it to a service policy and then check if the traffic shows up.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rate if it helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Ankita&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 17:49:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918009#M1030816</guid>
      <dc:creator>ankojha</dc:creator>
      <dc:date>2016-05-13T17:49:10Z</dc:date>
    </item>
    <item>
      <title>hi aastha,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918010#M1030818</link>
      <description>&lt;P&gt;hi aastha,&lt;/P&gt;
&lt;P&gt;Do you mean i should remove those command?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;class-map global-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match default-inspection-traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map my-sfr-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match access-list ASASFR&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map inside-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match default-inspection-traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map sfr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match access-list sfr_redirect&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match default-inspection-traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map firepower_class_map&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match access-list firepower&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map outside-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match default-inspection-traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map inspection_default_class_map&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;policy-map outside-policy&lt;BR /&gt;&lt;SPAN&gt;class outside-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect icmp error&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;policy-map global-policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class global-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;policy-map inside-policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class inside-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect icmp error&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;policy-map my-sfr-policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class my-sfr-class&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sfr fail-close&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2016 04:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918010#M1030818</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-16T04:16:41Z</dc:date>
    </item>
    <item>
      <title>hi ankojha,</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918011#M1030820</link>
      <description>&lt;P&gt;hi ankojha,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After i have removed those service policy .&lt;/P&gt;
&lt;P&gt;The traffic looks the same.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="http://i63.tinypic.com/wj9l68.png" alt="" width="1416" height="181" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2016 04:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918011#M1030820</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-16T04:32:10Z</dc:date>
    </item>
    <item>
      <title>(No subject)</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918012#M1030822</link>
      <description>&lt;P&gt;&lt;IMG src="http://i65.tinypic.com/205xf6s.png" alt="" width="577" height="235" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2016 04:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918012#M1030822</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-16T04:33:17Z</dc:date>
    </item>
    <item>
      <title>hi !</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918013#M1030824</link>
      <description>&lt;P&gt;hi !&lt;/P&gt;
&lt;P&gt;is my traffic normal now?&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2016 02:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/2918013#M1030824</guid>
      <dc:creator>kelvin.lui11</dc:creator>
      <dc:date>2016-05-17T02:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: how do i see firepower traffic in firesight?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/3317763#M1030825</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have the same problem.&lt;/P&gt;
&lt;P&gt;I cant see if traffic is really being inspected and permitted.&lt;/P&gt;
&lt;P&gt;I attach some outputs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Traffic redirected to firepower module:&lt;/P&gt;
&lt;P&gt;access-list sfr_redirect remark Firepower flow&lt;BR /&gt;access-list sfr_redirect extended permit ip 10.2.0.0 255.255.0.0 any &lt;BR /&gt;access-list sfr_redirect extended permit ip any 10.2.0.0 255.255.0.0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;class-map sfr&lt;BR /&gt;&amp;nbsp;match access-list sfr_redirect&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class sfr&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I believe traffic is correctly redirected:&lt;/P&gt;
&lt;P&gt;FW-ASA-RED-2# show conn&lt;BR /&gt;65 in use, 72 most used&lt;BR /&gt;&lt;BR /&gt;UDP RED_1&amp;nbsp; 225.3.50.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.10:49298, idle 0:00:01, bytes 6605325, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.3.50.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.41:52818, idle 0:00:02, bytes 6599658, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.3.50.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.32:43335, idle 0:00:00, bytes 6910327, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.3.50.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.31:37568, idle 0:00:00, bytes 6921793, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.31.0.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.31:1999, idle 0:00:01, bytes 258128, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.31.0.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.10:44191, idle 0:00:00, bytes 2648370, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.31.0.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.32:1999, idle 0:00:01, bytes 258492, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.31.0.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.60:7003, idle 0:00:00, bytes 2650434, flags X &lt;BR /&gt;UDP RED_1&amp;nbsp; 225.31.0.1:7003 RED_TRANS_1&amp;nbsp; 10.2.21.41:7003, idle 0:00:00, bytes 2650176, flags X &lt;BR /&gt;PIM RED_1 172.16.2.14 RED_TRANS_1&amp;nbsp; 192.168.10.2, idle 0:00:00, bytes 3472539, flags&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FW-ASA-RED-2# show service-policy sfr&lt;BR /&gt;&lt;BR /&gt;Global policy: &lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: sfr&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SFR: card status Up, mode fail-open&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet input 22420, packet output 22420, drop 0, reset-drop 0&lt;BR /&gt;FW-ASA-RED-2#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And is correctly associated to firesight:&lt;/P&gt;
&lt;P&gt;FW-ASA-RED-2# show module sfr details &lt;BR /&gt;Getting details from the Service Module, please wait...&lt;BR /&gt;&lt;BR /&gt;Card Type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FirePOWER Services Software Module&lt;BR /&gt;Model:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA5545&lt;BR /&gt;Hardware version:&amp;nbsp;&amp;nbsp; N/A&lt;BR /&gt;Serial Number:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FCH2118799S&lt;BR /&gt;Firmware version:&amp;nbsp;&amp;nbsp; N/A&lt;BR /&gt;Software version:&amp;nbsp;&amp;nbsp; 6.2.2-81&lt;BR /&gt;MAC Address Range:&amp;nbsp; 70df.2f32.bfda to 70df.2f32.bfda&lt;BR /&gt;App. name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA FirePOWER&lt;BR /&gt;App. Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;BR /&gt;App. Status Desc:&amp;nbsp;&amp;nbsp; Normal Operation&lt;BR /&gt;App. version:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6.2.2-81&lt;BR /&gt;Data Plane Status:&amp;nbsp; Up&lt;BR /&gt;Console session:&amp;nbsp;&amp;nbsp;&amp;nbsp; Ready&lt;BR /&gt;Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;BR /&gt;DC addr:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.51.40&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Mgmt IP addr:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.51.31&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Mgmt Network mask:&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Mgmt Gateway:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.51.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Mgmt web ports:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Mgmt TLS enabled:&amp;nbsp;&amp;nbsp; true&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;FW-ASA-RED-2#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firesight doesn't show any statistics:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="traffic firepower.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/6679i864CA9810902C6AB/image-size/large?v=v2&amp;amp;px=999" role="button" title="traffic firepower.JPG" alt="traffic firepower.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Logging is enabled on ACL:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="traffic firepower_acl_logging.JPG" style="width: 921px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/6680iE122C46D0B1B8D54/image-size/large?v=v2&amp;amp;px=999" role="button" title="traffic firepower_acl_logging.JPG" alt="traffic firepower_acl_logging.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And here is my policy:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="traffic firepower_acl_policy.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/6681i3895C5260083BFB7/image-size/large?v=v2&amp;amp;px=999" role="button" title="traffic firepower_acl_policy.JPG" alt="traffic firepower_acl_policy.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don't know which is the problem and I don't know what to change to make it works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/3317763#M1030825</guid>
      <dc:creator>p.juarezponte</dc:creator>
      <dc:date>2018-01-24T15:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: how do i see firepower traffic in firesight?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/3317858#M1030826</link>
      <description>&lt;P&gt;Have you applied the Protect + Control license to the device?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it correct to assume that Analysis &amp;gt; Connection Events also shows nothing?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 16:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-see-firepower-traffic-in-firesight/m-p/3317858#M1030826</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-01-24T16:46:58Z</dc:date>
    </item>
  </channel>
</rss>

