<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AA 5506 as a IDS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734929#M1033575</link>
    <description>&lt;P&gt;I have a spare 5506w that I am looking to use as an IDS sensor in my environment. We already own a SourceFire license for this box. What I'm looking to do is configure a SPAN port on my 5ks, have the 5506 monitor traffic and report back to my defense center. SPAN port is already configured and sending traffic. ASA is not capturing the traffic. Is there a way to configure the ports on the ASA to be&amp;nbsp;promiscuous?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 12:47:47 GMT</pubDate>
    <dc:creator>Travis Marzo</dc:creator>
    <dc:date>2019-03-12T12:47:47Z</dc:date>
    <item>
      <title>AA 5506 as a IDS</title>
      <link>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734929#M1033575</link>
      <description>&lt;P&gt;I have a spare 5506w that I am looking to use as an IDS sensor in my environment. We already own a SourceFire license for this box. What I'm looking to do is configure a SPAN port on my 5ks, have the 5506 monitor traffic and report back to my defense center. SPAN port is already configured and sending traffic. ASA is not capturing the traffic. Is there a way to configure the ports on the ASA to be&amp;nbsp;promiscuous?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:47:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734929#M1033575</guid>
      <dc:creator>Travis Marzo</dc:creator>
      <dc:date>2019-03-12T12:47:47Z</dc:date>
    </item>
    <item>
      <title>Hi, I think the command</title>
      <link>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734930#M1033579</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the command "traffic-forward sfr monitor-only" will help.&lt;/P&gt;&lt;P&gt;Refer the link : http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/T-Z/cmdref4/t2.html#pgfId-1614309&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aastha&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Rate if that helps!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2015 18:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734930#M1033579</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2015-10-23T18:51:49Z</dc:date>
    </item>
    <item>
      <title>In additions to the command</title>
      <link>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734931#M1033581</link>
      <description>&lt;P&gt;In additions to the command Aastha mentioned, the ASA has to be in transparent mode for that command to be available. The default mode is routed.&lt;/P&gt;&lt;P&gt;Remember - switching modes will erase the current configuration on the ASA! So make sure you have a backup if the current configuration is important to you.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Oct 2015 13:21:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734931#M1033581</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-10-24T13:21:57Z</dc:date>
    </item>
    <item>
      <title>I've never worked with a</title>
      <link>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734932#M1033583</link>
      <description>&lt;P&gt;I've never worked with a transparent firewall before. How am I to manage it remotely? I was able to assign an IP address to the management port but unable to ping. I am sitting on the same subnet. I haven't been able to find any articles to point me in the right direction....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for all the help so far. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2015 17:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734932#M1033583</guid>
      <dc:creator>Travis Marzo</dc:creator>
      <dc:date>2015-10-27T17:51:49Z</dc:date>
    </item>
    <item>
      <title>Hi, You can go through doc :</title>
      <link>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734933#M1033586</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can go through doc : http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/97853-Transparent-firewall.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Rate if it helps!!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2015 18:07:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aa-5506-as-a-ids/m-p/2734933#M1033586</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2015-10-27T18:07:41Z</dc:date>
    </item>
  </channel>
</rss>

