<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Software FirePower management 0/0 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330149#M1041362</link>
    <description>&lt;P&gt;The certificate error is because you are using a default self-signed certificate. ASDM uses Java and its SSL/TLS libraries and certificates. Unless the certificate comes from a trusted 3rd party certificate authority (CA) or had been explicitly imported and trusted into your client PC's local certificate store you will get that message.&lt;/P&gt;</description>
    <pubDate>Tue, 13 Feb 2018 15:11:05 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2018-02-13T15:11:05Z</dc:date>
    <item>
      <title>Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3327863#M1041351</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am going to implement a pair of FW cluster in Active/passive mode with software Firepower module.&lt;BR /&gt;Here's what I suggest:&lt;BR /&gt;- SFR module managed by ASDM&lt;BR /&gt;&amp;nbsp;- SFR management using interface management0/0&lt;BR /&gt;&amp;nbsp;- FW management using inside interface G0/0&lt;BR /&gt;&amp;nbsp;they are connected to two different ports on a management L2 switch in the same vlan.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;Since I use etherchannel (2 ports) for each zone, I don't have enough ports for management.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;So my question is:&lt;BR /&gt;&amp;nbsp;Could I use the management 0/0 for both SFR module and FW? &lt;BR /&gt;&amp;nbsp;How can I configure in this case?&lt;BR /&gt;&amp;nbsp;Any impact on the traffic flow going thru this port?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another case: if I use VM Management center for SFR, should I also use management 0/0 for Firepower?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3327863#M1041351</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2020-02-21T15:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3328691#M1041352</link>
      <description>&lt;P&gt;You can manage both the Firepower module and the ASA via interface m0/0. They will each have their own IP address on the same subnet. There's no functional impact on either device.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2018 16:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3328691#M1041352</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-02-10T16:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3328719#M1041353</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Thanks for your reply, this is what I want to do.&lt;/P&gt;
&lt;P&gt;Could you show me how to connect the FW management interface and the SFR module ?&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2018 17:46:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3328719#M1041353</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2018-02-10T17:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3328902#M1041354</link>
      <description>&lt;P&gt;They simply connect to your existing infrastructure via a switchport in a VLAN that's associated with the subnet from which you have configured their IP addresses.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2018 10:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3328902#M1041354</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-02-11T10:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3329260#M1041355</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have connected the management 0/0 on a switch containing ADM VLAN.&lt;/P&gt;
&lt;P&gt;SFR module is configured using the same management 0/0 interface as default gw.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I cannot ssh the FW address, but only SFR module. As far as I know (maybe I am wrong) this is normal since one cannot use the same management interface for two devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even I can use ASDM to manage the FW but I also use CLI to run on it. This solution is not what I expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any one has some suggestions?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 10:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3329260#M1041355</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2018-02-12T10:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3329738#M1041356</link>
      <description>&lt;P&gt;You can use one physical interface to manage both the ASA and the Firepower (sfr) module. Each must have an address in the same subnet and the interface must connect to a switchport in access mode (or you can plug your laptop directly into it). Furthermore, the ASA must allow management access (http and ssh) on the management interface.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 02:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3329738#M1041356</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-02-13T02:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330109#M1041357</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Here's what I have done:&lt;/P&gt;
&lt;P&gt;- interface management 0/0 connected to a switch with the port configured "switchport access vlan"&lt;/P&gt;
&lt;P&gt;- FW and SFR are on the same subnet&lt;/P&gt;
&lt;P&gt;- http and ssh are configured&lt;/P&gt;
&lt;P&gt;- reboot ASA&lt;/P&gt;
&lt;P&gt;After these actions, the following works:&lt;/P&gt;
&lt;P&gt;- ASDM&lt;/P&gt;
&lt;P&gt;- ssh to SFR (from a pc in the same subnet)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But ssh to ASA didn't work with message "server unexpectedly closed network connection".&lt;/P&gt;
&lt;P&gt;I am working on it. I should missed something.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 14:40:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330109#M1041357</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2018-02-13T14:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330120#M1041359</link>
      <description>&lt;P&gt;The "server unexpectedly closed" message usually indicates a protocol error like no common crypto algorithm (usually shows up in the log of your terminal program) or also something like no rsa key on the ASA (can verify with "show crypto key mypubkey rsa" or (re)generate one with "crypto key generate rsa mod 2048" command from config mode).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 14:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330120#M1041359</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-02-13T14:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330146#M1041361</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Thanks for your quick answer. I am going in this direction.&lt;/P&gt;
&lt;P&gt;I also got this message when I run ASDM:&lt;/P&gt;
&lt;P&gt;"The certificate used to identify the website is not trusted."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 15:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330146#M1041361</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2018-02-13T15:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330149#M1041362</link>
      <description>&lt;P&gt;The certificate error is because you are using a default self-signed certificate. ASDM uses Java and its SSL/TLS libraries and certificates. Unless the certificate comes from a trusted 3rd party certificate authority (CA) or had been explicitly imported and trusted into your client PC's local certificate store you will get that message.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 15:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330149#M1041362</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-02-13T15:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330154#M1041363</link>
      <description>&lt;P&gt;Hello Marvins,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's my ssh configuration:&lt;/P&gt;
&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;
&lt;P&gt;ssh stricthostkeycheck&lt;/P&gt;
&lt;P&gt;ssh x.x.x.x ADM&lt;/P&gt;
&lt;P&gt;ssh version 2&lt;/P&gt;
&lt;P&gt;ssh timeout 15&lt;/P&gt;
&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 15:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330154#M1041363</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2018-02-13T15:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330172#M1041364</link>
      <description>&lt;P&gt;Assuming the "ssh" command is followed by the address or subnet and mask of where your manage the ASA from that's fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you check the "show crypto..." command I mentioned?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 15:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330172#M1041364</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-02-13T15:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330392#M1041365</link>
      <description>&lt;P&gt;After regenerate the rsa key, ssh to asa works well. Thanks very much.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One last question, just for my curiosity, why did ssh to SFR work before? Does it really need a rsa key?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 20:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330392#M1041365</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2018-02-13T20:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: Software FirePower management 0/0</title>
      <link>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330446#M1041367</link>
      <description>&lt;P&gt;You're welcome - thanks for rating.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASA needs you to explicitly generate an RSA key before using ssh to it the first time. Without knowng the provenance of your ASA I can't say why it might not have had one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The sfr module setup pre-generates one on it.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 21:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/software-firepower-management-0-0/m-p/3330446#M1041367</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-02-13T21:54:10Z</dc:date>
    </item>
  </channel>
</rss>

