<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5500-x Firepower Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3207169#M1065155</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You can use the global&amp;nbsp; policy as follows:&lt;/P&gt;
&lt;P&gt;-Identify the traffic that you need to send to the IPS module.&lt;/P&gt;
&lt;P&gt;-create a class-map for access-list&lt;/P&gt;
&lt;P&gt;-apply the class-map under the global policy-map&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list IPS extended permit ip any any&lt;/P&gt;
&lt;P&gt;class-map IPS-TRAFFIC-CLASS&lt;BR /&gt;&amp;nbsp;description Traffic for IPS Processing&lt;BR /&gt;&amp;nbsp;match access-list IPS&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect snmp&lt;BR /&gt; class IPS-TRAFFIC-CLASS&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
    <pubDate>Mon, 30 Oct 2017 00:45:22 GMT</pubDate>
    <dc:creator>johnd2310</dc:creator>
    <dc:date>2017-10-30T00:45:22Z</dc:date>
    <item>
      <title>ASA 5500-x Firepower Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3207041#M1065153</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to check on how to redirect the ASA traffic into firepower for IPS and AMP. Current ASA global policy match the&amp;nbsp;default-inspection-traffic. I suppose this does not match all traffic. Hence wondering&amp;nbsp; what the general best practice for configuring service policy in ASA to enable the ASA Firepower inspection ? Meaning to say, Should I use the current global policy as it is or should I&amp;nbsp; modify the current global policy match to any any instead of default-inception-traffic ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Ragulan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3207041#M1065153</guid>
      <dc:creator>ragulan_dms</dc:creator>
      <dc:date>2020-02-21T14:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5500-x Firepower Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3207048#M1065154</link>
      <description>&lt;P&gt;Best practice varies according to what you are trying to inspect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many organizations match all and inspect that but if you have specific traffic you need to target then yours would be different.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also if you have, for instance, a significant amount of traffic that you trust (like IPsec going to a termination point inside your network) then you would exempt that from inspection.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 14:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3207048#M1065154</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-29T14:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5500-x Firepower Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3207169#M1065155</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You can use the global&amp;nbsp; policy as follows:&lt;/P&gt;
&lt;P&gt;-Identify the traffic that you need to send to the IPS module.&lt;/P&gt;
&lt;P&gt;-create a class-map for access-list&lt;/P&gt;
&lt;P&gt;-apply the class-map under the global policy-map&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list IPS extended permit ip any any&lt;/P&gt;
&lt;P&gt;class-map IPS-TRAFFIC-CLASS&lt;BR /&gt;&amp;nbsp;description Traffic for IPS Processing&lt;BR /&gt;&amp;nbsp;match access-list IPS&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect snmp&lt;BR /&gt; class IPS-TRAFFIC-CLASS&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2017 00:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3207169#M1065155</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2017-10-30T00:45:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5500-x Firepower Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3209027#M1065156</link>
      <description>&lt;P&gt;Thanks John and Melvin. This means , for example, ftp traffic will go through both ASA inspection and firepower IPS ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 01:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3209027#M1065156</guid>
      <dc:creator>ragulan_dms</dc:creator>
      <dc:date>2017-11-02T01:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5500-x Firepower Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3209048#M1065157</link>
      <description>&lt;P&gt;Yes, ASA runs its own inspect and sends a&amp;nbsp;&lt;U&gt;copy&lt;/U&gt; of the packets to the Firepower module.&lt;/P&gt;
&lt;P&gt;Firepower runs preprocessor and other&amp;nbsp;advanced security (IPS, AMP...) on the connections and instructs the ASA to drop&amp;nbsp;or reset a connection if needed.&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 01:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5500-x-firepower-configuration/m-p/3209048#M1065157</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2017-11-02T01:47:44Z</dc:date>
    </item>
  </channel>
</rss>

