<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 2140 Assistance in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4103792#M1071051</link>
    <description>&lt;P&gt;Firepower appliances all run FXOS. On the higher end models (4100 and 9300 series) it's a separate OS that you interact with via the cli or Firepower Chassis Manager. On the 1100 and 2100 series with FTD it's embedded and it's not generally necessary to interact with it.&lt;/P&gt;
&lt;P&gt;It's (very loosely) kind of like a hypervisor in that it controls the hardware and the FTD or ASA is a logical device that runs over the abstraction layer provided by FXOS.&lt;/P&gt;
&lt;P&gt;A Firepower appliance can run ASA software but in that case you don't get any of the IPS or NGFW capability. Most people opt to run FTD which integrates ASA and Firepower capability in a unified image. The ASA subsystem is sometimes referred to as "LINA" while the Firepower bits are "Snort". That's an oversimplification but you will see the terms used nonetheless.&lt;/P&gt;
&lt;P&gt;When migrating an ASA config to FTD you do have the option of just putting the ASA rules in a prefilter policy with a 1-1 match with the ASA. However I don't recommend that as you are missing out on the L7 deep packet inspection that you get from Snort. I recommend using the Firepower Migration Tool which will transfer the object and ACLs etc. from the ASA config to Firepower's Access Control Policy.&lt;/P&gt;
&lt;P&gt;To learn more, please see any of the many fine Cisco Live presentations on Firepower or one of the recent books available from Cisco Press.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jun 2020 02:29:37 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-06-16T02:29:37Z</dc:date>
    <item>
      <title>Firepower 2140 Assistance</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4103774#M1071047</link>
      <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;I am new to the Firepower appliances and had some questions. Our organization has 4x 2140 Firepower appliances, however they are not currently operational in the network. We are still currently running off of ASA5545X. We would like to migrate away from the ASA's onto the Firepower appliances but I am not sure where to start. The appliances seem to have the Firepower software already installed running version 6.2.2 (Build 81)and are currently imported into an FMC. I had a few questions about these devices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Do the 2140's run FXOS? I am unable to see if they are at the moment. From what I understand FXOS is like a hypervisor software that allows FTD software and ASA software to run on these devices?&lt;/P&gt;&lt;P&gt;-Do these devices run the ASA software? If not, how do you configure classic firewall rules on the device? is the ASA software accessed in a different way than the Firepower software?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I only have experience with the ASA 5545x running the Firepower module, which made the deployment much more straightforward. Any assistance you can provide on how all these software's fit together and how to go about accessing them on the device would be greatly appreciated!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks everyone!&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 01:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4103774#M1071047</guid>
      <dc:creator>Craddockc</dc:creator>
      <dc:date>2020-06-16T01:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 Assistance</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4103792#M1071051</link>
      <description>&lt;P&gt;Firepower appliances all run FXOS. On the higher end models (4100 and 9300 series) it's a separate OS that you interact with via the cli or Firepower Chassis Manager. On the 1100 and 2100 series with FTD it's embedded and it's not generally necessary to interact with it.&lt;/P&gt;
&lt;P&gt;It's (very loosely) kind of like a hypervisor in that it controls the hardware and the FTD or ASA is a logical device that runs over the abstraction layer provided by FXOS.&lt;/P&gt;
&lt;P&gt;A Firepower appliance can run ASA software but in that case you don't get any of the IPS or NGFW capability. Most people opt to run FTD which integrates ASA and Firepower capability in a unified image. The ASA subsystem is sometimes referred to as "LINA" while the Firepower bits are "Snort". That's an oversimplification but you will see the terms used nonetheless.&lt;/P&gt;
&lt;P&gt;When migrating an ASA config to FTD you do have the option of just putting the ASA rules in a prefilter policy with a 1-1 match with the ASA. However I don't recommend that as you are missing out on the L7 deep packet inspection that you get from Snort. I recommend using the Firepower Migration Tool which will transfer the object and ACLs etc. from the ASA config to Firepower's Access Control Policy.&lt;/P&gt;
&lt;P&gt;To learn more, please see any of the many fine Cisco Live presentations on Firepower or one of the recent books available from Cisco Press.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 02:29:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4103792#M1071051</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-16T02:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 Assistance</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4103810#M1071057</link>
      <description>&lt;P&gt;Totally agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;prefer using the migration tool which works fine.&amp;nbsp;&lt;BR /&gt;just to add something about this tool, it won’t migrate any dynamic routing if you have any nor the VPN configuration which have to be taken care manually.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 03:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4103810#M1071057</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-06-16T03:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 Assistance</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104191#M1071094</link>
      <description>Marvin/Francesco,&lt;BR /&gt;&lt;BR /&gt;Thanks so much for your replies. So in my case the FXOS is embedded and I dont really need to mess with it, got it. I am still kind of confused as to how the FTD software works thought. When I SSH into the management interface of the device, it takes me to the CLI of the Firepower software 6.2.2, is this the FTD software? Or just Firepower software? Is there a difference?&lt;BR /&gt;&lt;BR /&gt;Thank you.</description>
      <pubDate>Tue, 16 Jun 2020 14:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104191#M1071094</guid>
      <dc:creator>Craddockc</dc:creator>
      <dc:date>2020-06-16T14:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 Assistance</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104336#M1071101</link>
      <description>&lt;P&gt;Firepower software and FTD are often used interchangeably. That's not exactly correct (i.e the older Firepower 7000 and 8000 series NGIPS run Firepower that's not FTD) but for most purposes it's fine to consider them as the same.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 18:31:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104336#M1071101</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-16T18:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 Assistance</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104356#M1071104</link>
      <description>&lt;P&gt;Thank you Marvin. So the only software I should really be interacting with on the 2140 is the FTD software where the "ASA rules" are actually migrated into the Access Control Policy of the FMC?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 19:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104356#M1071104</guid>
      <dc:creator>Craddockc</dc:creator>
      <dc:date>2020-06-16T19:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 Assistance</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104554#M1071113</link>
      <description>&lt;P&gt;Depending on how you are managing the 2140 appliances you might not even log into the devices at all. If you use a Firepower Management Center (FMC) server, all but the initial setup of the appliances is done on FMC and deployed to the managed devices.&lt;/P&gt;
&lt;P&gt;If you manage them without FMC then you would login to them directly and use the on-box Firepower Device Manager (FDM) GUI.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 02:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-assistance/m-p/4104554#M1071113</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-17T02:56:05Z</dc:date>
    </item>
  </channel>
</rss>

