<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Global Forum for ASA and FTD Topics - AMA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271251#M1077227</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;we'll be doing a tech refresh soon with our ASA 5500-X series. per checking EOL link, there's no product replacement yet and i tried to search in cisco links and tried to google but no avail.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/eos-eol-notice-c51-743545.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/eos-eol-notice-c51-743545.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;our ASA simply does ACL, NAT, security/customer context, A/S HA, S2S and RA VPN in our environment and we just need to do a 1-1 replacement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can someone advise the "rule of thumb" in sizing the equivalent ASA below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5525x &amp;gt; FPR21xx ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5545x &amp;gt; FPR41xx ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA 5555x &amp;gt; FPR41xx ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5585-X &amp;gt; FPR9300 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we also plan to run the classic ASA image/appliance. is there a separate for this or is license structure shared with FTD?&lt;/P&gt;</description>
    <pubDate>Wed, 13 Jan 2021 03:11:22 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2021-01-13T03:11:22Z</dc:date>
    <item>
      <title>Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4270415#M1077173</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="banner_AMAGL_en_lp2_900x150_12jan_2021.png" style="width: 900px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/101396iF8DE63A8FCE0C0FD/image-size/large?v=v2&amp;amp;px=999" role="button" title="banner_AMAGL_en_lp2_900x150_12jan_2021.png" alt="banner_AMAGL_en_lp2_900x150_12jan_2021.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;TABLE class="lia-align-center" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A id="dropdownMenu1" class="dropdown-toggle" target="_blank" type="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="true"&gt;&lt;/A&gt;&lt;A title="Foro Global de Seguridad sobre temas de ASA y FTD - AMA" href="https://community.cisco.com/t5/discusiones-seguridad/foro-global-de-seguridad-para-asa-y-ftd-ama/td-p/4272093" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;Español&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A title="Fórum Global de Segurança para Tópicos ASA e FTD- AMA" href=" https://community.cisco.com/t5/discuss%C3%B5es-seguran%C3%A7a/f%C3%B3rum-global-de-seguran%C3%A7a-para-t%C3%B3picos-asa-e-ftd-ama/td-p/4270320" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;Português&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A title="Forum Global de Sécurité au sujet de ASA et FTD - Demandez-moi N'importe Quoi" href="https://community.cisco.com/t5/discussions-de-s%C3%A9curit%C3%A9/demandez-moi-n-importe-quoi-s%C3%A9curit%C3%A9-au-sujet-de-asa-et-ftd/m-p/4270421" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="selector-title"&gt;Français&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A title=" Спроси всё о безопасности в продуктах ASA и FTD" href="https://community.cisco.com/t5/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C-security/%D1%81%D0%BF%D1%80%D0%BE%D1%81%D0%B8-%D0%B2%D1%81%D1%91-%D0%BE-%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8-%D0%B2-%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B0%D1%85-asa-%D0%B8-ftd/m-p/4270769" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;Русский&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A id="dropdownMenu1" class="dropdown-toggle" target="_blank" type="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="true"&gt;&lt;/A&gt;&lt;A title="Ask Me Anythingイベント - セキュリティとASA -" href="https://community.cisco.com/t5/-/-/m-p/4270489" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;日本語&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A lang="zh" title="【专家问答】ASA 和 FTD 相关全球安全社区活动" href="http://bbs.csc-china.com.cn/forum.php?mod=viewthread&amp;amp;tid=991934" target="_self" rel="nofollow noreferrer noreferrer noreferrer"&gt;简体中文&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;This event is a chance to discuss about&lt;/STRONG&gt;&lt;/EM&gt; &lt;A href="https://www.cisco.com/c/en/us/products/security/adaptive-security-appliance-asa-software/index.html" target="_blank" rel="noopener"&gt;Cisco Adaptive Security Appliance&lt;/A&gt; (ASA) and &lt;A href="https://www.cisco.com/c/en/us/products/security/firewalls/index.html" target="_blank" rel="noopener"&gt;Firepower Threat Defense&lt;/A&gt; (FTD) regarding products, management, installation, configuration, implementation, use, and integration with other devices within your network. Learn the best practices to make the most of the advanced firewall settings, as well as the best practices to troubleshoot its common issues. This forum event works well as an introduction for those who are not familiar with the security tools and have recently started using them.&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;STRONG&gt;To participate in this event, please use the&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="reply-button.png" style="width: 75px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/84471i2CEE1C191BCC294D/image-size/small?v=v2&amp;amp;px=200" role="button" title="reply-button.png" alt="reply-button.png" /&gt;&lt;/span&gt; button below to ask your questions&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#00CCFF"&gt;Ask questions from Tuesday, January 12 to Friday, January 22, 2021&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV&gt;&lt;STRONG&gt;Featured experts&lt;/STRONG&gt;
&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Berenice Guerra" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/101097i03C28310A14FE07B/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="Photo_bguerram_100x140.png" alt="Photo_bguerram_100x140.png" /&gt;&lt;/span&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1044170" target="_self"&gt;&lt;STRONG&gt;Berenice Guerra Martinez&lt;/STRONG&gt;&lt;/A&gt; is a Technical Consulting Engineer at the Cisco Global Technical Assistance Center (TAC) for Security - Next Generation Firewall (NGFW). She specializes in Threat Detection, ASA and Firepower configuration and best practices, and Firepower integrations. Berenice has a bachelor’s degree in electronic engineering with a cybersecurity specialization and is a Telecommunications Technician. She holds three different Cisco certifications: CCNA R&amp;amp;S, CyberOps Associate, and DevNet Associate.&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Namit Agarwal" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/101098iB236DD3929F11E0B/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="Photo_namiagar_100x140.png" alt="Photo_namiagar_100x140.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/257979" target="_self"&gt;&lt;STRONG&gt;Namit Agarwal&lt;/STRONG&gt;&lt;/A&gt; is a Technical Marketing Engineer in the Security Business Group. He is based out of Toronto, Canada. He partners closely with our platform product management team and leads critical technical enablement engagements. He joined Cisco in 2009 and has held multiple positions, most recently working as a Technical Leader with the Security CX team in Bangalore, India. In that role, he worked on escalations, led serviceability initiatives for product improvement, and drove engagements with the NGFW sales teams. He is a CCIE n°33795 Security and has experience with multiple Cisco Security solutions such as Cisco Firewalls, IPS, VPN, and Cloud Security.&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Ilkin Gasimov" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/101099iDF9B160DD5C071C2/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="Photo_igasimov_100x140.png" alt="Photo_igasimov_100x140.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/368590" target="_self"&gt;&lt;STRONG&gt;Ilkin Gasimov&lt;/STRONG&gt;&lt;/A&gt; is a Technical Consulting Engineer in the Cisco Global TAC for Security - NGFW. He joined the TAC team in 2017 and since then has mainly been focused on supporting Cisco NGFW platforms and on the collaboration with the Cisco Business Unit to contribute to the NGFW product quality improvement. He has also delivered troubleshooting sessions to the partners and customers. Before joining Cisco, he had hands-on experience with the Cisco ASA firewalls in enterprise and mobile networking environments. He holds a CCIE n°54979 Security certification since 2016.&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Ricardo Diez Gutierrez Gonzalez" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/101100iC43BAC952AD94F9D/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="Photo_ricargut_100x140.png" alt="Photo_ricargut_100x140.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/362259" target="_self"&gt;&lt;STRONG&gt;Ricardo Diez Gutierrez Gonzalez&lt;/STRONG&gt;&lt;/A&gt; is a Technical Consulting Engineer at the Cisco HTTS TAC for Security – NGFW – ASA – VPN. He joined Cisco six years ago. He belonged to the incubator program for six months achieving his CCNA and then he became a full-time engineer. Later he obtained his Specialist NGFW and CCNP security certifications.&amp;nbsp; He is currently studying for the CCIE exam.&lt;/SPAN&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;For more information, visit the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/security/ct-p/4561-security" target="_self"&gt;Security Discussions&lt;/A&gt; category.&lt;BR /&gt;Find further events on &lt;A href="https://community.cisco.com/t5/custom/page/page-id/Events?categoryId=4561-security" target="_blank" rel="noopener"&gt;Security Events&lt;/A&gt; list.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;Do you know you can get answers before opening a TAC case by visiting the Cisco Community? &amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="lia-align-center"&gt;&lt;FONT color="#FFCC00"&gt;&lt;SPAN&gt;&lt;STRONG&gt;**Helpful votes Encourage Participation! **&lt;BR /&gt;Please be sure to rate the Answers to Questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 14 Jan 2021 06:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4270415#M1077173</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2021-01-14T06:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4270750#M1077185</link>
      <description>&lt;P&gt;Hello team,&lt;/P&gt;
&lt;P&gt;When using an FDM-managed FTD 6.7 appliance we are directed to use the API for adding snmp-server hosts. Reference:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/216551-configure-and-troubleshoot-snmp-on-firep.html#anc7" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/216551-configure-and-troubleshoot-snmp-on-firep.html#anc7&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However, when querying the interfaces using the API explorer, we are unable to get the diagnostic interface details. The API query GET &lt;STRONG&gt;/devices/default/interfaces&lt;/STRONG&gt; only returns information for data interfaces. GET &lt;STRONG&gt;/devices/default/operational/interfaces &lt;/STRONG&gt;shows us diagnostic interface information but not the&amp;nbsp;interface "version", "name", "id", and "type" fields needed for the POST &lt;STRONG&gt;/object/snmphosts/&lt;/STRONG&gt; API.&lt;/P&gt;
&lt;P&gt;So how do we add an snmp-server for the diagnostic interface? The appliance in question is a Firepower 2140 if that makes any difference.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 12:31:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4270750#M1077185</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-12T12:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271015#M1077208</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;On ASA if an access-list allows connections between 2 interfaces with the same security-level, are these connections still subject to the ‘same-security-traffic permit inter-interface’ command check?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000080"&gt;&lt;EM&gt;Note: This question is a translation of a post originally created in Portuguese by &lt;A id="link_16" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/855419" target="_self"&gt;&lt;SPAN class=""&gt;Didier M&lt;/SPAN&gt;&lt;/A&gt;. It has been translated by Cisco Community to share the inquiry and its solution in different languages.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 18:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271015#M1077208</guid>
      <dc:creator>Cisco Moderador</dc:creator>
      <dc:date>2021-01-12T18:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271017#M1077209</link>
      <description>&lt;P&gt;Yes. Even if an access-list allows connections between 2 interfaces with the same security-level, the "same-security-traffic permit inter-interface" command is still needed to allow connections.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 18:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271017#M1077209</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2021-01-12T18:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271099#M1077216</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Is it possible to integrate ASA with Firepower services into the new SecureX dashboard ?&lt;/P&gt;&lt;P&gt;Cdlt. JMD&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" color="#1e4471"&gt;&lt;EM&gt;* This is a question posted in French by &lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/853848" target="_self"&gt;Jean MD&lt;/A&gt;. It has been translated by Cisco Community to share the inquiry and its solution in different languages.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 20:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271099#M1077216</guid>
      <dc:creator>Modérateur Cisco</dc:creator>
      <dc:date>2021-01-12T20:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271125#M1077218</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To get the details of the diagnostic interface, first, get the id of the Management interface with the API query &lt;STRONG&gt;InterfaceInfo &amp;gt; &lt;/STRONG&gt;GET &lt;STRONG&gt;/operational/interfaceinfo/{objId}. &lt;/STRONG&gt;You can leave the default value for the&amp;nbsp;&lt;STRONG&gt;objid &lt;/STRONG&gt;parameter.&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;{
  "interfaceInfoList": [
    {
      "interfaceId": "string",
      "hardwareName": "string",
      "speedCapability": [
        "AUTO"
      ],
      "duplexCapability": [
        "AUTO"
      ],
      "interfacePresent": true,
      "id": "string",
      "type": "InterfaceInfoEntry"
    }
  ],
  "id": "string",
  "type": "InterfaceInfo",
  "links": {
    "self": "string"
  }
}&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;This is an example of the API response for the Management interface.&lt;/P&gt;
&lt;PRE class="json"&gt;&lt;CODE&gt;{
  "&lt;SPAN class="hljs-attr"&gt;interfaceInfoList&lt;/SPAN&gt;": [
     {
      "&lt;SPAN class="hljs-attr"&gt;interfaceId&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"b727b013-c677-11e9-adec-5d5808710d61"&lt;/SPAN&gt;,
      "&lt;SPAN class="hljs-attr"&gt;hardwareName&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"Management1/1"&lt;/SPAN&gt;,
      "&lt;SPAN class="hljs-attr"&gt;speedCapability&lt;/SPAN&gt;": [
        &lt;SPAN class="hljs-string"&gt;"IGNORE"&lt;/SPAN&gt;
      ],
      "&lt;SPAN class="hljs-attr"&gt;duplexCapability&lt;/SPAN&gt;": [
        &lt;SPAN class="hljs-string"&gt;"IGNORE"&lt;/SPAN&gt;
      ],
      "&lt;SPAN class="hljs-attr"&gt;interfacePresent&lt;/SPAN&gt;": &lt;SPAN class="hljs-literal"&gt;true&lt;/SPAN&gt;,
      "&lt;SPAN class="hljs-attr"&gt;id&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"default"&lt;/SPAN&gt;,
      "&lt;SPAN class="hljs-attr"&gt;type&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"interfaceinfoentry"&lt;/SPAN&gt;
    }
  ],
  "&lt;SPAN class="hljs-attr"&gt;id&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"default"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;type&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"interfaceinfo"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;links&lt;/SPAN&gt;": {
    "&lt;SPAN class="hljs-attr"&gt;self&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"https://x.x.x.x/api/fdm/v5/operational/interfaceinfo/default"&lt;/SPAN&gt;
  }
}&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;Collect the &lt;CODE&gt;&lt;SPAN class="hljs-attr"&gt;interfaceId&lt;/SPAN&gt;&lt;/CODE&gt; value, this will be the value of the &lt;STRONG&gt;objid&lt;/STRONG&gt; of the next query.&lt;/P&gt;
&lt;P&gt;Now go to &lt;STRONG&gt;Interface &amp;gt; &lt;/STRONG&gt;GET&lt;STRONG&gt;/devices/default/operational/interfaces/{objId}. &lt;/STRONG&gt;Add the &lt;CODE&gt;&lt;SPAN class="hljs-attr"&gt;interfaceId&lt;/SPAN&gt;&lt;/CODE&gt;value of the Management interface from the above query and execute the API call.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the API response, you will get the diagnostic interface details.&lt;/P&gt;
&lt;PRE class="json"&gt;&lt;CODE&gt;{
  "&lt;SPAN class="hljs-attr"&gt;name&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"diagnostic"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;hardwareName&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"Management1/1"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;ipv4Address&lt;/SPAN&gt;": {
    "&lt;SPAN class="hljs-attr"&gt;ipAddress&lt;/SPAN&gt;": &lt;SPAN class="hljs-literal"&gt;null&lt;/SPAN&gt;,
    "&lt;SPAN class="hljs-attr"&gt;netmask&lt;/SPAN&gt;": &lt;SPAN class="hljs-literal"&gt;null&lt;/SPAN&gt;,
    "&lt;SPAN class="hljs-attr"&gt;type&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"ipv4address"&lt;/SPAN&gt;
  },
  "&lt;SPAN class="hljs-attr"&gt;ipv6Address&lt;/SPAN&gt;": {
    "&lt;SPAN class="hljs-attr"&gt;ipAddress&lt;/SPAN&gt;": &lt;SPAN class="hljs-literal"&gt;null&lt;/SPAN&gt;,
    "&lt;SPAN class="hljs-attr"&gt;type&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"ipv6address"&lt;/SPAN&gt;
  },
  "&lt;SPAN class="hljs-attr"&gt;macAddress&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"string"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;speedType&lt;/SPAN&gt;": &lt;SPAN class="hljs-literal"&gt;null&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;enabled&lt;/SPAN&gt;": &lt;SPAN class="hljs-literal"&gt;true&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;linkState&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"UP"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;id&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"b727b013-c677-11e9-adec-5d5808710d61"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;type&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"interfacedata"&lt;/SPAN&gt;,
  "&lt;SPAN class="hljs-attr"&gt;links&lt;/SPAN&gt;": {
    "&lt;SPAN class="hljs-attr"&gt;self&lt;/SPAN&gt;": &lt;SPAN class="hljs-string"&gt;"https://x.x.x.x/api/fdm/v5/devices/default/operational/interfaces/b727b013-c677-11e9-adec-5d5808710d61"&lt;/SPAN&gt;
  }
}&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 22:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271125#M1077218</guid>
      <dc:creator>Berenice Guerra</dc:creator>
      <dc:date>2021-01-12T22:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271192#M1077225</link>
      <description>&lt;P&gt;Is there any upgrade path and procedure for firepower devices?&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Note: This question is a translation of a post originally created in Japanese by&lt;SPAN&gt;&amp;nbsp;S.Takenaka.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;It has been translated by Cisco Community to share the inquiry and its solution in different languages.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 02:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271192#M1077225</guid>
      <dc:creator>CiscoJapanModerator</dc:creator>
      <dc:date>2021-01-13T02:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271251#M1077227</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;we'll be doing a tech refresh soon with our ASA 5500-X series. per checking EOL link, there's no product replacement yet and i tried to search in cisco links and tried to google but no avail.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/eos-eol-notice-c51-743545.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/eos-eol-notice-c51-743545.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;our ASA simply does ACL, NAT, security/customer context, A/S HA, S2S and RA VPN in our environment and we just need to do a 1-1 replacement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can someone advise the "rule of thumb" in sizing the equivalent ASA below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5525x &amp;gt; FPR21xx ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5545x &amp;gt; FPR41xx ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA 5555x &amp;gt; FPR41xx ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5585-X &amp;gt; FPR9300 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we also plan to run the classic ASA image/appliance. is there a separate for this or is license structure shared with FTD?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 03:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271251#M1077227</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-01-13T03:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271341#M1077229</link>
      <description>&lt;P&gt;Please teach me how to operate (convert) Firepower running ASA-OS with FTD (FX-OS).&lt;BR /&gt;&lt;BR /&gt;Note: This question is a translation of a post originally posted in Japanese by &lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285700" target="_blank" rel="noopener"&gt;cja56910tf&lt;/A&gt;. The post has been translated to all the languages we have in the community&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 08:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271341#M1077229</guid>
      <dc:creator>CiscoJapanModerator</dc:creator>
      <dc:date>2021-01-13T08:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271343#M1077230</link>
      <description>&lt;P&gt;Can you give us an example configuration for profiling devices with the Cisco ASA in conjunction with Cisco ISE for anyConnect connections on the Cisco ASA?&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Note: This question is a translation of a post originally posted in Japanese by&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285700" target="_blank" rel="noopener"&gt;cja56910tf&lt;/A&gt;. The post has been translated to all the languages we have in the community&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 08:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271343#M1077230</guid>
      <dc:creator>CiscoJapanModerator</dc:creator>
      <dc:date>2021-01-13T08:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271345#M1077231</link>
      <description>&lt;P&gt;Since DDoS attacks may occur from the Internet, we are considering using ASA or Firepower as a DDoS countermeasure device.&lt;BR /&gt;Does the machine have such a function in the first place?&lt;BR /&gt;Also, if there is a function, it would be helpful if you could teach us about setting examples, parameter values, and tuning points.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Note: This question is a translation of a post originally posted in Japanese by&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285700" target="_blank" rel="noopener"&gt;cja56910tf&lt;/A&gt;. The post has been translated to all the languages we have in the community&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 08:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271345#M1077231</guid>
      <dc:creator>CiscoJapanModerator</dc:creator>
      <dc:date>2021-01-13T08:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271352#M1077233</link>
      <description>&lt;P&gt;Why I'm not seeing any device in order to generate a Troubleshooting file from my Firepower devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;EM&gt;Note: This question is a translation of a post originally created in Chinese by&lt;SPAN&gt; alina_xiao&amp;nbsp;，&lt;/SPAN&gt;&amp;nbsp;It has been translated by Cisco Community to share the inquiry and its solution in different languages.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 07:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271352#M1077233</guid>
      <dc:creator>Yanli Sun</dc:creator>
      <dc:date>2021-01-13T07:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271355#M1077234</link>
      <description>&lt;P&gt;Could you please clarify the details of this question?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you want to convert or migrate ASA to FTD?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 07:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271355#M1077234</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2021-01-13T07:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271369#M1077238</link>
      <description>&lt;P&gt;Firepower 4100/9300 Series appliances support the&amp;nbsp;deployment of Radware vDP in a Service Chain to protect against DDoS attacks.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please review the following links:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/radware/radware_ftd_qsg.html" target="_self"&gt;Radware DefensePro Service Chain for Firepower Threat Defense Quick Start Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos291/web-guide/b_GUI_FXOS_ConfigGuide_291/logical_devices.html" target="_self"&gt;Firepower 4100/9300 Configuration guide -&amp;nbsp;Chapter: Logical Devices&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;3.&amp;nbsp;&lt;A title="Links in the&amp;nbsp;Radware DefensePro section of the&amp;nbsp;Firepower 9300 Configuration Guides" href="https://www.cisco.com/c/en/us/support/security/firepower-9000-series/products-installation-and-configuration-guides-list.html" target="_self"&gt;Links in the&amp;nbsp;&lt;SPAN&gt;Radware DefensePro section of the&amp;nbsp;&lt;/SPAN&gt;Firepower 9300 Configuration Guides&lt;/A&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 13 Jan 2021 07:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271369#M1077238</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2021-01-13T07:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271409#M1077241</link>
      <description>&lt;P&gt;Hi, yes there is path specially for oldest version of firepower (6.1.0,6.2.0 and 6.2.3).&lt;BR /&gt;On the release notes of each version you can find the upgrade path. For versions 6.2.3+ you can upgrade directly to any base version (6.3.0, 6.4.0 , 6.5.0 , 6.6.0 &lt;BR /&gt;The procedure is the same for the firepower devices and firepower threat defense. You can see the following link for the procedure.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/213269-upgrade-procedure-through-fmc-for-firepo.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/213269-upgrade-procedure-through-fmc-for-firepo.html&lt;/A&gt;&lt;BR /&gt;The upgrade must be done first on the FMC and then on the sensors. The FMC must be on higher or same version of the sensors.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 08:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271409#M1077241</guid>
      <dc:creator>Ricardo1</dc:creator>
      <dc:date>2021-01-13T08:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271524#M1077248</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1044170"&gt;@Berenice Guerra&lt;/a&gt; That's helpful but I am still unable to create a well-formed PUT using the information derived from the instructions you gave. Perhaps it would be best if I opened a TAC case for this issue.&lt;/P&gt;
&lt;P&gt;It is VERY frustrating that, for a senior engineer with over 10 years experience with Cisco firewalls, I can no longer easily do what took ONE LINE of configuration on an ASA now that we are on FTD.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 12:32:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271524#M1077248</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-13T12:32:04Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271740#M1077257</link>
      <description>&lt;P&gt;Hi JMD,&lt;/P&gt;
&lt;P&gt;Yes in fact, you can integrate your ASA devices with Firepower services with SecureX.&lt;/P&gt;
&lt;P&gt;For this you will need to setup a proxy, Cisco Security Services Proxy (CSSP), which will work as a Syslog for the FTD in order to forward the events. The CSSP file to setup can be downloaded from the SSE portal.&lt;/P&gt;
&lt;P&gt;For further details look within the next Cisco content.&lt;/P&gt;
&lt;P&gt;Cisco Video Portal - &lt;A href="https://video.cisco.com/video/6161531920001" target="_blank" rel="noopener"&gt;https://video.cisco.com/video/6161531920001&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Cisco Tech Notes - &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/integrations/CTR/Firepower_and_Cisco_Threat_Response_Integration_Guide/send_events_to_the_cloud_using_syslog.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/integrations/CTR/Firepower_and_Cisco_Threat_Response_Integration_Guide/send_events_to_the_cloud_using_syslog.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for asking&lt;/P&gt;
&lt;P&gt;Bere&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 16:02:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4271740#M1077257</guid>
      <dc:creator>Berenice Guerra</dc:creator>
      <dc:date>2021-01-13T16:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4272049#M1077277</link>
      <description>&lt;P&gt;In order to generate the Troubleshooting file of your firepower devices, navigate in your FMC to System &amp;gt; Health &amp;gt; Monitor &amp;gt; Select Appliance within the list displayed &amp;gt; Generate Troubleshooting Files.&lt;BR /&gt;If you do not see any devices listed below you must probably need to click on the pie chart. Will depend on the health status of your devices from where you can click the pie chart portion to display them. &lt;BR /&gt;Green - Health status&lt;BR /&gt;Yellow – Appliances with some Warnings&lt;BR /&gt;Red – Appliances with Errors&lt;BR /&gt;Blue – Disabled Appliances&lt;/P&gt;
&lt;P&gt;For more details you can go to the next content.&lt;BR /&gt;Cisco Video Portal - &lt;A href="https://video.cisco.com/video/6155382458001" target="_blank"&gt;https://video.cisco.com/video/6155382458001&lt;/A&gt; &lt;BR /&gt;Cisco Tech Notes - &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/sourcefire-defense-center/117663-technote-SourceFire-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/sourcefire-defense-center/117663-technote-SourceFire-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 03:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4272049#M1077277</guid>
      <dc:creator>Berenice Guerra</dc:creator>
      <dc:date>2021-01-14T03:09:22Z</dc:date>
    </item>
    <item>
      <title>回复： Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4272141#M1077280</link>
      <description>&lt;P&gt;Thanks for hosting this event. How can I manage my firepower devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Note: This question is a translation of a post originally created in Chinese by&lt;SPAN&gt; &lt;A class="xw1" href="http://bbs.csc-china.com.cn/home.php?mod=space&amp;amp;uid=77060" target="_blank" rel="noopener"&gt;W2493455280&lt;/A&gt; ，&lt;/SPAN&gt;&amp;nbsp;It has been translated by Cisco Community to share the inquiry and its solution in different languages.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 07:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4272141#M1077280</guid>
      <dc:creator>Yanli Sun</dc:creator>
      <dc:date>2021-01-14T07:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Security Global Forum for ASA and FTD Topics - AMA</title>
      <link>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4272384#M1077293</link>
      <description>&lt;P&gt;Hi team!&lt;/P&gt;
&lt;P&gt;How can I take packet captures in the FTD? I’m familiar with the ASA captures however seems that those commands are not supported by the FTD.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000080"&gt;&lt;EM&gt;Note: This question is a translation of a post originally created in Portuguese by &lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username" style="box-sizing: inherit; white-space: normal; color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;A id="link_32026bdd4c6f81_101a1" class="lia-link-navigation lia-page-link lia-user-name-link" style="box-sizing: inherit; background-color: transparent; color: #025675; text-decoration: none !important; font-weight: normal; outline: 0px; display: inline !important; font-size: 1.4rem !important; cursor: pointer !important;" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/218563" target="_self"&gt;&lt;SPAN class="" style="box-sizing: inherit; white-space: pre-line; word-break: break-word;"&gt;Adolfo Suarez&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;. It has been translated by Cisco Community to share the inquiry and its solution in different languages.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 13:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-global-forum-for-asa-and-ftd-topics-ama/m-p/4272384#M1077293</guid>
      <dc:creator>Cisco Moderador</dc:creator>
      <dc:date>2021-01-14T13:31:42Z</dc:date>
    </item>
  </channel>
</rss>

