<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower feature question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4287999#M1078253</link>
    <description>&lt;P&gt;Marius,&lt;/P&gt;&lt;P&gt;We are running 6.4.0.9 code. Does this mean security level do not yet apply to my deployment as they were re-introduced in 6.7?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Feb 2021 13:31:58 GMT</pubDate>
    <dc:creator>ChristopherCraddock66504</dc:creator>
    <dc:date>2021-02-08T13:31:58Z</dc:date>
    <item>
      <title>Firepower feature question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4286996#M1078199</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ASA there are a few options that dictate what traffic can flow between interfaces. These options are:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Enable traffic between interfaces that are configured with the same security level&lt;/P&gt;&lt;P&gt;-Enable traffic between two or more hosts connected to the same interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do the Firepower appliances have equivalent settings? Or do they allow the traffic between any interface as long as there are the appropriate policies/rules (ACP, NAT etc)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2021 21:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4286996#M1078199</guid>
      <dc:creator>ChristopherCraddock66504</dc:creator>
      <dc:date>2021-02-05T21:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower feature question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4286997#M1078200</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1027298"&gt;@ChristopherCraddock66504&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The commands you are referring to don't exist on the FTD (traffic between FTD interfaces is permitted by default). You are correct, you just permit traffic as per the ACP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2021 21:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4286997#M1078200</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-02-05T21:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower feature question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4287023#M1078201</link>
      <description>&lt;P&gt;Security levels are still available on the FTD interfaces (as of 6.7) but the same-security-traffic commands are no longer present.&amp;nbsp; Security levels need to be configured using flexconfig&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif LAN&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are looking to do hairpinning on the FTD then you can refer to the following link:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html#anc14" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html#anc14&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ip address 192.168.0.20 255.255.255.0&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2021 22:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4287023#M1078201</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-05T22:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower feature question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4287999#M1078253</link>
      <description>&lt;P&gt;Marius,&lt;/P&gt;&lt;P&gt;We are running 6.4.0.9 code. Does this mean security level do not yet apply to my deployment as they were re-introduced in 6.7?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 13:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4287999#M1078253</guid>
      <dc:creator>ChristopherCraddock66504</dc:creator>
      <dc:date>2021-02-08T13:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower feature question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4288011#M1078254</link>
      <description>&lt;P&gt;security-levels are available in 6.4 but as with 6.7 you need to configure it using flexconfig&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 13:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4288011#M1078254</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-08T13:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower feature question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4288136#M1078276</link>
      <description>&lt;P&gt;Marius,&lt;/P&gt;&lt;P&gt;Thank you for the quick reply! I currently do not have the security levels explicitly configured on any of my interfaces. Will this prevent traffic from being able to be routed between interfaces? Or do they only take effect after I enable the feature through Flexconfig? Im assuming they wont have any effect if theyre not configured?&lt;/P&gt;&lt;P&gt;Thank so much!&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 16:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4288136#M1078276</guid>
      <dc:creator>ChristopherCraddock66504</dc:creator>
      <dc:date>2021-02-08T16:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower feature question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4288256#M1078281</link>
      <description>&lt;P&gt;Well, the thing here is that security levels are in place so that access-lists are not needed.&amp;nbsp; The second you configure an access-list for an interface the security-level is no longer used.&amp;nbsp; I have never tried using the security-levels on the FTD but if the logic follows the same as ASA (which it should), if you have no access-lists configured for an interface / security zone, but you do have security-levels configured then traffic from the higher security-level to the lower security level should be allowed.&amp;nbsp; I have never seen a purpose in using the security-levels and have always used access-lists on both ASA and FTD (ACP) so how this would work in reality would need to be tested.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 19:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-feature-question/m-p/4288256#M1078281</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-08T19:28:49Z</dc:date>
    </item>
  </channel>
</rss>

