<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower/m-p/4554852#M1087535</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; &amp;nbsp; Wow.&amp;nbsp; I have to repeat.&amp;nbsp; You have to use GUIs to manage Firepowers?&amp;nbsp; No CLI that is useful?&lt;/P&gt;</description>
    <pubDate>Fri, 18 Feb 2022 00:03:28 GMT</pubDate>
    <dc:creator>sweigle88</dc:creator>
    <dc:date>2022-02-18T00:03:28Z</dc:date>
    <item>
      <title>Firepower</title>
      <link>https://community.cisco.com/t5/network-security/firepower/m-p/4554779#M1087530</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We just received 2 physical Firepowers 2110's with stock loaded 6.6.1-91 software that are supposed to be in a HA setup.&amp;nbsp; &amp;nbsp;I was told you can add ASA software.&amp;nbsp; Is there any reason to do this other than being more comfortable with that software?&amp;nbsp; I'm assuming you manage these through command line and/or Device manager?&amp;nbsp; Reading the documentation, it seems the Device manager is meant for small installations like this, but seems clunky.&amp;nbsp; I've also read you can manage these through Ansible.&amp;nbsp; Sorry, I did not spec these appliances out.&amp;nbsp; That person has left.&amp;nbsp; &amp;nbsp;Advice is much appreciated on best way to manage two physical firepowers.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 21:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower/m-p/4554779#M1087530</guid>
      <dc:creator>sweigle88</dc:creator>
      <dc:date>2022-02-17T21:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower</title>
      <link>https://community.cisco.com/t5/network-security/firepower/m-p/4554784#M1087532</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1291748"&gt;@sweigle88&lt;/a&gt;&amp;nbsp;you could run either FTD software or traditional ASA software. The FTD software supports all the NGFW features such as url filtering, ssl decryption etc, the ASA does not support these features.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An advantage of using ASA software is that it supports more feature than the FTD, there isn't full feature parity, though it's much improved.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can manage the FTD centrally using the FMC, locally using FDM or cloud using CDO. Using FDM or CDO has quite or lot less supported features than if managed by an FMC.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 21:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower/m-p/4554784#M1087532</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-17T21:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower</title>
      <link>https://community.cisco.com/t5/network-security/firepower/m-p/4554797#M1087533</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; &amp;nbsp;ASAs had a pretty good CLI to configure the device with lots of documentation.&amp;nbsp; I haven't seen as much documentation on CLI set up for firepowers.&amp;nbsp; &amp;nbsp; Do you have to use FMC, FDM or CDO?&amp;nbsp; Or can you use the CLI and then potentially tie with Ansible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 22:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower/m-p/4554797#M1087533</guid>
      <dc:creator>sweigle88</dc:creator>
      <dc:date>2022-02-17T22:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower</title>
      <link>https://community.cisco.com/t5/network-security/firepower/m-p/4554804#M1087534</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1291748"&gt;@sweigle88&lt;/a&gt;&amp;nbsp;no, you cannot use the CLI on the FTD to manage or configure 99% of the features.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CLI is only used for initial network connectivity using the management interface and troubleshooting. You cannot configure ACLs, VPNs etc, for that you must use the FDM, FMC or CDO GUI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use RestAPI.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 22:09:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower/m-p/4554804#M1087534</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-17T22:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower</title>
      <link>https://community.cisco.com/t5/network-security/firepower/m-p/4554852#M1087535</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; &amp;nbsp; Wow.&amp;nbsp; I have to repeat.&amp;nbsp; You have to use GUIs to manage Firepowers?&amp;nbsp; No CLI that is useful?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Feb 2022 00:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower/m-p/4554852#M1087535</guid>
      <dc:creator>sweigle88</dc:creator>
      <dc:date>2022-02-18T00:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower</title>
      <link>https://community.cisco.com/t5/network-security/firepower/m-p/4554929#M1087536</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1291748"&gt;@sweigle88&lt;/a&gt;&amp;nbsp;yes you must use the GUI, as stated limited CLI&lt;/P&gt;</description>
      <pubDate>Fri, 18 Feb 2022 04:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower/m-p/4554929#M1087536</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-18T04:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower</title>
      <link>https://community.cisco.com/t5/network-security/firepower/m-p/4555265#M1087541</link>
      <description>&lt;P&gt;If you want to manage your firewalls through CLI then the option would be to spin up ASA code on those appliances, however, I wouldn't recommend it as as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;said, the ASA firewalls do not support the next gen firewalls features, but tbh it all depends on what you want to do with those firewalls and if you have additional next gen core firewalls in your network.&lt;/P&gt;
&lt;P&gt;The FTD CLI is very limited, it is true that there are a few commands you can use from the CLI, but there is nothing such as you go and configure things in the ASA way. With FTD there are two CLI modes, one is called CLISH which is the default landing mode where you see the "&amp;gt;" sign, and another which is the "expert" mode where you see the "#" sign. To go into the expert mode you type "expert" from the CLISH and it takes you to the Linux based operating system on the FTD which is called FXOS (Firepower eXtensible Operating System). If you want to get to the ASA looks and feel CLI (Lina engine), then one way to do that is from the CLISH mode, you type "system support diagnostic-cli", however, that will not allow you to go into the configure terminal mode. From there you can still run some troubleshooting commands such as packet capture, packet-tracer, show commands and debugs, so only for troubleshooting purpose and obv if you want to parse some of the device configuration.&lt;/P&gt;
&lt;P&gt;Take a look at this list just to give you a rough idea of what you can get when you connect to the FTD CLISH in terms of commands:&lt;/P&gt;
&lt;P&gt;&amp;gt; &lt;BR /&gt;aaa-server Specify a AAA server&lt;BR /&gt;activate-tunnel-group-scripts Reload ASDM generated scripts for username-from-certificate&lt;BR /&gt;app-agent Configure appagent features&lt;BR /&gt;asp Configure ASP parameters&lt;BR /&gt;attribute Modify a monitored attribute&lt;BR /&gt;blocks Set block diagnostic parameters&lt;BR /&gt;capture Capture inbound and outbound packets on one or more interfaces&lt;BR /&gt;capture-traffic Display traffic or save to specified file&lt;BR /&gt;clear Reset functions&lt;BR /&gt;cluster Cluster exec mode commands&lt;BR /&gt;configure Change to Configuration mode&lt;BR /&gt;conn Connection&lt;BR /&gt;connect Connect to another component.&lt;BR /&gt;copy Copy from one file to another&lt;BR /&gt;cpu general CPU stats collection tools&lt;BR /&gt;crypto Execute crypto Commands&lt;BR /&gt;debug Debugging functions (see also 'undebug')&lt;BR /&gt;delete Delete a file&lt;BR /&gt;dir List files on a filesystem&lt;BR /&gt;dns List files on a filesystem&lt;BR /&gt;dynamic-access-policy-config Activates the DAP selection configuration file.&lt;BR /&gt;eotool Change to Enterprise Object Tool Mode&lt;BR /&gt;exit Exit this CLI session&lt;BR /&gt;expert Invoke a shell&lt;BR /&gt;failover Perform failover operation in Exec mode&lt;BR /&gt;file Change to File Mode&lt;BR /&gt;fips Execute FIPS tests&lt;BR /&gt;fsck Filesystem check&lt;BR /&gt;help Interactive help for commands&lt;BR /&gt;history Display the current session's command line history&lt;BR /&gt;ldapsearch Test LDAP configuration&lt;BR /&gt;logging Configure flash file name to save logging buffer&lt;BR /&gt;logout Logout of the current CLI session&lt;BR /&gt;memory Memory tools&lt;BR /&gt;more Display the contents of a file&lt;BR /&gt;no Negate a command or set its defaults&lt;BR /&gt;nslookup Look up an IP address or host name with the DNS servers&lt;BR /&gt;packet-tracer trace packets in F1 data path&lt;BR /&gt;perfmon Change or view performance monitoring options&lt;BR /&gt;pigtail Tail log files for debugging (pigtail)&lt;BR /&gt;ping Test connectivity from specified interface to an IP address&lt;BR /&gt;pmtool Change to PMTool Mode&lt;BR /&gt;reboot Reboot the sensor&lt;BR /&gt;redundant-interface Redundant interface &lt;BR /&gt;restore This command is used to restore FTD from sfr prompt&lt;BR /&gt;sftunnel-status Show sftunnel status&lt;BR /&gt;sftunnel-status-brief Show sftunnel status brief&lt;BR /&gt;show Show running system information&lt;BR /&gt;shun Manages the filtering of packets from undesired hosts&lt;BR /&gt;shutdown Shutdown the sensor&lt;BR /&gt;system Change to System Mode&lt;BR /&gt;tail-logs Tails the logs selected by the user&lt;BR /&gt;test Test subsystems, memory, interfaces, and configurations&lt;BR /&gt;traceroute Find route to remote network&lt;BR /&gt;undebug Disable debugging functions (see also 'debug')&lt;BR /&gt;upgrade Install Upgrade Package&lt;BR /&gt;verify Verify a file&lt;BR /&gt;vpn-sessiondb Configure the VPN Session Manager&lt;BR /&gt;webvpn-cache Remove cached object&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt; configure &lt;BR /&gt;audit_cert Change to Audit_cert Configuration Mode&lt;BR /&gt;CGroups-logging-timer Set CGroups logging time in minutes&lt;BR /&gt;coredump Change to Coredump Configuration Mode&lt;BR /&gt;crl Add a CRL URL&lt;BR /&gt;disable-https-access Disable https access&lt;BR /&gt;disable-ssh-access Disable ssh access&lt;BR /&gt;firewall Change to Firewall Configuration Mode&lt;BR /&gt;flow-offload Configure dynamic flow offload&lt;BR /&gt;high-availability Change to Configure High-Availability Mode&lt;BR /&gt;https-access-list Configure the https access list&lt;BR /&gt;identity-subnet-filter Modify subnet filters&lt;BR /&gt;inspection Configure default inspection for firewall&lt;BR /&gt;log-events-to-ramdisk Configure Logging of Events to disk&lt;BR /&gt;manager Change to Manager Configuration Mode&lt;BR /&gt;mini-coredump mini-coredump generation enable/disable&lt;BR /&gt;network Change to Network Configuration Mode&lt;BR /&gt;password Change password&lt;BR /&gt;periodic-memstats-dump Enable/disable periodic dumping of preprocessors memory stats&lt;BR /&gt;policy Change to policy rollback Mode&lt;BR /&gt;policy-deploy-debug Enable or Disable debug log for policy deploy&lt;BR /&gt;snort Configure Snort options&lt;BR /&gt;ssh-access-list Configure the ssh access list&lt;BR /&gt;ssl-protocol Configure SSL protocols for https web access.&lt;BR /&gt;syslog_server Change to Syslog Server config Mode&lt;BR /&gt;tcp-randomization Configure tcp connection randomization&lt;BR /&gt;unlock_time Set unlock time for a locked out user (CC/UCAPL mode only)&lt;BR /&gt;user Change to User Configuration Mode&lt;BR /&gt;user-time-zone set user time zone&lt;/P&gt;</description>
      <pubDate>Fri, 18 Feb 2022 15:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower/m-p/4555265#M1087541</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-18T15:18:05Z</dc:date>
    </item>
  </channel>
</rss>

