<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dstribuited SOHO firewall System in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dstribuited-soho-firewall-system/m-p/4651234#M1091870</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/323069"&gt;@l.buschi&lt;/a&gt; I would personally prefer to keep the deployment as simple as possible and use a single shared ACP where possible. You do have the ability to use object overrides&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/objects-object-mgmt.html#concept_8BFE8B9A83D742D9B647A74F7AD50053" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/objects-object-mgmt.html#concept_8BFE8B9A83D742D9B647A74F7AD50053&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;"You can create an object whose definition works for most devices, and then use overrides to specify modifications to the object for the few devices that need different definitions. You can also create an object that needs to be overridden for all devices, but its use allows you to create a single policy for all devices. Object overrides allow you to create a smaller set of shared policies for use across devices without giving up the ability to alter policies when needed for individual devices."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Jul 2022 15:01:25 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-07-15T15:01:25Z</dc:date>
    <item>
      <title>Dstribuited SOHO firewall System</title>
      <link>https://community.cisco.com/t5/network-security/dstribuited-soho-firewall-system/m-p/4651229#M1091869</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;actually I have a system of 10 ASA5506x with firepower distribuited in 10 different locations.&lt;/P&gt;
&lt;P&gt;The NGS are managed by FMC and I only have a unique access-control policy that can manage all of them.&lt;/P&gt;
&lt;P&gt;Their configuration is very simple, they only have an inside interface, outside interface and guest interface. They only have a single source PAT using their public outside interface address. No Static NAT and no service aree reachable from outside.&lt;/P&gt;
&lt;P&gt;Now I have to migrate these ASAs to FTD 1010, my question is:&lt;/P&gt;
&lt;P&gt;in your opinion,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it better to create 10 different specific pre-filter rules, 10 specific nat rules and 10 specific access-control rules, or creating a uinque generic nat rule, 1 pre-filter rule and 1 access-control rule would be better?&lt;/P&gt;
&lt;P&gt;Or a mix&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tks&lt;/P&gt;
&lt;P&gt;Johnny&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2022 14:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dstribuited-soho-firewall-system/m-p/4651229#M1091869</guid>
      <dc:creator>l.buschi</dc:creator>
      <dc:date>2022-07-15T14:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dstribuited SOHO firewall System</title>
      <link>https://community.cisco.com/t5/network-security/dstribuited-soho-firewall-system/m-p/4651234#M1091870</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/323069"&gt;@l.buschi&lt;/a&gt; I would personally prefer to keep the deployment as simple as possible and use a single shared ACP where possible. You do have the ability to use object overrides&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/objects-object-mgmt.html#concept_8BFE8B9A83D742D9B647A74F7AD50053" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/objects-object-mgmt.html#concept_8BFE8B9A83D742D9B647A74F7AD50053&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;"You can create an object whose definition works for most devices, and then use overrides to specify modifications to the object for the few devices that need different definitions. You can also create an object that needs to be overridden for all devices, but its use allows you to create a single policy for all devices. Object overrides allow you to create a smaller set of shared policies for use across devices without giving up the ability to alter policies when needed for individual devices."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2022 15:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dstribuited-soho-firewall-system/m-p/4651234#M1091870</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-15T15:01:25Z</dc:date>
    </item>
  </channel>
</rss>

