<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA- in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa/m-p/5001129#M1108207</link>
    <description>&lt;P&gt;when I do show run, I see the interfaces as ASA mode does show them. I also found out that it needs to be licensed in order running ASA mode.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jan 2024 15:28:56 GMT</pubDate>
    <dc:creator>Johnson_Mo</dc:creator>
    <dc:date>2024-01-19T15:28:56Z</dc:date>
    <item>
      <title>ASA-</title>
      <link>https://community.cisco.com/t5/network-security/asa/m-p/5000350#M1108158</link>
      <description>&lt;P&gt;any reason why my post was marked as spam? i you do not have an answer, please do not mark as spam!&amp;nbsp;&lt;/P&gt;&lt;P&gt;team,&lt;/P&gt;&lt;P&gt;after converting from FTD to ASA, I can not get into enable mode. when I do show run, I see the interfaces and it is ASA mode, but I can not get into enable mode.&amp;nbsp;Model : Cisco Firepower 1120 Threat Defense (78) Version 7.2.5 (Build 208)&lt;/P&gt;&lt;P&gt;these are the command available:&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;BR /&gt;aaa-server Specify a AAA server&lt;BR /&gt;activate-tunnel-group-scripts Reload ASDM generated scripts for username-from-certificate&lt;BR /&gt;app-agent Configure appagent features&lt;BR /&gt;asp Configure ASP parameters&lt;BR /&gt;attribute Modify a monitored attribute&lt;BR /&gt;blocks Set block diagnostic parameters&lt;BR /&gt;capture Capture inbound and outbound packets on one or more interfaces&lt;BR /&gt;capture-traffic Display traffic or save to specified file&lt;BR /&gt;clear Reset functions&lt;BR /&gt;cluster Cluster exec mode commands&lt;BR /&gt;configure Change to Configuration mode&lt;BR /&gt;conn Connection&lt;BR /&gt;connect Connect to another component.&lt;BR /&gt;copy Copy from one file to another&lt;BR /&gt;cpu general CPU stats collection tools&lt;BR /&gt;crypto Execute crypto Commands&lt;BR /&gt;debug Debugging functions (see also 'undebug')&lt;BR /&gt;delete Delete a file&lt;BR /&gt;dig Look up an IP address or host name with the DNS servers&lt;BR /&gt;dir List files on a filesystem&lt;BR /&gt;dns List files on a filesystem&lt;BR /&gt;dynamic-access-policy-config Activates the DAP selection configuration file.&lt;BR /&gt;eotool Change to Enterprise Object Tool Mode&lt;BR /&gt;exit Exit this CLI session&lt;BR /&gt;expert Invoke a shell&lt;BR /&gt;failover Perform failover operation in Exec mode&lt;BR /&gt;file Change to File Mode&lt;BR /&gt;fips Execute FIPS tests&lt;BR /&gt;fsck Filesystem check&lt;BR /&gt;help Interactive help for commands&lt;BR /&gt;history Display the current session's command line history&lt;BR /&gt;ldapsearch Test LDAP configuration&lt;BR /&gt;logging Configure flash file name to save logging buffer&lt;BR /&gt;logout Logout of the current CLI session&lt;BR /&gt;memory Memory tools&lt;BR /&gt;more Display the contents of a file&lt;BR /&gt;no Negate a command or set its defaults&lt;BR /&gt;packet-tracer trace packets in F1 data path&lt;BR /&gt;perfmon Change or view performance monitoring options&lt;BR /&gt;pigtail Tail log files for debugging (pigtail)&lt;BR /&gt;ping Test connectivity from specified interface to an IP address&lt;BR /&gt;pmtool Change to PMTool Mode&lt;BR /&gt;reboot Reboot the sensor&lt;BR /&gt;redundant-interface Redundant interface&lt;BR /&gt;restore This command is used to restore FTD from sfr prompt&lt;BR /&gt;sftunnel-status Show sftunnel status&lt;BR /&gt;sftunnel-status-brief Show sftunnel status brief&lt;BR /&gt;show Show running system information&lt;BR /&gt;shun Manages the filtering of packets from undesired hosts&lt;BR /&gt;shutdown Shutdown the sensor&lt;BR /&gt;sync-from-peer Sync from peer FTD&lt;BR /&gt;system Change to System Mode&lt;BR /&gt;tail-logs Tails the logs selected by the user&lt;BR /&gt;test Test subsystems, memory, interfaces, and configurations&lt;BR /&gt;traceroute Find route to remote network&lt;BR /&gt;undebug Disable debugging functions (see also 'debug')&lt;BR /&gt;upgrade Install Upgrade Package&lt;BR /&gt;verify Verify a file&lt;BR /&gt;vpn-sessiondb Configure the VPN Session Manager&lt;BR /&gt;webvpn-cache Remove cached object&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 23:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa/m-p/5000350#M1108158</guid>
      <dc:creator>Johnson_Mo</dc:creator>
      <dc:date>2024-01-18T23:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-</title>
      <link>https://community.cisco.com/t5/network-security/asa/m-p/5000489#M1108161</link>
      <description>&lt;P&gt;Are you sure it is running in ASA mode? The output you shared says "Version 7.2.5" which is an FTD version.&lt;/P&gt;
&lt;P&gt;Also, the commands available appear to be FTD cli commands - not ASA commands.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 05:51:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa/m-p/5000489#M1108161</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-01-19T05:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-</title>
      <link>https://community.cisco.com/t5/network-security/asa/m-p/5000497#M1108162</link>
      <description>&lt;P&gt;try this way to access LINA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt;system support diagnostic-cli&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;gt; enable&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 05:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa/m-p/5000497#M1108162</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-19T05:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-</title>
      <link>https://community.cisco.com/t5/network-security/asa/m-p/5001129#M1108207</link>
      <description>&lt;P&gt;when I do show run, I see the interfaces as ASA mode does show them. I also found out that it needs to be licensed in order running ASA mode.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 15:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa/m-p/5001129#M1108207</guid>
      <dc:creator>Johnson_Mo</dc:creator>
      <dc:date>2024-01-19T15:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-</title>
      <link>https://community.cisco.com/t5/network-security/asa/m-p/5001132#M1108208</link>
      <description>&lt;P&gt;I will try this command once back in the office after licensing the appliance. thanks for the info boss!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 15:29:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa/m-p/5001132#M1108208</guid>
      <dc:creator>Johnson_Mo</dc:creator>
      <dc:date>2024-01-19T15:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-</title>
      <link>https://community.cisco.com/t5/network-security/asa/m-p/5001142#M1108210</link>
      <description>&lt;P&gt;The output of show running-configuration looks very similar between an FTD and ASA mode device.&lt;/P&gt;
&lt;P&gt;But the device operation is VERY different. ASA does require a free base license but it cannot run any Snort/IPS services such as Threat prevention, security Intelligence, URL Filtering or Malware protection.&lt;/P&gt;
&lt;P&gt;Switching an 1100 series from FTD to ASA requires a very low level system reimage as described here:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/reimage/asa-ftd-reimage.html#task_vhy_5kc_sgb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/reimage/asa-ftd-reimage.html#task_vhy_5kc_sgb&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You will lose all configuration and have to start over from scratch when doing so.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 15:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa/m-p/5001142#M1108210</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-01-19T15:40:53Z</dc:date>
    </item>
  </channel>
</rss>

