<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you use that ACL, remember in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036764#M135401</link>
    <description>&lt;P&gt;If you use that ACL, remember that ASA access list masks are not inverse like router ACL subnet masks. So a /24 would be 255.255.255.0.&lt;/P&gt;
&lt;P&gt;I'd check with TAC to be sure of the impact (or need).&lt;/P&gt;</description>
    <pubDate>Thu, 03 Aug 2017 15:31:04 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-08-03T15:31:04Z</dc:date>
    <item>
      <title>ASA with FP module Upgrade and add to FMC</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036754#M135376</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;
&lt;P&gt;i was asked to deploy ASA with FP in our environment.&lt;/P&gt;
&lt;P&gt;could some advice a summary of steps or point me to a primer doc (or video) to upgrade both ASA (5525-x) with FP module/image and add them to FMC?&lt;/P&gt;
&lt;P&gt;any caveats i need to know, i.e. OS compatibility matrix, initial commands to put (redirect), etc.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036754#M135376</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-03-12T09:23:45Z</dc:date>
    </item>
    <item>
      <title>The compatibility guide is</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036755#M135380</link>
      <description>&lt;P&gt;The compatibility guide is here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepower-compatibility.html&lt;/P&gt;
&lt;P&gt;The quick start guide covers most everything you need to get setup:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/sfr/firepower-qsg.html&lt;/P&gt;
&lt;P&gt;Bottom line is you should make sure your FMC is at the current release (6.2.0 or later) and then image the module on the ASA to 6.2, making sure your ASA software is first at 9.5(2)+.&lt;/P&gt;
&lt;P&gt;Get everything registered and then setup and deploy your policies from FMC.&lt;/P&gt;</description>
      <pubDate>Sun, 21 May 2017 07:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036755#M135380</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-21T07:43:47Z</dc:date>
    </item>
    <item>
      <title>hi marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036756#M135382</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;
&lt;P&gt;i've checked some of our 5525-X and observed some have s2s ipsec VPNs and others got anyconnect VPN.&lt;/P&gt;
&lt;P&gt;do i add a 'deny' lines to exclude VPN traffic from FP inspection?&lt;/P&gt;
&lt;P&gt;or are they already denied/excluded since they're ISAKMP/UDP 500 traffic and not IP?&lt;/P&gt;
&lt;P&gt;or is there a policy in FMC we can create to exclude the said VPN traffic?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;access-list SFR_ACL extended permit ip any any&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;class-map SFR_CMAP&lt;BR /&gt;&amp;nbsp;match SFR_ACL&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy &lt;BR /&gt;&amp;nbsp;class SFR_CMAP&lt;BR /&gt;&amp;nbsp; sfr fail-open &lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 05:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036756#M135382</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-06-01T05:20:18Z</dc:date>
    </item>
    <item>
      <title>The UDP traffic runs over IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036757#M135384</link>
      <description>&lt;P&gt;The UDP traffic runs over IP so it would have to be called out separately. Here is what I've used to block IPsec VPN traffic where the decryption is downstream from the ASA:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list sfr_redirect extended deny udp any any eq 500 &lt;BR /&gt;&lt;SPAN&gt;access-list sfr_redirect extended deny udp any any eq 4500&lt;/SPAN&gt;&lt;BR /&gt;access-list sfr_redirect extended deny esp any any &lt;BR /&gt;access-list sfr_redirect extended permit ip any any&lt;/PRE&gt;
&lt;P&gt;Where the IPsec is being terminated on the ASA,&amp;nbsp;I believe the FirePOWER inspection occurs pre-decryption so that should work there as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AnyConnect is generally SSL VPN (although it does support IKEv2 IPsec), so you might have a challenge exempting that without also exempting trffic that you wish to inspect. (Even without decrypting SSL there is some utiilty in inspecting the flows.)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;EDIT&lt;/STRONG&gt; - updated to include the udp/500 traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 06:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036757#M135384</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-01T06:18:04Z</dc:date>
    </item>
    <item>
      <title>hi marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036758#M135388</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;
&lt;P&gt;shouldn't ISAKMP UDP 500 be included on the deny ACE? i believe UDP 4500 is for NAT-T.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list sfr_redirect extended deny udp any any eq 500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-list sfr_redirect extended deny udp any any eq 4500 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-list sfr_redirect extended deny esp any any &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-list sfr_redirect extended permit ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;for anyconnect since it's SSL encrypted, so it won't be identified as IP traffic? is my assumption correct? no need for an ACE?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 06:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036758#M135388</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-06-01T06:18:05Z</dc:date>
    </item>
    <item>
      <title>Yes - sorry I missed that</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036759#M135389</link>
      <description>&lt;P&gt;Yes - sorry I missed that line in pulling a snippet from my template via cut and paste.&lt;/P&gt;
&lt;P&gt;I updated my reply to correct that.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 06:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036759#M135389</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-01T06:19:35Z</dc:date>
    </item>
    <item>
      <title>marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036760#M135390</link>
      <description>&lt;P&gt;marvin,&lt;/P&gt;
&lt;P&gt;thanks for the correction!&lt;/P&gt;
&lt;P&gt;how about anyconnect VPN traffic? do i need to add an ACE using private IP LAN-to-LAN (S2S subnet)? or create an identity NAT for the source subnet used for S2S VPN?&lt;/P&gt;
&lt;P&gt;i just don't want anyconnect VPN traffic to be inspected and just bypass FP module.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 06:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036760#M135390</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-06-01T06:43:56Z</dc:date>
    </item>
    <item>
      <title>hi marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036761#M135392</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;
&lt;P&gt;i've got a site with ASA FP and use the FW as the anyconnect RA VPN GW.&lt;/P&gt;
&lt;P&gt;do i do the same deny ACL above or deny the IP subnet based on the RA DHCP POOL subnet?&lt;/P&gt;
&lt;P&gt;or it doesn't matter since it's SSL encrypted and &lt;EM&gt;permit ip any any&lt;/EM&gt; won't be able to inspect it?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 04:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036761#M135392</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-08-03T04:33:29Z</dc:date>
    </item>
    <item>
      <title>That's a good question - I'm</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036762#M135395</link>
      <description>&lt;P&gt;That's a good question - I'm not positive on the answer. It's not quite clear to me where along the packet processing path of the ASA decryption takes place.&lt;/P&gt;
&lt;P&gt;Even when we do a packet-tracer of an SSL VPN flow to an internal resource, the SSL decrypt does not show up. There is a good one illustrated in Pete Long's blog here:&lt;/P&gt;
&lt;P&gt;https://www.petenetlive.com/KB/Article/0001298&lt;/P&gt;
&lt;P&gt;We do see the policy map is at Phase 4. There is a "VPN" at phase 8 but that indicates ipsec not ssl.&lt;/P&gt;
&lt;P&gt;I will ask around to see if I can get a better answer.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 10:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036762#M135395</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-03T10:38:08Z</dc:date>
    </item>
    <item>
      <title>hi marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036763#M135398</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;
&lt;P&gt;i do have the identity NAT for the RA pool subnet.&lt;/P&gt;
&lt;P&gt;i have prepared this FP redirect ACL just to make sure FP module doesn't inspect or take any action on the anyconnect traffic.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list FP-REDIRECT extended deny ip 172.30.5.0 0.0.0.255 any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list FP-REDIRECT extended deny ip any 172.30.5.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;access-list FP-REDIRECT extended permit ip any any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;or is above FP ACL a bit of an 'overkill'?&lt;/P&gt;
&lt;P&gt;i'll read on the link you gave me and would appreciate if you could advise on this. otherwise i would go for a TAC route &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 14:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036763#M135398</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-08-03T14:18:31Z</dc:date>
    </item>
    <item>
      <title>If you use that ACL, remember</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036764#M135401</link>
      <description>&lt;P&gt;If you use that ACL, remember that ASA access list masks are not inverse like router ACL subnet masks. So a /24 would be 255.255.255.0.&lt;/P&gt;
&lt;P&gt;I'd check with TAC to be sure of the impact (or need).&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 15:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036764#M135401</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-03T15:31:04Z</dc:date>
    </item>
    <item>
      <title>sure. i'll make a quick check</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036765#M135404</link>
      <description>&lt;P&gt;sure. i'll make a quick check with TAC.&lt;/P&gt;
&lt;P&gt;i typed the ACL on the fly and forgot it's normal mask on ASA, my bad &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 15:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-fp-module-upgrade-and-add-to-fmc/m-p/3036765#M135404</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-08-03T15:36:47Z</dc:date>
    </item>
  </channel>
</rss>

