<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is FMC always required for Firepower? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004920#M135571</link>
    <description>&lt;P&gt;//ASA w/ FirePOWER&lt;/P&gt;
&lt;P&gt;Several months ago I read that you can manage the FirePOWER soft module via ASDM on the smaller ASA's such as 5506 &amp;amp; 5515.&lt;BR /&gt;Does that mean I wouldn't need FMC at all? (I can manage, and monitor everything through ASDM?)&lt;BR /&gt;Has that list expanded to the bigger models?&lt;BR /&gt;&lt;BR /&gt;//FTD&lt;BR /&gt;Ditto for the ASAs running FTD, and Firepower appliances (FP4100/9300).&lt;BR /&gt;Can I manage them w/o FMC?&lt;/P&gt;
&lt;P&gt;On Palo Alto firewalls, you can pretty much do anything/everything w/o their Panorama.&lt;BR /&gt;Was just wondering if the same thing holds true w/ Cisco's NGFW.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;TIA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:21:37 GMT</pubDate>
    <dc:creator>CSCO10662744_2</dc:creator>
    <dc:date>2019-03-12T09:21:37Z</dc:date>
    <item>
      <title>Is FMC always required for Firepower?</title>
      <link>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004920#M135571</link>
      <description>&lt;P&gt;//ASA w/ FirePOWER&lt;/P&gt;
&lt;P&gt;Several months ago I read that you can manage the FirePOWER soft module via ASDM on the smaller ASA's such as 5506 &amp;amp; 5515.&lt;BR /&gt;Does that mean I wouldn't need FMC at all? (I can manage, and monitor everything through ASDM?)&lt;BR /&gt;Has that list expanded to the bigger models?&lt;BR /&gt;&lt;BR /&gt;//FTD&lt;BR /&gt;Ditto for the ASAs running FTD, and Firepower appliances (FP4100/9300).&lt;BR /&gt;Can I manage them w/o FMC?&lt;/P&gt;
&lt;P&gt;On Palo Alto firewalls, you can pretty much do anything/everything w/o their Panorama.&lt;BR /&gt;Was just wondering if the same thing holds true w/ Cisco's NGFW.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;TIA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004920#M135571</guid>
      <dc:creator>CSCO10662744_2</dc:creator>
      <dc:date>2019-03-12T09:21:37Z</dc:date>
    </item>
    <item>
      <title>You can use ASDM to manage</title>
      <link>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004921#M135572</link>
      <description>&lt;P&gt;You can use ASDM to manage all ASAs with FirePOWER service modules - one at a time and with very limited reporting and connection event analysis. That has been the case since 6.0.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Similarly FTD has the FirePOWER Device Manager (FDM). It also has limitations but can handle basic setup and configuration and monitoring.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For anything in a production environment I always recommend FMC.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 14:50:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004921#M135572</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-13T14:50:39Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin.</title>
      <link>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004922#M135575</link>
      <description>&lt;P&gt;Thanks Marvin.&lt;/P&gt;
&lt;P&gt;In my previous deployment, I did use an FMC, but was curious to know what capabilities you have WITHOUT it.&lt;/P&gt;
&lt;P&gt;For example, don't AMP &amp;amp; URL-filter go through FMC?&lt;/P&gt;
&lt;P&gt;Do the ASA's &amp;amp; FTD's just handle all functions via the local devices/sensors?&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 16:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004922#M135575</guid>
      <dc:creator>CSCO10662744_2</dc:creator>
      <dc:date>2017-05-13T16:36:48Z</dc:date>
    </item>
    <item>
      <title>100% of the security features</title>
      <link>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004923#M135578</link>
      <description>&lt;P&gt;100% of the security features (Control, IPS, URL Filtering and Advanced Malware Protection) are available whether you are managing with FMC or locally (with ADSM or FDM).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even when using FMC all policy enforcement is done at the sensor level. An FMC can be shut down entirely once policies have been deployed and they will continue to be enforced at the sensors. The historical record of connections and other events will queue locally (up to the limited but published local capacity) until the connection to the managing FMC is restored.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 02:57:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-fmc-always-required-for-firepower/m-p/3004923#M135578</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-14T02:57:24Z</dc:date>
    </item>
  </channel>
</rss>

