<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Glad to hear that it is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991017#M148337</link>
    <description>&lt;P&gt;Glad to hear that it is finally working for you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The timezone for "Unique Applications Over Time" can be changed by clicking on the small arrow to the left corner of the Widget and changing the timezone dropdown option.&lt;/P&gt;
&lt;P&gt;Picture attached.&lt;/P&gt;</description>
    <pubDate>Fri, 23 Dec 2016 15:36:13 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2016-12-23T15:36:13Z</dc:date>
    <item>
      <title>Firepower Management still says: Interface 'DataPlaneInterface0' is not receiving any traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991003#M148323</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Im still stuck with the message, that you can read in the topic. I think my setup should work, because I created an acl, that redirects traffic to the SFR Modul. But it looks like, that FMC is not receiving andthing. In the moment there is not much data traversing&amp;nbsp;the firewall, but there is traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Im wondering, that&amp;nbsp;"sh service-policy sfr" doesn´t show any hits! Any ideas? What can I do? I already rebootet the sfr modules.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Global policy:+&lt;BR /&gt; Service-policy: global_policy&lt;BR /&gt; Class-map: sfr&lt;BR /&gt; SFR: card status Up, mode fail-open&lt;BR /&gt; packet input 0, packet output 0, drop 0, reset-drop 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Another question: Is it a problem to activate&amp;nbsp;"enable monitor only" mode in a routed firewall mode?&amp;nbsp;I would like to start with this setting,&amp;nbsp;to be sure, that no datastreams will be modified in the first step.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Sebastian&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991003#M148323</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2019-03-12T08:41:16Z</dc:date>
    </item>
    <item>
      <title>Is your class-map sfr set to</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991004#M148324</link>
      <description>&lt;P&gt;Is your class-map sfr set to match all traffic, i.e 'permit ip any any'? Can you get the outputs of the following to confirm:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show run class-map&lt;BR /&gt;show run policy-map&lt;BR /&gt;show run service-policy&lt;/PRE&gt;
&lt;P&gt;If all of the above look right, one step you can take is to re-apply the service-policy again.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;no service-policy global_policy global&lt;BR /&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Monitor mode is usually recommended in a non-production environment, but if you are setting it up for the first time, you can start start with that to ensure SFR is receiving the data from the ASA and then move it into fail-open/close.&lt;/P&gt;
&lt;P&gt;Also, to note, if you are seeing this on a standby ASA in a failover pair, this is expected as there should ideally be no traffic across that unit.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 12:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991004#M148324</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2016-12-21T12:49:02Z</dc:date>
    </item>
    <item>
      <title>Hi Govindan,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991005#M148325</link>
      <description>&lt;P&gt;Hi Govindan,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;here the output:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;asa# show run class-map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class-map sfr&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; match access-list sfr_redirect&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; match default-inspection-traffic&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;asa# show run policy-map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; parameters&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; message-length maximum client auto&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; message-length maximum 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; no tcp-inspection&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; description sfr&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect dns preset_dns_map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect ftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect h323 h225&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect h323 ras&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect rsh&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect rtsp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect esmtp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect sqlnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect skinny&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect sunrpc&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect xdmcp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect sip&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect netbios&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect tftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; inspect ip-options&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; class sfr&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; sfr fail-open&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;asa# show run service-policy&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;asa# sh access-list sfr_redirect&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list sfr_redirect; 1 elements; name hash: 0x41ab5d0f&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list sfr_redirect line 1 remark SFR ACL&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list sfr_redirect line 2 extended permit ip any any (hitcnt=244857) 0x06d5ebec&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Any ideas? Should I try to reapply the the service policy?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Sebastian&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 13:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991005#M148325</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2016-12-21T13:41:28Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991006#M148326</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also tried to reapply the policy, in this way, but it doesn´t change anything.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;no&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; service&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;policy global_policy &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;global&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;service&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;policy global_policy &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;global&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 21 Dec 2016 14:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991006#M148326</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2016-12-21T14:01:30Z</dc:date>
    </item>
    <item>
      <title>Yup, the config looks correct</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991007#M148327</link>
      <description>&lt;P&gt;Yup, the config looks correct. Go ahead and re-apply the service-policy.&lt;/P&gt;
&lt;P&gt;Another troubleshooting step you can take before re-applying the policy is to run a packet-tracer to see the packet processing steps that the ASA for traffic traversing through.&lt;/P&gt;
&lt;P&gt;The command for that is&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input &amp;lt;inside-interface-name&amp;gt; match tcp &amp;lt;internal-ip-address&amp;gt; 12345 4.2.2.2 80 detailed&lt;/PRE&gt;
&lt;P&gt;More on the command is here:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/p1.html#pgfId-2129824"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/p1.html#pgfId-2129824&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 14:04:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991007#M148327</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2016-12-21T14:04:54Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991008#M148328</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;first I found, that &amp;nbsp;in my case "same-security-traffic permit inter-interface" was missing. I have several interfaces with the same security level. I added this. So now, the traffic seems to flow as expected.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What do you think? Afterwards I reapplied the service policy ones more. Still no change.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;asa(config)# packet-tracer input MyInterface tcp 10.10.10.1 12345 10.30.30.1 80 detailed&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.20.20.1 using egress ifc transfer&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group MyInterface_access_in in interface MyInterface&lt;BR /&gt;access-list MyInterface_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f393330b3f0, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=83739, user_data=0x7f3926fe0980, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=MyInterface, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f39309d0260, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=1464, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f3933246ca0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=83791, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=MyInterface, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map sfr&lt;BR /&gt; match access-list sfr_redirect&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; description sfr&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open monitor-only&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f3933326fe0, priority=71, domain=sfr, deny=false&lt;BR /&gt; hits=17, user_data=0x7f393311b940, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=MyInterface, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f39332358b0, priority=21, domain=lu, deny=true&lt;BR /&gt; hits=3, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=MyInterface, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f39309d0260, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=1466, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f3931457ee0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=185221, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=transfer, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 655901, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: MyInterface&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: transfer&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 14:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991008#M148328</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2016-12-21T14:28:10Z</dc:date>
    </item>
    <item>
      <title>That is really strange. The</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991009#M148329</link>
      <description>&lt;P&gt;That is really strange. The packet-tracer even shows the packet hitting the SFR module. Did you see any stats change after moving it to monitor-only mode? Also is your SFR policies pushed to the device from the FMC? You could session into the SFR and take a look at if the access policies show up.&lt;/P&gt;
&lt;P&gt;BTW what is your ASA and SFR version? Just to make sure everything is compatible.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 03:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991009#M148329</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2016-12-22T03:40:56Z</dc:date>
    </item>
    <item>
      <title>can you run command "show</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991010#M148330</link>
      <description>&lt;P&gt;can you run command "show module sfr detail" and see control plane is up?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 07:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991010#M148330</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2016-12-22T07:00:58Z</dc:date>
    </item>
    <item>
      <title>Of course.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991011#M148331</link>
      <description>&lt;P&gt;Of course.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;asa# sh modu sfr det&lt;BR /&gt;Getting details from the Service Module, please wait...&lt;/P&gt;
&lt;P&gt;Card Type: FirePOWER Services Software Module&lt;BR /&gt;Model: ASA5525&lt;BR /&gt;Hardware version: N/A&lt;BR /&gt;Serial Number: xxx&lt;BR /&gt;Firmware version: N/A&lt;BR /&gt;Software version: 6.1.0-330&lt;BR /&gt;MAC Address Range: 00f6.632d.3562 to 00f6.632d.3562&lt;BR /&gt;App. name: ASA FirePOWER&lt;BR /&gt;App. Status: Up&lt;BR /&gt;App. Status Desc: Normal Operation&lt;BR /&gt;App. version: 6.1.0-330&lt;BR /&gt;Data Plane Status: Up&lt;BR /&gt;Console session: Ready&lt;BR /&gt;Status: Up&lt;BR /&gt;DC addr: 172.16.34.2&lt;BR /&gt;Mgmt IP addr: 172.16.33.211&lt;BR /&gt;Mgmt Network mask: 255.255.255.240&lt;BR /&gt;Mgmt Gateway: 172.16.33.222&lt;BR /&gt;Mgmt web ports: 443&lt;BR /&gt;Mgmt TLS enabled: true&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 09:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991011#M148331</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2016-12-22T09:59:56Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991012#M148332</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I&amp;nbsp;checked, that polices are applied and up to date, FMC says,&amp;nbsp;that everything is ok, regarding the policies. "&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN class="CQF" id="yui_3_3_0_1_1482397688370417"&gt;Deployment to device successful.&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;You could session into the SFR and take a look at if the access policies show up.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;--&amp;gt; How do I&amp;nbsp;do that? Whats the command/procedure?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ASA Software is 9.6(2) and Firepower is 6.1.0. Everything looks good, but&amp;nbsp;I don´t know whats wrong!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 10:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991012#M148332</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2016-12-22T10:04:48Z</dc:date>
    </item>
    <item>
      <title>Please perform a few more</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991013#M148333</link>
      <description>&lt;P&gt;Please perform a few more test.&lt;/P&gt;
&lt;P&gt;a) Generate some traffic and issue command "sh conn | in X" immediately. This will show if traffic is being sent to module.&lt;/P&gt;
&lt;P&gt;b) Go to policies-&amp;gt;network discovery-&amp;gt;Edit the Networks (Make sure both host and application is checked). Save and deploy this.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 11:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991013#M148333</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2016-12-22T11:25:30Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991014#M148334</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;traffic is ongoing, and the acl hitcount grows.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;sh conn only shows a summary:&lt;/P&gt;
&lt;P&gt;asa# sh conn&lt;BR /&gt;21 in use, 27 most used&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried with&amp;nbsp;sh conn det all, but no connection with X ( X - inspected by service module,) flag is shown.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;b)--&amp;gt; was already in place, but i saved it again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 13:04:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991014#M148334</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2016-12-22T13:04:02Z</dc:date>
    </item>
    <item>
      <title>I feel there is issue with</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991015#M148335</link>
      <description>&lt;P&gt;I feel there is issue with the updated version of this stuff, I would recommend you go with the update for ASA and the believe that will help you out.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 21:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991015#M148335</guid>
      <dc:creator>Farhan Mohamed</dc:creator>
      <dc:date>2016-12-22T21:39:49Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991016#M148336</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;today the firewall was placed inline as the gateway for different interfaces. Now the sfr policy redirects traffic to the sfr module and firesight shows up with data...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think the redirection only works, if connections&amp;nbsp;are going &lt;SPAN style="text-decoration: underline;"&gt;through&lt;/SPAN&gt; the asa. Before, there were only broadcasts or multicasts and these won´t&amp;nbsp;be tracked...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So in the moment everything seems to be fine...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just one more question... In the Summary Dashboard I see "Unique Applications over Time".&amp;nbsp;On the X Axis, there the time is applied. The timezone in user Preferences is set to our local timezone, Berlin. But in the "&lt;SPAN&gt;Unique Applications over Time&lt;/SPAN&gt;" Section, the time, is the local time of the SFR Module, that is not correct. See the attachement.&amp;nbsp;Is there a way to correct this?&lt;/P&gt;
&lt;P&gt;In contrast to that, the time is correct in Analysis--&amp;gt;Content Explorer--&amp;gt; "&lt;SPAN&gt;Traffic and Intrusion Events over Time&lt;/SPAN&gt;".&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks to&amp;nbsp;all,&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Sebastian&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2016 10:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991016#M148336</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2016-12-23T10:05:06Z</dc:date>
    </item>
    <item>
      <title>Glad to hear that it is</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991017#M148337</link>
      <description>&lt;P&gt;Glad to hear that it is finally working for you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The timezone for "Unique Applications Over Time" can be changed by clicking on the small arrow to the left corner of the Widget and changing the timezone dropdown option.&lt;/P&gt;
&lt;P&gt;Picture attached.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2016 15:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991017#M148337</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2016-12-23T15:36:13Z</dc:date>
    </item>
    <item>
      <title>Happy new Year!</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991018#M148338</link>
      <description>&lt;P&gt;Happy new Year!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks a lot, that tip is absolutely correct! In general I would recommend, that the timezone refers to the current users setting... Make more sense than to adjust every gadget for itself....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Sebastian&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2017 11:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-still-says-interface-dataplaneinterface0-is/m-p/2991018#M148338</guid>
      <dc:creator>roesch4alc</dc:creator>
      <dc:date>2017-01-02T11:39:01Z</dc:date>
    </item>
  </channel>
</rss>

