<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FMC Web traffic from WSA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928182#M149323</link>
    <description>&lt;P&gt;As expected all of my web traffic in FMC is sourced from our WSA ip address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there anyway for FMC to get the actual internal IP of the user?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:22:58 GMT</pubDate>
    <dc:creator>michaellperrin</dc:creator>
    <dc:date>2019-03-12T08:22:58Z</dc:date>
    <item>
      <title>FMC Web traffic from WSA</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928182#M149323</link>
      <description>&lt;P&gt;As expected all of my web traffic in FMC is sourced from our WSA ip address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there anyway for FMC to get the actual internal IP of the user?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928182#M149323</guid>
      <dc:creator>michaellperrin</dc:creator>
      <dc:date>2019-03-12T08:22:58Z</dc:date>
    </item>
    <item>
      <title>Yes - if you run FirePOWER 6</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928183#M149324</link>
      <description>&lt;P&gt;Yes - if you run FirePOWER 6.1 it now correctly extracts the XFF (X-Forwarded-For) field from the WSA to show you the end user address and name.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 17:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928183#M149324</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-12T17:22:05Z</dc:date>
    </item>
    <item>
      <title>I enabled the XFF on the WSA</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928184#M149325</link>
      <description>&lt;P&gt;I enabled the XFF on the WSA under the security services -&amp;gt; Advanced settings - &amp;gt;&amp;nbsp;&lt;SPAN&gt;Generate Headers - X-Forward For- SEND&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;but I'm still only seeing the proxy IP as source in FMC.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do I have to enable something on the FMC?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 17:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928184#M149325</guid>
      <dc:creator>michaellperrin</dc:creator>
      <dc:date>2016-10-12T17:22:06Z</dc:date>
    </item>
    <item>
      <title>Yes - you check that you have</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928185#M149326</link>
      <description>&lt;P&gt;Yes - you check that you have it set in the Network Analysis Policy that you are using.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/610/asa-fp-services/asa-with-firepower-services-local-management-configuration-guide-v610/NAP-Getting-Started.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Look for&amp;nbsp;the necessary setting as shown below:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/firepower_xff_setting.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 18:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928185#M149326</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-12T18:50:20Z</dc:date>
    </item>
    <item>
      <title>Got the NAP all configured</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928186#M149327</link>
      <description>&lt;P&gt;Got the NAP all configured but still just showing the WSA address as the source.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Have a case opened with TAC to see why.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 18:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928186#M149327</guid>
      <dc:creator>michaellperrin</dc:creator>
      <dc:date>2016-10-14T18:27:12Z</dc:date>
    </item>
    <item>
      <title>OK - please let us know how</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928187#M149328</link>
      <description>&lt;P&gt;OK - please let us know how it turns out. I haven't had one of that use case to try out since they updated that feature.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Oct 2016 05:03:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928187#M149328</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-15T05:03:27Z</dc:date>
    </item>
    <item>
      <title>Got it working.</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928188#M149329</link>
      <description>&lt;P&gt;Got it working.&lt;/P&gt;
&lt;P&gt;I thought it would change the Initiator IP but it populates it into "original client" &amp;nbsp;column.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The downside is on the table view for malware and file events the "original client" column isn't an option.&lt;/P&gt;
&lt;P&gt;Also as expected only works for HTTP traffic.&lt;/P&gt;
&lt;P&gt;I love using the WSA but this makes firepower useless. The only option I see is to offload SSL to something like F5 or A10 and do URL on the Firepower.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2016 19:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928188#M149329</guid>
      <dc:creator>michaellperrin</dc:creator>
      <dc:date>2016-11-04T19:18:26Z</dc:date>
    </item>
    <item>
      <title>Was able to get a full</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928189#M149330</link>
      <description>&lt;P&gt;Was able to get a full working solution in my lab.&lt;/P&gt;
&lt;P&gt;The answer was to enable IP Spoofing on the WSA.&lt;/P&gt;
&lt;P&gt;This did cause some issues for our environment because we do our WCCP on the ASA's. &amp;nbsp;This feature isn't supported on the ASA because you need create a second WCCP for the return traffic to the WSA.&lt;/P&gt;
&lt;P&gt;The answer was to move the WCCP to our switch that supports WCCP which also supports the return traffic redirection.&lt;/P&gt;
&lt;P&gt;Now all web traffic in FMC shows the Initiator IP as the original client IP for both HTTP and HTTPS.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 17:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/2928189#M149330</guid>
      <dc:creator>michaellperrin</dc:creator>
      <dc:date>2016-11-23T17:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Was able to get a full</title>
      <link>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/3899097#M149331</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have read your post and it's amazing and helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What i have understood up till now that i need to enable x-forwarded-for at Cisco WSA and should i also enable IP Spoofing at Cisco WSA or it is okay that i can get Client IP of http and https traffic by only enabling x-forwarded-for at Cisco WSA ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kindly help me out.&amp;nbsp; please&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 08:54:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-web-traffic-from-wsa/m-p/3899097#M149331</guid>
      <dc:creator>zohair.masood</dc:creator>
      <dc:date>2019-07-29T08:54:45Z</dc:date>
    </item>
  </channel>
</rss>

