<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ok, I am totally confused now in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966400#M149507</link>
    <description>&lt;P&gt;Ok, I am totally&amp;nbsp;confused now. As you mentioned VLAN. how to find which VLAN is needed for&amp;nbsp;sfr module to work? I have Gi1/3 which is VLAN (default - VLAN 1) &amp;nbsp;and Gi1/4 which is subinterface that is set as&amp;nbsp;VLAN 4, but this is for totally different thing (admin/guest wifi). The whole network is designed like that... How can I tell which VLAN is needed for sfr module to function?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
    <pubDate>Tue, 04 Oct 2016 17:19:36 GMT</pubDate>
    <dc:creator>Rawit2015</dc:creator>
    <dc:date>2016-10-04T17:19:36Z</dc:date>
    <item>
      <title>Firepower connection issue on ASA5508X</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966391#M149498</link>
      <description>&lt;P&gt;Hi to all of you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am having an issue on my firewall, but since I am quite new in ASA I cannot find the cause.&lt;/P&gt;
&lt;P&gt;I have found some similar issue regarding this, but it doesn't help me fix my problem:&lt;/P&gt;
&lt;P&gt;I have set on the management port IP (in ASA IOS) and on Firepower module same IP range with different IP address. There result, I was able to connect and get firepower module.&lt;/P&gt;
&lt;P&gt;Following this website:&amp;nbsp;&lt;A href="http://www.petenetlive.com/KB/Article/0001107" title="Link ASA with Firemodule" target="_blank"&gt;Link ASA with Firemodule&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;&lt;A href="https://www.petenetlive.com/KB/Article/0001182" title="Fix Error in ASA/Firemodule" target="_blank"&gt;Fix Error in ASA/Firemodule&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;but no luck.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the "pruned" configuration of my ASA&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 9.6(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;enable password OfCHMfd1XRg0CosZ encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;ip local pool SandersVPN_DHCP 10.16.16.2-10.16.16.22 mask 255.255.255.0&lt;BR /&gt;ip local pool SandersFB_VPN_DHCP 172.16.16.2-172.16.16.22 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description Primary line to ISP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif outsideMain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address xxx.xxx.xxx.xxx 255.255.255.248&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description Failback 4G link&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif outsideFailback&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.8.100 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.1.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/4.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vlan 4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif administrationW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.4.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;shutdown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;shutdown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;shutdown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet1/8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description TestOutsideConnection&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif TestConnection&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address xxx.xxx.xxx.xxx 255.255.255.248&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface Management1/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;management-only&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ftp mode passive&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;clock timezone CEST 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dns domain-lookup outsideMain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dns domain-lookup outsideFailback&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dns domain-lookup administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dns domain-lookup administrationW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;same-security-traffic permit inter-interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;same-security-traffic permit intra-interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network NETWORK_OBJ_10.16.16.0_27&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 10.16.16.0 255.255.255.224&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network NETWORK_OBJ_172.16.16.0_27&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 172.16.16.0 255.255.255.224&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationWObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.4.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network GuestWiFiObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.10.0 255.255.254.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationFailbackObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationW_FailbackObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.4.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network GuestWiFi_FailbackObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.10.0 255.255.254.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network MainGatewayIP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host xxx.xxx.xxx.xxx&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description Gateway IP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network 4G_FailbackGateway&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host 192.168.8.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description 4G Failback link&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdminWifiNetwork&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host 192.168.4.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description Access to Administration WiFi&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network OutSideMainLink&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet xxx.xxx.xxx.xxx 255.255.255.248&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description MainLink&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network FailbackLink&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.8.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description FailbackLink&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network TestConnectionNAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description test connection NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network TestConnectionNAT_W&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subnet 192.168.4.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description Test connection NAT_W&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object-group service DM_INLINE_SERVICE_1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp echo&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp echo-reply&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp time-exceeded&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp traceroute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp unreachable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object-group service DM_INLINE_SERVICE_2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp echo&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp echo-reply&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp time-exceeded&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp traceroute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-object icmp unreachable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object-group protocol TCPUDP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol-object udp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol-object tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list sfr_policy extended permit ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list sfr_redirect extended permit ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list administrationICMP extended permit icmp interface administration interface administrationW echo-reply log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list administrationICMP extended permit ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list outsideFailback_access_in extended permit icmp any any echo-reply&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list outsideFailback_access_in extended permit icmp any 192.168.1.0 255.255.255.0 echo-reply&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list outsideMain_access_in extended permit icmp any interface administration echo-reply&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list outsideMain_access_in extended permit icmp any interface administrationW echo-reply&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list administrationW_access_in extended permit object-group TCPUDP any4 any4 eq domain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list administrationW_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 any4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list administrationW_access_in extended permit ip any4 any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list ICMP-ADM extended permit object-group TCPUDP any4 any4 eq domain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list ICMP-ADM extended permit object-group DM_INLINE_SERVICE_2 any4 any4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list ICMP-ADM extended permit ip any4 any4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list ICMP-ADM extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list Split_Tunnel_List standard permit 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list SFR extended permit ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;pager lines 24&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;logging enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;logging monitor debugging&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;logging asdm informational&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no logging message 106023&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mtu outsideMain 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mtu outsideFailback 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mtu administration 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mtu administrationW 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mtu TestConnection 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no failover&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no monitor-interface service-module&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;icmp permit any administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;icmp permit any administrationW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no asdm history enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;arp timeout 14400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no arp permit-nonconnected&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administration,outsideMain) source static any any destination static NETWORK_OBJ_10.16.16.0_27 NETWORK_OBJ_10.16.16.0_27 no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administration,outsideFailback) source static any any destination static NETWORK_OBJ_172.16.16.0_27 NETWORK_OBJ_172.16.16.0_27 no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administration,outsideMain) dynamic interface dns&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationWObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administrationW,outsideMain) dynamic interface dns&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationFailbackObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administration,outsideFailback) dynamic interface dns&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network AdministrationW_FailbackObj&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administrationW,outsideFailback) dynamic interface dns&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network TestConnectionNAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administration,TestConnection) dynamic interface dns&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network TestConnectionNAT_W&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (administrationW,TestConnection) dynamic interface dns&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-group ICMP-ADM in interface administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-group administrationW_access_in in interface administrationW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route TestConnection 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1 track 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route outsideMain 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route outsideFailback 0.0.0.0 0.0.0.0 192.168.8.1 254&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route administration 192.168.100.0 255.255.255.0 192.168.100.1 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout xlate 3:00:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout pat-xlate 0:00:30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;timeout floating-conn 0:00:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;user-identity default-domain LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication ssh console LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authorization command LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;http server enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;http 192.168.1.0 255.255.255.0 administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;http 192.168.4.0 255.255.255.0 administrationW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;http 192.168.100.0 255.255.255.0 administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no snmp-server location&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no snmp-server contact&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sla monitor 123&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;type echo protocol ipIcmpEcho 8.8.8.8 interface TestConnection&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sla monitor schedule 123 life forever start-time now&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service sw-reset-button&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp encryption des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp encryption 3des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp encryption aes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp encryption aes-192&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ipsec security-association pmtu-aging infinite&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map outsideMain_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map outsideMain_map interface outsideMain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map outsideFailback_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map outsideFailback_map interface outsideFailback&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map administration_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map administration_map interface administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;enrollment self&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;fqdn none&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subject-name CN=192.168.2.1,CN=ASA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;keypair ASDM_LAUNCHER&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crl configure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;enrollment self&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;fqdn none&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subject-name CN=192.168.1.1,CN=ASA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;keypair ASDM_LAUNCHER&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crl configure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;enrollment self&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;fqdn none&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subject-name CN=192.168.2.1,CN=ASA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;keypair ASDM_LAUNCHER&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crl configure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;enrollment self&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;fqdn none&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subject-name CN=192.168.2.1,CN=ASA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;keypair ASDM_LAUNCHER&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;and SFR config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;===============[ System Information ]===============&lt;BR /&gt;Hostname : ASA&lt;BR /&gt;DNS Servers : 8.8.8.8&lt;BR /&gt; 8.8.4.4&lt;BR /&gt; 208.67.222.222&lt;BR /&gt; 208.67.220.220&lt;BR /&gt;Management port : 8305&lt;BR /&gt;IPv4 Default route&lt;BR /&gt; Gateway : 192.168.100.1&lt;/P&gt;
&lt;P&gt;======================[ eth0 ]======================&lt;BR /&gt;State : Enabled&lt;BR /&gt;Channels : Management &amp;amp; Events&lt;BR /&gt;Mode :&lt;BR /&gt;MDI/MDIX : Auto/MDIX&lt;BR /&gt;MTU : 1500&lt;BR /&gt;MAC Address : CC:16:7E:87:22:84&lt;BR /&gt;----------------------[ IPv4 ]----------------------&lt;BR /&gt;Configuration : Manual&lt;BR /&gt;Address : 192.168.100.2&lt;BR /&gt;Netmask : 255.255.255.0&lt;BR /&gt;Broadcast : 192.168.100.255&lt;/P&gt;
&lt;P&gt;IPv4 Static route&lt;BR /&gt; Destination : 192.168.1.0&lt;BR /&gt; Gateway : 192.168.100.1&lt;BR /&gt; Netmask : 255.255.255.0&lt;/P&gt;
&lt;P&gt;----------------------[ IPv6 ]----------------------&lt;BR /&gt;Configuration : Disabled&lt;/P&gt;
&lt;P&gt;===============[ Proxy Information ]================&lt;BR /&gt;State : Disabled&lt;BR /&gt;Authentication : Disabled&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I have changed so much lately in the config, so I probably cannot see the issue: "cannot see the tree from the forest" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;How can I enable communication between ASA and Firepower module?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you in advance&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966391#M149498</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2019-03-12T08:21:13Z</dc:date>
    </item>
    <item>
      <title>I take it you are trying to</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966392#M149499</link>
      <description>&lt;P&gt;I take it you are trying to manage the FirePOWER module via ASDM - is that correct?&lt;/P&gt;
&lt;P&gt;If so, please share the output of "show module sfr detail".&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 13:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966392#M149499</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-04T13:06:20Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966393#M149500</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;Thank you for a quick response. That is correct.&lt;/P&gt;
&lt;P&gt;From my perspective, there is no point of running&amp;nbsp;a firepower module via web service since I can have it all in&amp;nbsp;one place and that is ASDM.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the output that you requested:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Card Type: FirePOWER Services Software Module&lt;BR /&gt;Model: ASA5508&lt;BR /&gt;Hardware version: N/A&lt;BR /&gt;Serial Number:&amp;nbsp;XXXXXXXXX&lt;BR /&gt;Firmware version: N/A&lt;BR /&gt;Software version: 5.4.1-211&lt;BR /&gt;MAC Address Range: cc16.7e87.2284 to cc16.7e87.2284&lt;BR /&gt;App. name: ASA FirePOWER&lt;BR /&gt;App. Status: Up&lt;BR /&gt;App. Status Desc: Normal Operation&lt;BR /&gt;App. version: 5.4.1-211&lt;BR /&gt;Data Plane Status: Up&lt;BR /&gt;Console session: Ready&lt;BR /&gt;Status: Up&lt;BR /&gt;DC addr: No DC Configured&lt;BR /&gt;Mgmt IP addr: 192.168.100.2&lt;BR /&gt;Mgmt Network mask: 255.255.255.0&lt;BR /&gt;Mgmt Gateway: 192.168.100.1&lt;BR /&gt;Mgmt web ports: 443&lt;BR /&gt;Mgmt TLS enabled: true&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I have changed something in the configuration so I am posting newest config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;ASA Version 9.6(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;enable password OfCHMfd1XRg0CosZ encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;ip local pool SandersVPN_DHCP 10.16.16.2-10.16.16.22 mask 255.255.255.0&lt;BR /&gt;ip local pool SandersFB_VPN_DHCP 172.16.16.2-172.16.16.22 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; description Primary line to ISP&lt;BR /&gt; nameif outsideMain&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xxx.xxx.xxx.18 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; description Failback 4G link&lt;BR /&gt; nameif outsideFailback&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.8.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; nameif administration&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4.1&lt;BR /&gt; vlan 4&lt;BR /&gt; nameif administrationW&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.4.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; description TestOutsideConnection&lt;BR /&gt; nameif TestConnection&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xxx.xxx.xxx.218 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup outsideMain&lt;BR /&gt;dns domain-lookup outsideFailback&lt;BR /&gt;dns domain-lookup administration&lt;BR /&gt;dns domain-lookup administrationW&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NETWORK_OBJ_10.16.16.0_27&lt;BR /&gt; subnet 10.16.16.0 255.255.255.224&lt;BR /&gt;object network NETWORK_OBJ_172.16.16.0_27&lt;BR /&gt; subnet 172.16.16.0 255.255.255.224&lt;BR /&gt;object network AdministrationObj&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network AdministrationWObj&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network GuestWiFiObj&lt;BR /&gt; subnet 192.168.10.0 255.255.254.0&lt;BR /&gt;object network AdministrationFailbackObj&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network AdministrationW_FailbackObj&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network GuestWiFi_FailbackObj&lt;BR /&gt; subnet 192.168.10.0 255.255.254.0&lt;BR /&gt;object network MainGatewayIP&lt;BR /&gt; host xxx.xxx.xxx.17&lt;BR /&gt; description Gateway IP&lt;BR /&gt;object network 4G_FailbackGateway&lt;BR /&gt; host 192.168.8.1&lt;BR /&gt; description 4G Failback link&lt;BR /&gt;object network AdminWifiNetwork&lt;BR /&gt; host 192.168.4.1&lt;BR /&gt; description Access to Administration WiFi&lt;BR /&gt;object network OutSideMainLink&lt;BR /&gt; subnet xxx.xxx.xxx.16 255.255.255.248&lt;BR /&gt; description MainLink&lt;BR /&gt;object network FailbackLink&lt;BR /&gt; subnet 192.168.8.0 255.255.255.0&lt;BR /&gt; description FailbackLink&lt;BR /&gt;object network TestConnectionNAT&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; description test connection NAT&lt;BR /&gt;object network TestConnectionNAT_W&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt; description Test connection NAT_W&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp time-exceeded&lt;BR /&gt; service-object icmp traceroute&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp time-exceeded&lt;BR /&gt; service-object icmp traceroute&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list sfr_policy extended permit ip any any&lt;BR /&gt;access-list sfr_redirect extended permit ip any any&lt;BR /&gt;access-list administrationICMP extended permit icmp interface administration interface administrationW echo-reply log&lt;BR /&gt;access-list administrationICMP extended permit ip any any&lt;BR /&gt;access-list outsideFailback_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outsideFailback_access_in extended permit icmp any 192.168.1.0 255.255.255.0 echo-reply&lt;BR /&gt;access-list outsideMain_access_in extended permit icmp any interface administration echo-reply&lt;BR /&gt;access-list outsideMain_access_in extended permit icmp any interface administrationW echo-reply&lt;BR /&gt;access-list administrationW_access_in extended permit object-group TCPUDP any4 any4 eq domain&lt;BR /&gt;access-list administrationW_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 any4&lt;BR /&gt;access-list administrationW_access_in extended permit ip any4 any&lt;BR /&gt;access-list ICMP-ADM extended permit object-group TCPUDP any4 any4 eq domain&lt;BR /&gt;access-list ICMP-ADM extended permit object-group DM_INLINE_SERVICE_2 any4 any4&lt;BR /&gt;access-list ICMP-ADM extended permit ip any4 any4&lt;BR /&gt;access-list ICMP-ADM extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list Split_Tunnel_List standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list SFR extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;no logging message 106023&lt;BR /&gt;mtu outsideMain 1500&lt;BR /&gt;mtu outsideFailback 1500&lt;BR /&gt;mtu administration 1500&lt;BR /&gt;mtu administrationW 1500&lt;BR /&gt;mtu TestConnection 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any administration&lt;BR /&gt;icmp permit any administrationW&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (administration,outsideMain) source static any any destination static NETWORK_OBJ_10.16.16.0_27 NETWORK_OBJ_10.16.16.0_27 no-proxy-arp route-lookup&lt;BR /&gt;nat (administration,outsideFailback) source static any any destination static NETWORK_OBJ_172.16.16.0_27 NETWORK_OBJ_172.16.16.0_27 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network AdministrationObj&lt;BR /&gt; nat (administration,outsideMain) dynamic interface dns&lt;BR /&gt;object network AdministrationWObj&lt;BR /&gt; nat (administrationW,outsideMain) dynamic interface dns&lt;BR /&gt;object network AdministrationFailbackObj&lt;BR /&gt; nat (administration,outsideFailback) dynamic interface dns&lt;BR /&gt;object network AdministrationW_FailbackObj&lt;BR /&gt; nat (administrationW,outsideFailback) dynamic interface dns&lt;BR /&gt;object network TestConnectionNAT&lt;BR /&gt; nat (administration,TestConnection) dynamic interface dns&lt;BR /&gt;object network TestConnectionNAT_W&lt;BR /&gt; nat (administrationW,TestConnection) dynamic interface dns&lt;BR /&gt;access-group ICMP-ADM in interface administration&lt;BR /&gt;access-group administrationW_access_in in interface administrationW&lt;BR /&gt;route TestConnection 0.0.0.0 0.0.0.0 xxx.xxx.xxx.217 1 track 1&lt;BR /&gt;route outsideMain 0.0.0.0 0.0.0.0 xxx.xxx.xxx.17 10&lt;BR /&gt;route outsideFailback 0.0.0.0 0.0.0.0 192.168.8.1 254&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 administration&lt;BR /&gt;http 192.168.4.0 255.255.255.0 administrationW&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sla monitor 123&lt;BR /&gt; type echo protocol ipIcmpEcho 8.8.8.8 interface TestConnection&lt;BR /&gt;sla monitor schedule 123 life forever start-time now&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outsideMain_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outsideMain_map interface outsideMain&lt;BR /&gt;crypto map outsideFailback_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outsideFailback_map interface outsideFailback&lt;BR /&gt;crypto map administration_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map administration_map interface administration&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn none&lt;BR /&gt; subject-name CN=192.168.2.1,CN=ASA&lt;BR /&gt; keypair ASDM_LAUNCHER&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_1&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn none&lt;BR /&gt; subject-name CN=192.168.1.1,CN=ASA&lt;BR /&gt; keypair ASDM_LAUNCHER&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_2&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn none&lt;BR /&gt; subject-name CN=192.168.2.1,CN=ASA&lt;BR /&gt; keypair ASDM_LAUNCHER&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_3&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn none&lt;BR /&gt; subject-name CN=192.168.2.1,CN=ASA&lt;BR /&gt; keypair ASDM_LAUNCHER&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt; certificate c237a157&lt;BR /&gt; 308202d2 308201ba a0030201 020204c2 37a15730 0d06092a 864886f7 0d010105&lt;BR /&gt; 2dc52822 2eeb5786 20a1501a 7773d35c e652203e 4a35a93f f9d5608e 2fce8683&lt;BR /&gt; ed8f6158 5ef66923 fde27750 30079459 6c62a503 cc6b630f f0688977 1a11a05a&lt;BR /&gt; b2a97b88 58cb8fe5 bccc23da f0bc88c3 57864600 7df648ef 29c6039f f057b891&lt;BR /&gt; e7d96647 86cda131 3cd9f917 642a3c49 5a14f9fd 480b&lt;BR /&gt; quit&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_1&lt;BR /&gt; certificate ad4ea157&lt;BR /&gt; 308202d2 308201ba a0030201 020204ad 4ea15730 0d06092a 864886f7 0d010105&lt;BR /&gt; 649bbb84 bec1ce02 9786ca6c 28853c8f 2612008c c4685609 61d3fef4 37c65619&lt;BR /&gt; fdc26c74 e03a4138 d87274ac f38f65ff 11b4a431 4bc9edf8 cd737d2b 50bca3ff&lt;BR /&gt; 6b9ed4be 94a7fb56 de090512 529dbc38 f9a5b7f0 8fc6&lt;BR /&gt; quit&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_2&lt;BR /&gt; certificate f87bb257&lt;BR /&gt; 308202d2 308201ba a0030201 020204f8 7bb25730 0d06092a 864886f7 0d010105&lt;BR /&gt; 03b3cf80 adce66ae 47c4cd38 06bc99f9 1d4aa0b9 bd20767b 60aaa23d 90bfb854&lt;BR /&gt; 2a0c1aec 20c886cd d694f1ca 8eadf488 cf0159d0 3ce4c7c2 222d0f90 d1f74302&lt;BR /&gt; 8afed8ee 07d20667 43205b08 940a8f7f 86ee0f1d f4cd&lt;BR /&gt; quit&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_3&lt;BR /&gt; certificate ae39db57&lt;BR /&gt; 308202d2 308201ba a0030201 020204ae 39db5730 0d06092a 864886f7 0d010105&lt;BR /&gt; 66b80ffd 7bc5184f ea6c2d81 4d3dd060 b27b4f83 afad9c79 19ca6b94 57905770&lt;BR /&gt; 8ea59c83 b822780b bd100f43 9a0496cb fc21a997 49a0c94f 9162607e 85eae1c0&lt;BR /&gt; 706207ff 83a475d2 4aa7fdfa 1444aab2 51e85e59 a232&lt;BR /&gt; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outsideMain client-services port 443&lt;BR /&gt;crypto ikev2 enable outsideFailback client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_Launcher_Access_TrustPoint_1&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 123 reachability&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 administration&lt;BR /&gt;ssh 192.168.4.0 255.255.255.0 administrationW&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd dns 8.8.8.8&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.251 administration&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface administration&lt;BR /&gt;dhcpd enable administration&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.4.2-192.168.4.247 administrationW&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface administrationW&lt;BR /&gt;dhcpd enable administrationW&lt;BR /&gt;!&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 outsideMain&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 outsideFailback&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 administration&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 administrationW&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 administration vpnlb-ip&lt;BR /&gt;webvpn&lt;BR /&gt; enable outsideMain&lt;BR /&gt; enable outsideFailback&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-4.3.01095-k9.pkg 1&lt;BR /&gt; anyconnect profiles FailbackVPN_Access_client_profile disk0:/FailbackVPN_Access_client_profile.xml&lt;BR /&gt; anyconnect profiles MainVPN_Access_client_profile disk0:/MainVPN_Access_client_profile.xml&lt;BR /&gt; anyconnect profiles SandersFailbackVPN_client_profile disk0:/SandersFailbackVPN_client_profile.xml&lt;BR /&gt; anyconnect profiles SandersMainVPN_client_profile disk0:/SandersMainVPN_client_profile.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt; cache&lt;BR /&gt; disable&lt;BR /&gt; error-recovery disable&lt;BR /&gt;group-policy GroupPolicy_MainVPN_Access internal&lt;BR /&gt;group-policy GroupPolicy_MainVPN_Access attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel_List&lt;BR /&gt; default-domain none&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value MainVPN_Access_client_profile type user&lt;BR /&gt;group-policy GroupPolicy_FailbackVPN_Access internal&lt;BR /&gt;group-policy GroupPolicy_FailbackVPN_Access attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel_List&lt;BR /&gt; default-domain none&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value FailbackVPN_Access_client_profile type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password ULntHxAPASxzoMC/ encrypted privilege 15&lt;BR /&gt;username administrator password ULntHxAPASxzoMC/ encrypted privilege 15&lt;BR /&gt;tunnel-group MainVPN_Access type remote-access&lt;BR /&gt;tunnel-group MainVPN_Access general-attributes&lt;BR /&gt; address-pool SandersVPN_DHCP&lt;BR /&gt; default-group-policy GroupPolicy_MainVPN_Access&lt;BR /&gt;tunnel-group MainVPN_Access webvpn-attributes&lt;BR /&gt; group-alias MainVPN_Access enable&lt;BR /&gt;tunnel-group FailbackVPN_Access type remote-access&lt;BR /&gt;tunnel-group FailbackVPN_Access general-attributes&lt;BR /&gt; address-pool SandersFB_VPN_DHCP&lt;BR /&gt; default-group-policy GroupPolicy_FailbackVPN_Access&lt;BR /&gt;tunnel-group FailbackVPN_Access webvpn-attributes&lt;BR /&gt; group-alias FailbackVPN_Access enable&lt;BR /&gt;!&lt;BR /&gt;class-map SFR&lt;BR /&gt; match access-list SFR&lt;BR /&gt;class-map sfr&lt;BR /&gt; match access-list sfr_redirect&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map sfr_policy&lt;BR /&gt; match access-list sfr_policy&lt;BR /&gt;class-map DefaultInspectionTraffic&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp&lt;BR /&gt; class SFR&lt;BR /&gt; sfr fail-open&lt;BR /&gt;policy-map global-policy&lt;BR /&gt; description SFR rule for ASDM to Firepower module communication&lt;BR /&gt; class DefaultInspectionTraffic&lt;BR /&gt; inspect dns&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect http&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;BR /&gt; inspect ipsec-pass-thru&lt;BR /&gt; inspect netbios&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt; destination address email callhome@cisco.com&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;password encryption aes&lt;BR /&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;: end&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I cannot simply ping that SFR module and I cannot understand why. By all the comments from other guys/girls, following that tutorial they managed to get Firepower module working in ASDM... What is different in my config?&lt;/P&gt;
&lt;P&gt;Is there any additional access-list or security policy that I need to apply?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 13:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966393#M149500</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-10-04T13:42:37Z</dc:date>
    </item>
    <item>
      <title>You have "route</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966394#M149501</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You have "r&lt;SPAN&gt;oute administration 192.168.100.0 255.255.255.0 192.168.100.1 1". that gateway is not on the administration interface's subnet so it is not valid.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The administration subnet needs to be able to reach the sfr module subnet. We generally put them on the same subnet so routing is not an issue. However if they are on different ones, they must have&amp;nbsp;valid&amp;nbsp;routing in place so they can communicate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please see the diagrams under Step 3 here:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/5508X/5508x-quick-start.html&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 13:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966394#M149501</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-04T13:47:51Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966395#M149502</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;yes, I am aware that it might be an routing issue, and I also tried to set sfr network to be 192.168.1.250/24 with gw 192.168.1.1, but without&amp;nbsp;luck. Every time when I try to ping that IP (192.168.1.250) I get no reply from ASA...&lt;/P&gt;
&lt;P&gt;I don't believe that it is routing issue, it must be something else... I will modify the config and post you result.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 14:17:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966395#M149502</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-10-04T14:17:32Z</dc:date>
    </item>
    <item>
      <title>If you change the sfr network</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966396#M149503</link>
      <description>&lt;P&gt;If you change the sfr network to be in the same subnet as your administration interface, then make sure to change the VLAN that the attached switchport is assigned to.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 14:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966396#M149503</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-04T14:20:11Z</dc:date>
    </item>
    <item>
      <title>Here is the newest config of</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966397#M149504</link>
      <description>&lt;P&gt;Here is the newest config of sfr:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&amp;gt; show network&lt;BR /&gt;===============[ System Information ]===============&lt;BR /&gt;Hostname : SandersASA&lt;BR /&gt;DNS Servers : 8.8.8.8&lt;BR /&gt; 8.8.4.4&lt;BR /&gt; 208.67.222.222&lt;BR /&gt; 208.67.220.220&lt;BR /&gt;Management port : 8305&lt;BR /&gt;IPv4 Default route&lt;BR /&gt; Gateway : 192.168.1.1&lt;/P&gt;
&lt;P&gt;======================[ eth0 ]======================&lt;BR /&gt;State : Enabled&lt;BR /&gt;Channels : Management &amp;amp; Events&lt;BR /&gt;Mode :&lt;BR /&gt;MDI/MDIX : Auto/MDIX&lt;BR /&gt;MTU : 1500&lt;BR /&gt;MAC Address : CC:16:7E:87:22:84&lt;BR /&gt;----------------------[ IPv4 ]----------------------&lt;BR /&gt;Configuration : Manual&lt;BR /&gt;Address : 192.168.1.250&lt;BR /&gt;Netmask : 255.255.255.0&lt;BR /&gt;Broadcast : 192.168.1.255&lt;BR /&gt;----------------------[ IPv6 ]----------------------&lt;BR /&gt;Configuration : Disabled&lt;/P&gt;
&lt;P&gt;===============[ Proxy Information ]================&lt;BR /&gt;State : Disabled&lt;BR /&gt;Authentication : Disabled&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;SFR config:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Getting details from the Service Module, please wait...&lt;/P&gt;
&lt;P&gt;Card Type: FirePOWER Services Software Module&lt;BR /&gt;Model: ASA5508&lt;BR /&gt;Hardware version: N/A&lt;BR /&gt;Serial Number: JAD20240A15&lt;BR /&gt;Firmware version: N/A&lt;BR /&gt;Software version: 5.4.1-211&lt;BR /&gt;MAC Address Range: cc16.7e87.2284 to cc16.7e87.2284&lt;BR /&gt;App. name: ASA FirePOWER&lt;BR /&gt;App. Status: Up&lt;BR /&gt;App. Status Desc: Normal Operation&lt;BR /&gt;App. version: 5.4.1-211&lt;BR /&gt;Data Plane Status: Up&lt;BR /&gt;Console session: Ready&lt;BR /&gt;Status: Up&lt;BR /&gt;DC addr: No DC Configured&lt;BR /&gt;Mgmt IP addr: 192.168.1.250&lt;BR /&gt;Mgmt Network mask: 255.255.255.0&lt;BR /&gt;Mgmt Gateway: 192.168.1.1&lt;BR /&gt;Mgmt web ports: 443&lt;BR /&gt;Mgmt TLS enabled: true&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PING:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;ping 192.168.1.250&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.1.250, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I simply don't have a clue why is not forwarding the traffic to SFR especially when I defined the access list policy.&lt;/P&gt;
&lt;P&gt;"access-list SFR extended permit ip any any"&lt;/P&gt;
&lt;P&gt;"policy-map global_policy&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp&lt;BR /&gt; class SFR&lt;BR /&gt; sfr fail-open&lt;BR /&gt;policy-map global-policy&lt;BR /&gt; description SFR rule for ASDM to Firepower module communication"&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 14:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966397#M149504</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-10-04T14:25:26Z</dc:date>
    </item>
    <item>
      <title>How can I do that?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966398#M149505</link>
      <description>&lt;P&gt;How can I do that?&lt;/P&gt;
&lt;P&gt;again I am bit new into this?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 14:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966398#M149505</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-10-04T14:27:03Z</dc:date>
    </item>
    <item>
      <title>The VLAN assignment is on the</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966399#M149506</link>
      <description>&lt;P&gt;The VLAN assignment is on the switch. If it is a Cisco switch, it would be something like&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;conf t&lt;BR /&gt;interface &amp;lt;interface number&amp;gt;&lt;BR /&gt;switchport access vlan &amp;lt;vlan id&amp;gt;&lt;BR /&gt;end&lt;/PRE&gt;</description>
      <pubDate>Tue, 04 Oct 2016 15:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966399#M149506</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-04T15:49:37Z</dc:date>
    </item>
    <item>
      <title>Ok, I am totally confused now</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966400#M149507</link>
      <description>&lt;P&gt;Ok, I am totally&amp;nbsp;confused now. As you mentioned VLAN. how to find which VLAN is needed for&amp;nbsp;sfr module to work? I have Gi1/3 which is VLAN (default - VLAN 1) &amp;nbsp;and Gi1/4 which is subinterface that is set as&amp;nbsp;VLAN 4, but this is for totally different thing (admin/guest wifi). The whole network is designed like that... How can I tell which VLAN is needed for sfr module to function?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 17:19:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966400#M149507</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-10-04T17:19:36Z</dc:date>
    </item>
    <item>
      <title>Please look at the figure in</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966401#M149508</link>
      <description>&lt;P&gt;Please look at the figure in the Quick Start Guide that I linked earlier.&lt;/P&gt;
&lt;P&gt;ASA needs to be able to reach sfr. That can happen if:&lt;/P&gt;
&lt;P&gt;1. Physical interfaces are assigned to same subnets and connected to a switch whose parts are in the same VLAN. this is what's shown in the quick start guide and the simplest setup.&lt;/P&gt;
&lt;P&gt;2. Physical interfaces are assigned to different subnets and switchports are in associated VLANs corresponding to those subnets and routing is setup to allow the communication between them.&lt;/P&gt;
&lt;P&gt;In the latter case (which you have) the VLAN assignment is dictated by your switching and routing setup in your network.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 17:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966401#M149508</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-04T17:43:23Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin. I will try</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966402#M149509</link>
      <description>&lt;P&gt;Thanks Marvin. I will try tomorrow when I come to office.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 18:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966402#M149509</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-10-04T18:26:33Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966403#M149510</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;thank you very much. Not sure why ASA is working like that, but I have made config as per link that you've sent, with minor difference. There is part of the text saying that I should have set Management 1/1 to same subnet, but ASA is rejecting that possibility:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;ERROR: Failed to apply IP address to interface Management1/1, as the network overlaps with interface GigabitEthernet1/3. Two interfaces cannot be in the same subnet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I did is:&lt;/P&gt;
&lt;P&gt;- instead of setting management port to IP address in network range 192.168.1.0/24 (as Gi1/3) to no nameif, no security-level, no ip address, and went directly to session sfr console and changed:&lt;/P&gt;
&lt;P&gt;configure &amp;gt; network &amp;gt; ipv4 &amp;gt; manual&amp;gt; ip address netmask gw interface (eth0) to same IP network (same subnet as Gi1/3). Plugged cable from switch to management port and now I can ping and get firepower module.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for the reference and best regards &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2016 07:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-connection-issue-on-asa5508x/m-p/2966403#M149510</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2016-10-05T07:21:23Z</dc:date>
    </item>
  </channel>
</rss>

