<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Well close - you said your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966713#M155631</link>
    <description>&lt;P&gt;Well close - you said your core switch is .202 and the ASA management interface is .201.&lt;/P&gt;
&lt;P&gt;The FirePOWER module needs to be a third unique address in that /16 subnet.&lt;/P&gt;
&lt;P&gt;When you launch ASDM it pulls up information from the FirePOWER module (same that you could do from cli with "show module sfr detail") and uses that information to populate the FirePOWER module Home, Configuration and Monitoring sections within ASDM.&lt;/P&gt;</description>
    <pubDate>Tue, 30 Aug 2016 01:41:15 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2016-08-30T01:41:15Z</dc:date>
    <item>
      <title>firepower configuration missing on 5506</title>
      <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966708#M155626</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The FirePower configuration button is not visible in ASDM.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;login ASDM, use the setup wizard, configure the firepower address:&amp;nbsp;10.55.5.201/255.255.0.0/10.55.5.241&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;laptop connect to switch, configure the IP address: 10.55.5.202, &amp;nbsp;ping 10.55.5.201 is okay, ASDM login with management IP(10.55.5.201) is OK. but cannot find Firepower configuration button.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;the firewall mode is transparent.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 9.6(1) &lt;BR /&gt;!&lt;BR /&gt;firewall transparent&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.55.5.201 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt; ip address 192.168.1.205 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list inside-to-outside extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit ip host 192.168.1.189 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_mpc extended permit ip host 192.168.1.189 192.168.1.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside-to-outside out interface outside&lt;BR /&gt;route management 0.0.0.0 0.0.0.0 10.55.5.241 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.175 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.0.0 255.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet 10.0.0.0 255.0.0.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;
&lt;P&gt;username cisco123 password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map outside-class&lt;BR /&gt; match access-list outside_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt;policy-map outside-policy&lt;BR /&gt; class outside-class&lt;BR /&gt; inspect netbios &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy outside-policy interface outside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:525fd9bed6e62a005c45cf4d64ddd39c&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;ciscoasa# show module&lt;/P&gt;
&lt;P&gt;Mod Card Type Model Serial No. &lt;BR /&gt;---- -------------------------------------------- ------------------ -----------&lt;BR /&gt; 1 ASA 5506-X with SW, 8GE Data, 1GE Mgmt, AC ASA5506 JADxxxxxxx&lt;/P&gt;
&lt;P&gt;sfr FirePOWER Services Software Module ASA5506 &lt;SPAN&gt;JADxxxxxxx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Mod MAC Address Range Hw Version Fw Version Sw Version &lt;BR /&gt;---- --------------------------------- ------------ ------------ ---------------&lt;BR /&gt; 1 002a.104b.57e6 to 002a.104b.57ef 1.1 1.1.8 9.6(1)&lt;BR /&gt; sfr 002a.104b.57e5 to 002a.104b.57e5 N/A N/A 5.4.1-211&lt;/P&gt;
&lt;P&gt;Mod SSM Application Name Status SSM Application Version&lt;BR /&gt;---- ------------------------------ ---------------- --------------------------&lt;BR /&gt; sfr ASA FirePOWER Up 5.4.1-211&lt;/P&gt;
&lt;P&gt;Mod Status Data Plane Status Compatibility&lt;BR /&gt;---- ------------------ --------------------- -------------&lt;BR /&gt; 1 Up Sys Not Applicable &lt;BR /&gt; sfr Up Up&lt;/P&gt;
&lt;P&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;ciscoasa# show ver&lt;/P&gt;
&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.6(1) &lt;BR /&gt;Device Manager Version 7.6(1)&lt;/P&gt;
&lt;P&gt;Compiled on Fri 18-Mar-16 14:04 PDT by builders&lt;BR /&gt;System image file is "disk0:/asa961-lfbff-k8.SPA"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;
&lt;P&gt;ciscoasa up 5 hours 8 mins&lt;/P&gt;
&lt;P&gt;Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;Internal ATA Compact Flash, 8192MB&lt;BR /&gt;BIOS Flash M25P64 @ 0xfed01000, 16384KB&lt;/P&gt;
&lt;P&gt;Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)&lt;BR /&gt; Number of accelerators: 1&lt;/P&gt;
&lt;P&gt;1: Ext: GigabitEthernet1/1 : address is 002a.104b.57e7, irq 255&lt;BR /&gt; 2: Ext: GigabitEthernet1/2 : address is 002a.104b.57e8, irq 255&lt;BR /&gt; 3: Ext: GigabitEthernet1/3 : address is 002a.104b.57e9, irq 255&lt;BR /&gt; 4: Ext: GigabitEthernet1/4 : address is 002a.104b.57ea, irq 255&lt;BR /&gt; 5: Ext: GigabitEthernet1/5 : address is 002a.104b.57eb, irq 255&lt;BR /&gt; 6: Ext: GigabitEthernet1/6 : address is 002a.104b.57ec, irq 255&lt;BR /&gt; 7: Ext: GigabitEthernet1/7 : address is 002a.104b.57ed, irq 255&lt;BR /&gt; 8: Ext: GigabitEthernet1/8 : address is 002a.104b.57ee, irq 255&lt;BR /&gt; 9: Int: Internal-Data1/1 : address is 002a.104b.57e6, irq 255&lt;BR /&gt;10: Int: Internal-Data1/2 : address is 0000.0001.0002, irq 0&lt;BR /&gt;11: Int: Internal-Control1/1 : address is 0000.0001.0001, irq 0&lt;BR /&gt;12: Int: Internal-Data1/3 : address is 0000.0001.0003, irq 0&lt;BR /&gt;13: Ext: Management1/1 : address is 002a.104b.57e6, irq 0&lt;/P&gt;
&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 30 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Standby perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 4 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 50 perpetual&lt;BR /&gt;Total VPN Peers : 50 perpetual&lt;BR /&gt;AnyConnect for Mobile : Disabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Disabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total UC Proxy Sessions : 160 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;Cluster : Disabled perpetual&lt;/P&gt;
&lt;P&gt;This platform has an ASA 5506 Security Plus license.&lt;/P&gt;
&lt;P&gt;Serial Number: &lt;SPAN&gt;JADxxxxxxx&lt;/SPAN&gt;&lt;BR /&gt;Running Permanent Activation Key:&amp;nbsp;&lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;Image type : Release&lt;BR /&gt;Key Version : A&lt;BR /&gt;Configuration last modified by cisco at 00:50:54.329 UTC Mon Aug 29 2016&lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966708#M155626</guid>
      <dc:creator>yangsonggui</dc:creator>
      <dc:date>2019-03-12T08:12:02Z</dc:date>
    </item>
    <item>
      <title>Have you sessioned into the</title>
      <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966709#M155627</link>
      <description>&lt;P&gt;Have you sessioned into the sfr module and accepted the EULA?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 13:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966709#M155627</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-29T13:53:02Z</dc:date>
    </item>
    <item>
      <title>not yes, is it the necessary</title>
      <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966710#M155628</link>
      <description>&lt;P&gt;not yet, is it the necessary step?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;do you think the sfr ip address is correct or not in my case? it should be 192.168.1.xxx or 10.55.5.xxx? and what is the gateway ip address?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 01:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966710#M155628</guid>
      <dc:creator>yangsonggui</dc:creator>
      <dc:date>2016-08-30T01:05:47Z</dc:date>
    </item>
    <item>
      <title>You shouldn't have to accept</title>
      <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966711#M155629</link>
      <description>&lt;P&gt;You shouldn't have to accept the EULA to reach the module.&lt;/P&gt;
&lt;P&gt;Re-reading your post, did you set BOTH the ASA managment and FirePOWER module address to&amp;nbsp;&lt;SPAN&gt;10.55.5.201? They need to be different addresses in that /16. Think of the &amp;nbsp;FirePOWER module like a VM on the same ESXi host as the ASA software. Each has it's own distinct IP configuration and address.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The FirePOWER module gateway should be the core switch at 10.255.5.202.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 01:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966711#M155629</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-30T01:22:20Z</dc:date>
    </item>
    <item>
      <title>thanks so much!</title>
      <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966712#M155630</link>
      <description>&lt;P&gt;thanks so much!&lt;/P&gt;
&lt;P&gt;as my understanding now, i should login ASDM, &lt;SPAN&gt;use the setup wizard,&amp;nbsp;&lt;/SPAN&gt;change the FirePOWER module ip address to&amp;nbsp;&lt;SPAN&gt;10.55.5.202/16 and correct gateway address, then logout ASDM and re-login, the FirePOWER module configuration button should be found in ASDM, right?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 01:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966712#M155630</guid>
      <dc:creator>yangsonggui</dc:creator>
      <dc:date>2016-08-30T01:36:42Z</dc:date>
    </item>
    <item>
      <title>Well close - you said your</title>
      <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966713#M155631</link>
      <description>&lt;P&gt;Well close - you said your core switch is .202 and the ASA management interface is .201.&lt;/P&gt;
&lt;P&gt;The FirePOWER module needs to be a third unique address in that /16 subnet.&lt;/P&gt;
&lt;P&gt;When you launch ASDM it pulls up information from the FirePOWER module (same that you could do from cli with "show module sfr detail") and uses that information to populate the FirePOWER module Home, Configuration and Monitoring sections within ASDM.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 01:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966713#M155631</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-30T01:41:15Z</dc:date>
    </item>
    <item>
      <title>Okay, totally understand.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966714#M155632</link>
      <description>&lt;P&gt;Okay, totally understand. actually .202 isn't the gateway address. I know we need an unique address for FirePOWER module. thanks for clarifying!&lt;/P&gt;
&lt;P&gt;I will try to troubleshooting next week maybe(due to the new schedule). will let you know the latest update, much appreciate!&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 01:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-configuration-missing-on-5506/m-p/2966714#M155632</guid>
      <dc:creator>yangsonggui</dc:creator>
      <dc:date>2016-08-30T01:48:01Z</dc:date>
    </item>
  </channel>
</rss>

