<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MPF For ASA+FirePower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728555#M166779</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i'm trying to redirect ALL traffic to a firepower module on an ASA5515x.&lt;/P&gt;&lt;P&gt;could someone advise what's the best way to do it or both achieve the same thing?&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;option 1:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match any&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;BR /&gt;&lt;BR /&gt;OR&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;option 2:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;access-list SFR_ACL extended permit ip any any&lt;/P&gt;&lt;P&gt;class-map SFR&lt;BR /&gt;&amp;nbsp;match access-list SFR_ACL&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class SFR&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:45:52 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2019-03-12T06:45:52Z</dc:date>
    <item>
      <title>MPF For ASA+FirePower</title>
      <link>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728555#M166779</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i'm trying to redirect ALL traffic to a firepower module on an ASA5515x.&lt;/P&gt;&lt;P&gt;could someone advise what's the best way to do it or both achieve the same thing?&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;option 1:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match any&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;BR /&gt;&lt;BR /&gt;OR&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;option 2:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;access-list SFR_ACL extended permit ip any any&lt;/P&gt;&lt;P&gt;class-map SFR&lt;BR /&gt;&amp;nbsp;match access-list SFR_ACL&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class SFR&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:45:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728555#M166779</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-03-12T06:45:52Z</dc:date>
    </item>
    <item>
      <title>There is also option three:</title>
      <link>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728556#M166780</link>
      <description>&lt;P&gt;There is also option three:&lt;/P&gt;

&lt;PRE&gt;
policy-map global_policy
 class class-default
  sfr fail-open&lt;/PRE&gt;

&lt;P&gt;Although all three ways should work, I would consider this one the most elegant if you want all traffic to be sent to SFR.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Oct 2015 22:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728556#M166780</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-10-17T22:16:58Z</dc:date>
    </item>
    <item>
      <title>hi karsten,thanks for</title>
      <link>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728557#M166781</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;&lt;P&gt;thanks for feedback!&lt;/P&gt;&lt;P&gt;how about whitelist an IP or subnet?&lt;/P&gt;&lt;P&gt;do you create a deny ACL on the ASA or everything is done on FireSight?&lt;/P&gt;</description>
      <pubDate>Sat, 17 Oct 2015 23:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728557#M166781</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-10-17T23:55:14Z</dc:date>
    </item>
    <item>
      <title>That depends on the sizing of</title>
      <link>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728558#M166782</link>
      <description>&lt;P&gt;That depends on the sizing of your ASA.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If your SFR is fast enough to handle all traffic, I still would send all traffic to the module and use the access-policies there to allow the traffic.&lt;/LI&gt;&lt;LI&gt;If the SFR is to slow to handle all traffic, then option 2 is the way to go and exclude traffic from being sent to SFR. But that makes your implementation a little more complex.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sun, 18 Oct 2015 06:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpf-for-asa-firepower/m-p/2728558#M166782</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-10-18T06:22:38Z</dc:date>
    </item>
  </channel>
</rss>

