<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Marvin, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833609#M174098</link>
    <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;In my original post, I stated that we were purchasing the following:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA 5525-X with FirePOWER Svcs. Chassis and Subs. Bundle&lt;BR /&gt;Cisco ASA5525 FirePOWER IPS, AMP and URL Licenses&lt;BR /&gt;Cisco FireSIGHT Management Center,(VMWare) for 2 devices&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Our vendor understood what we were looking to do and provided the necessary licensing to accomplish that.&amp;nbsp; I'll take a look at the video from Cisco Live to get an idea as to how to start.&amp;nbsp; Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
    <pubDate>Fri, 11 Dec 2015 14:33:41 GMT</pubDate>
    <dc:creator>Terence Lockette</dc:creator>
    <dc:date>2015-12-11T14:33:41Z</dc:date>
    <item>
      <title>Question about Firewalling &amp; Content Filtering using ASA 5525-X</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833607#M174096</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;I'm in the process of purchasing a quantity of 2 for the following:&lt;/P&gt;
&lt;P&gt;ASA 5525-X with FirePOWER Svcs. Chassis and Subs. Bundle&lt;BR /&gt;Cisco ASA5525 FirePOWER IPS, AMP and URL Licenses&lt;BR /&gt;Cisco FireSIGHT Management Center,(VMWare) for 2 devices&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;These will replace our guest network firewall and content filter which are currently Barracuda devices.&amp;nbsp; I'm not sure if it's worth mentioning but there are 3 networks behind our guest network.&amp;nbsp; The 1st is the main guest network that has the current firewall, Web filter, switches, and guest devices.&amp;nbsp; The 2nd network services a remote network where we used PBR to get it's traffic routed to the guest network.&amp;nbsp; The last network is a network created where clients are behind the PacketFence captive portal so the server has 2 NICs (one on the main network and the other behind the portal that serves clients behind it.&amp;nbsp; Eventually, users on the main network will be moved behind the captive portal.&lt;/P&gt;
&lt;P&gt;We're going to run the ASAs in active/standby HA.&amp;nbsp; What I need to know is since this will be a new install/configure from scratch, is there any documentation that will guide me through the process of getting this up and running step-by-step?&amp;nbsp; For instance, do I need to configure my firewall with all required configurations first and then proceed to configure CX for content filtering?&amp;nbsp; We're not going to run, at least for now, FirePOWER services so I don't think the install/configuration of FirePOWER and the FireSIGHT Mgmt Center would be necessary unless it's used for the URL/Content filtering.&amp;nbsp; I just need to be pointed in the right direction as to how to get started.&amp;nbsp; Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833607#M174096</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2019-03-12T07:01:38Z</dc:date>
    </item>
    <item>
      <title>CX is an older discontinued</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833608#M174097</link>
      <description>&lt;P&gt;CX is an older discontinued module. It is no longer sold.&lt;/P&gt;
&lt;P&gt;On your platform, content filtering etc. would be done using the FirePOWER module. Hopefully you purchased the licenses for that - "TA" at least (for IPS), "TAC" (adds URL filtering) or "TAMC" adds Malware protection or AMP).&lt;/P&gt;
&lt;P&gt;There is a good Cisco Live presentation that covers creating policies. Please refer to BRKSEC-2018 from Cisco Live San Diego 2015 available free at ciscolive365.com&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 03:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833608#M174097</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-11T03:46:28Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833609#M174098</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;In my original post, I stated that we were purchasing the following:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA 5525-X with FirePOWER Svcs. Chassis and Subs. Bundle&lt;BR /&gt;Cisco ASA5525 FirePOWER IPS, AMP and URL Licenses&lt;BR /&gt;Cisco FireSIGHT Management Center,(VMWare) for 2 devices&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Our vendor understood what we were looking to do and provided the necessary licensing to accomplish that.&amp;nbsp; I'll take a look at the video from Cisco Live to get an idea as to how to start.&amp;nbsp; Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 14:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833609#M174098</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2015-12-11T14:33:41Z</dc:date>
    </item>
    <item>
      <title>OK sure - I saw that but I</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833610#M174099</link>
      <description>&lt;P&gt;OK sure - I saw that but I was picking up on where you said further down "&lt;SPAN&gt;proceed to configure CX for content filtering?&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;There are also some good free videos on Lab Minutes for setting up FirePOWER. See the following: &amp;nbsp;http://labminutes.com/video/sec/ASA%20FirePower&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 14:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833610#M174099</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-11T14:47:52Z</dc:date>
    </item>
    <item>
      <title>Oh ok lol.  Yeah the reason I</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833611#M174100</link>
      <description>&lt;P&gt;Oh ok lol.&amp;nbsp; Yeah the reason I mentioned CX is because LabMinutes has their videos labeled as CX but that may be for the older module as you stated.&amp;nbsp; Thanks again!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 14:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833611#M174100</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2015-12-11T14:54:02Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833612#M174101</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;I just happened to notice that the FireSIGHT Management Center is VMWare so does that mean it doesn't support Hyper-V?&amp;nbsp; If not, then I'll need to look at another solution for what I'm trying to do for our guest network as we're a Hyper-V shop and won't be adding another VM environment.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 18:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833612#M174101</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2015-12-11T18:40:44Z</dc:date>
    </item>
    <item>
      <title>Sorry but FireSIGHT</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833613#M174102</link>
      <description>&lt;P&gt;Sorry but FireSIGHT Management Center (known as FirePOWER Management Center as of version 6.0) is not available for Hyper-V.&lt;/P&gt;
&lt;P&gt;I've had several customers with the same question and have been banging the drum with my Cisco contacts for most of the year over this request but it's not resulted in any progress to date.&lt;/P&gt;
&lt;P&gt;You can manage an ASA FirePOWER module directly from ASDM (capability now extended to all of the ASA 5500-X series) but that's not very feasible if you have more than one or two ASAs.&lt;/P&gt;
&lt;P&gt;If you're only dealing with the one 5506 it might be fine for you though.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 19:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833613#M174102</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-11T19:23:16Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin.</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833614#M174103</link>
      <description>&lt;P&gt;Thanks Marvin.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Unfortunately, we would be looking to purchase 2 ASA 5525-Xs with the appropriate FirePOWER licenses but now we won't because we're a Hyper-V only shop and will not add a mixed VM environment.&amp;nbsp; Thanks for your response.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 19:27:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833614#M174103</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2015-12-11T19:27:15Z</dc:date>
    </item>
    <item>
      <title>You're welcome.</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833615#M174104</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;Maybe the Cisco BU will read your post and tip the scales to get the developers to release Hyper-V support. After all it's just a Linux box with an Oracle db, Tomcat app server and Apache web server under the covers.&lt;/P&gt;
&lt;P&gt;Please mark your question as answered it it has been.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 19:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833615#M174104</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-11T19:31:23Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833616#M174105</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;Do I have to run IPS in order to use URL/Content Filtering or can I just use URL/Content filtering without running IPS?&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Mon, 28 Dec 2015 18:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833616#M174105</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2015-12-28T18:38:28Z</dc:date>
    </item>
    <item>
      <title>Terence,</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833617#M174106</link>
      <description>&lt;P&gt;Terence,&lt;/P&gt;
&lt;P&gt;The IPS license is optional although I've always seen my customers opt for it.&lt;/P&gt;
&lt;P&gt;The URL Filtering license can be added alone to the base Cisco ASA with FirePOWER Services license or as part of a bundle with the IPS and Apps or IPS and Apps and AMP licenses.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Dec 2015 18:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833617#M174106</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-28T18:45:18Z</dc:date>
    </item>
    <item>
      <title>Gotcha.  So I don't have to</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833618#M174107</link>
      <description>&lt;P&gt;Gotcha.&amp;nbsp; So I don't have to run IPS in order to use URL/Content filtering because they're separate licenses.&amp;nbsp; Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Dec 2015 18:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833618#M174107</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2015-12-28T18:47:33Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833619#M174108</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;One last question.&amp;nbsp; I'm going to be running my ASAs in active/standby HA.&amp;nbsp; How does this work with FirePOWER?&amp;nbsp; Is there documentation that covers this scenario?&amp;nbsp; I'm assuming that I would have to have the same source fire files installed on both devices.&amp;nbsp; I also understand that the management interface needs to be used so does this mean separate IP addresses for both boxes for the management interface?&amp;nbsp; Some clarity would be greatly appreciated!&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 02:10:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833619#M174108</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2015-12-31T02:10:53Z</dc:date>
    </item>
    <item>
      <title>HA pairs and/or multiple ASAs</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833620#M174109</link>
      <description>&lt;P&gt;HA pairs and/or multiple ASAs with FirePOWER modules (or dedicated FirePOWER appliances) are where FirePOWER Manager becomes more compelling (contrasted with local management using ASDM).&lt;/P&gt;
&lt;P&gt;With the manager, we can combine devices into a device group and apply policy once. They will always be in sync and there's little or no need to log into the individual modules or appliances once they've been setup. Their respective events will be correlated into single database to give you a unified view of all the connections, IOCs, etc.&lt;/P&gt;
&lt;P&gt;Yes each FirePOWER module in an ASA HA pair has its own unique IP address and uses the ASA physical management interface (m0/0) for communications back to the FirePOWER Manager (or to ASDM if you go that route). That is in addition to any management address or interface you use on the ASA itself.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 02:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833620#M174109</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-31T02:37:12Z</dc:date>
    </item>
    <item>
      <title>Thought I wouldn't have any</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833621#M174110</link>
      <description>&lt;P&gt;Thought I wouldn't have any more questions but I have to ask this...do I have to have my ASAs configured prior to installing FireSIGHT or can I install FireSIGHT and then get my ASAs configured prior to doing the actual configuration of my policies via the management console?&amp;nbsp; I know what IPs I need to use for my ASAs and FireSIGHT.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 15:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833621#M174110</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2016-01-06T15:37:10Z</dc:date>
    </item>
    <item>
      <title>You can configure the</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833622#M174111</link>
      <description>&lt;P&gt;You can configure the FirePOWER module independent of the parent ASA it resides in. Of course the module needs to have been installed - if it's not you have to image it from the ASA cli.&lt;/P&gt;
&lt;P&gt;See the Quick Start Guide here for IP addressing:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/sfr/firepower-qsg.html#pgfId-144598&lt;/P&gt;
&lt;P&gt;Basically the FP module requires you to use the ASA management interface. It has its own default gateway independent of the host ASA. (It's basically a Linux VM with FirePOWER software.)&lt;/P&gt;
&lt;P&gt;It's optional whether you also want to use that &amp;nbsp;same physical interface (m0/0) for ASA management - most people do not and instead manage the ASA via the inside interface. That's primarily because (prior to ASA 9.5) a single context ASA only has one routing table. So unless you have a true out of band management network, using the ASA's m0/0 interface for management is challenging.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 15:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833622#M174111</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-01-06T15:55:36Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin!  I typically</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833623#M174112</link>
      <description>&lt;P&gt;Thanks Marvin!&amp;nbsp; I typically use the inside interface to manage the ASA.&amp;nbsp; I checked out some videos from LabMinutes and they put the management interface on the same subnet as their inside interface for their FireSIGHT deployment.&amp;nbsp; I'm looking to use this same method.&amp;nbsp; Is this ok?&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 15:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833623#M174112</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2016-01-06T15:58:25Z</dc:date>
    </item>
    <item>
      <title>Yes - the labminutes method</title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833624#M174113</link>
      <description>&lt;P&gt;Yes - the labminutes method will work.&lt;/P&gt;
&lt;P&gt;It can be confusing for folks who are new to the box to have two physical interfaces in the same subnet. As long as you remember they are being used by two different operating systems (ASA software and FirePOWER software - kind of like VMs on a hypervisor), it makes sense.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 16:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833624#M174113</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-01-06T16:05:03Z</dc:date>
    </item>
    <item>
      <title>That makes perfect sense! </title>
      <link>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833625#M174114</link>
      <description>&lt;P&gt;That makes perfect sense!&amp;nbsp; Marvin I truly thank you for your help and assistance in this matter as it is very new to me.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 16:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-firewalling-content-filtering-using-asa-5525-x/m-p/2833625#M174114</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2016-01-06T16:11:01Z</dc:date>
    </item>
  </channel>
</rss>

