<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WSA and ASA with firepower,This is a problem about firepower event! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3885938#M17970</link>
    <description>Hi Marvin&lt;BR /&gt;&lt;BR /&gt;I am glad to receive your reply.&lt;BR /&gt;&lt;BR /&gt;My firepower version is v5.4.0.&lt;BR /&gt;&lt;BR /&gt;I can not find the "Original Client IP" Option in the Table view of Connection Events. Will this be an option in version 6.3?&lt;BR /&gt;&lt;BR /&gt;Do I need any configuration on ASA to implement XFF?</description>
    <pubDate>Mon, 08 Jul 2019 01:54:05 GMT</pubDate>
    <dc:creator>Andy Yuan1993</dc:creator>
    <dc:date>2019-07-08T01:54:05Z</dc:date>
    <item>
      <title>WSA and ASA with firepower,This is a problem about firepower event!</title>
      <link>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3885112#M17950</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi everyone&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My company using WSA and ASA with firepower, flow under the action of WCCP, be ASA redirect to the WSA, when the user's endpoint access to the Internet, I view the event on firepower, found that the source address is the address of the P port in the WSA, is this why?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 08:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3885112#M17950</guid>
      <dc:creator>Andy Yuan1993</dc:creator>
      <dc:date>2019-07-05T08:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: WSA and ASA with firepower,This is a problem about firepower event!</title>
      <link>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3885208#M17959</link>
      <description>&lt;P&gt;There is a column you can optionally display in connection events as follows:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Original Client IP&lt;BR /&gt;The original IP address of the client that initiated an HTTP connection. This address is derived from the&lt;BR /&gt;X-Forwarded-For (XFF) or True-Client-IP HTTP header fields or their equivalent.&lt;/P&gt;
&lt;P&gt;To see it, go into Analysis &amp;gt; Connection Events &amp;gt; Table view of Connection Events. Click on the X of any column header and select that new field (non-default) from the "disabled columns" section of the list and then apply.&lt;/P&gt;
&lt;P&gt;I'm not positive when the field was added - I know it is there in 6.3+ but not sure about older releases.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 12:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3885208#M17959</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-05T12:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: WSA and ASA with firepower,This is a problem about firepower event!</title>
      <link>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3885938#M17970</link>
      <description>Hi Marvin&lt;BR /&gt;&lt;BR /&gt;I am glad to receive your reply.&lt;BR /&gt;&lt;BR /&gt;My firepower version is v5.4.0.&lt;BR /&gt;&lt;BR /&gt;I can not find the "Original Client IP" Option in the Table view of Connection Events. Will this be an option in version 6.3?&lt;BR /&gt;&lt;BR /&gt;Do I need any configuration on ASA to implement XFF?</description>
      <pubDate>Mon, 08 Jul 2019 01:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3885938#M17970</guid>
      <dc:creator>Andy Yuan1993</dc:creator>
      <dc:date>2019-07-08T01:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: WSA and ASA with firepower,This is a problem about firepower event!</title>
      <link>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3886119#M17975</link>
      <description>&lt;P&gt;Your Firepower service module release 5.4.0 is quite old. In fact, it's the initial release on that platform. Think of it as more like 1.0. You should keep up to date on releases (current 6.4 is the latest major release).&lt;/P&gt;
&lt;P&gt;The XFF feature was introduced later - 6.0 if I recall correctly. See the following thread for some more details:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/firepower/asa-firepower-and-proxy/td-p/2611587" target="_blank"&gt;https://community.cisco.com/t5/firepower/asa-firepower-and-proxy/td-p/2611587&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 09:08:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3886119#M17975</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-08T09:08:29Z</dc:date>
    </item>
    <item>
      <title>Re: WSA and ASA with firepower,This is a problem about firepower event!</title>
      <link>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3886360#M17979</link>
      <description>&lt;P&gt;This is expected behaviour as the WSA makes a new connection to the origin server on behalf of the client and hence you would see wsa's p interface on the upstream( p1 /P2 depending on your deployment). IP spoofing is by default disabled on the wsa.&lt;/P&gt;
&lt;P&gt;XFF headers need to be enabled as well on the wsa if you want to see the client IP. Please dont make any changes without understanding the effect of these changes . If you decide to go for IP spoofing , you would need to make changes to other devices on the upstream. You can always open a case with us and we can analyse your network design and guide you accordingly before you make any changes and you can take a call on how you would like to route your traffic.&lt;/P&gt;
&lt;P&gt;Regards&lt;BR /&gt;Shikha Grover&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 14:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wsa-and-asa-with-firepower-this-is-a-problem-about-firepower/m-p/3886360#M17979</guid>
      <dc:creator>shgrover</dc:creator>
      <dc:date>2019-07-08T14:44:34Z</dc:date>
    </item>
  </channel>
</rss>

