<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5585-X with SourceFire in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5585-x-with-sourcefire/m-p/3487405#M193942</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking at a 5585-X with SourceFire but am unsure if traffic flow is similar to the software based SourceFire based on the lower end ASA's.&amp;nbsp; In the lowend ASA's, the traffic is passed from ASA to Sourcefire and back to ASA through the backplane.&amp;nbsp; With the 5585-X solution, the SourceFire card has physical interfaces on it.&amp;nbsp; Are the physical interfaces only used with tap/mirror traffic when in IDS mode?&amp;nbsp; Or do you have to direct traffic through them in inline mode as well?&amp;nbsp; This obviously changes the L1/L2 design if we have to physically force the traffic through the SourceFire module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second question I had was how does things work with SourceFire and multiple contexts?&amp;nbsp; It appears multiple contexts are supported, however is it possible to define different SourceFire policies depending on which context we are dealing with?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Jul 2015 17:11:18 GMT</pubDate>
    <dc:creator>m.yost</dc:creator>
    <dc:date>2015-07-09T17:11:18Z</dc:date>
    <item>
      <title>ASA 5585-X with SourceFire</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585-x-with-sourcefire/m-p/3487405#M193942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking at a 5585-X with SourceFire but am unsure if traffic flow is similar to the software based SourceFire based on the lower end ASA's.&amp;nbsp; In the lowend ASA's, the traffic is passed from ASA to Sourcefire and back to ASA through the backplane.&amp;nbsp; With the 5585-X solution, the SourceFire card has physical interfaces on it.&amp;nbsp; Are the physical interfaces only used with tap/mirror traffic when in IDS mode?&amp;nbsp; Or do you have to direct traffic through them in inline mode as well?&amp;nbsp; This obviously changes the L1/L2 design if we have to physically force the traffic through the SourceFire module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second question I had was how does things work with SourceFire and multiple contexts?&amp;nbsp; It appears multiple contexts are supported, however is it possible to define different SourceFire policies depending on which context we are dealing with?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jul 2015 17:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585-x-with-sourcefire/m-p/3487405#M193942</guid>
      <dc:creator>m.yost</dc:creator>
      <dc:date>2015-07-09T17:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5585-X with SourceFire</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585-x-with-sourcefire/m-p/3487406#M193943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet flow is the same for midrange and the 5585-X.&amp;nbsp;&amp;nbsp; The interfaces on the FirePOWER card act like ordinary ASA interfaces.&amp;nbsp; Traffic entering them is sent through the backplane to the ASA module for ingress processing and then passed back to the FirePOWER module (if the MPF indicates that it should).&amp;nbsp;&amp;nbsp; The only exception is the management interface.&amp;nbsp; Unlike the midrange firewalls, on the 5585-X the FirePOWER module and ASA module have separate management interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASA is in multi-context mode, there is a single instance of FirePOWER.&amp;nbsp;&amp;nbsp; Each context decides what traffic to forward the FirePOWER.&amp;nbsp;&amp;nbsp;&amp;nbsp; There is a single access policy that applies to all contexts, but you can use security zones to apply specific rules to specific contexts.&amp;nbsp; Also, events can be filtered based on security context.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Jul 2015 16:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585-x-with-sourcefire/m-p/3487406#M193943</guid>
      <dc:creator>erkostla</dc:creator>
      <dc:date>2015-07-13T16:49:16Z</dc:date>
    </item>
  </channel>
</rss>

