<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Turning off SFR on a single interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015549#M30291</link>
    <description>&lt;P&gt;is there a specific reason for that you want to turn off the sfr inspection on the interface? I am not aware if you can do on the interface however there is another way you can do with access-list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;class-map SFR-CLASS&lt;BR /&gt;match access-list SFR&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;class SFR-CLASS&lt;BR /&gt;sfr fail-open!&lt;BR /&gt;access-list SFR extended deny 192.168.10.0 255.255.255.0 &lt;STRONG&gt;(let say,this is the interface you want to exempt from inspection)&lt;/STRONG&gt;&lt;BR /&gt;access-list SFR extended permit ip any any&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jan 2020 18:12:26 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2020-01-21T18:12:26Z</dc:date>
    <item>
      <title>Turning off SFR on a single interface</title>
      <link>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015534#M30279</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to turn off SFR on a single interface of an ASA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 17:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015534#M30279</guid>
      <dc:creator>Greg Biettler</dc:creator>
      <dc:date>2020-01-21T17:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Turning off SFR on a single interface</title>
      <link>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015549#M30291</link>
      <description>&lt;P&gt;is there a specific reason for that you want to turn off the sfr inspection on the interface? I am not aware if you can do on the interface however there is another way you can do with access-list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;class-map SFR-CLASS&lt;BR /&gt;match access-list SFR&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;class SFR-CLASS&lt;BR /&gt;sfr fail-open!&lt;BR /&gt;access-list SFR extended deny 192.168.10.0 255.255.255.0 &lt;STRONG&gt;(let say,this is the interface you want to exempt from inspection)&lt;/STRONG&gt;&lt;BR /&gt;access-list SFR extended permit ip any any&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 18:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015549#M30291</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-21T18:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Turning off SFR on a single interface</title>
      <link>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015560#M30309</link>
      <description>The specific reason that we want to turn off sfr inspection on our Public interface is we're having issues with a VPN tunnel running through that interface.&lt;BR /&gt;We currently have issues with a vendor that want's to set up VPN L2L tunnel through our Public outgoing interface. The tunnel comes up &amp;amp; it passes windows traffic (they can get to their window shares) but it doesn't pass port 80 &amp;amp; 443 traffic.&lt;BR /&gt;The thought process is too turn the SFR module on our Public interface to see if deep packet inspection is causing this issue.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 21 Jan 2020 18:23:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015560#M30309</guid>
      <dc:creator>Greg Biettler</dc:creator>
      <dc:date>2020-01-21T18:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: Turning off SFR on a single interface</title>
      <link>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015577#M30325</link>
      <description>&lt;P&gt;oh i see make sense. have to check the logs on the firepower if its blocking the traffic. what are the intrusion policyyou using in your network. ideally you must use as &lt;SPAN class="st"&gt;&lt;EM&gt;Balanced Security&lt;/EM&gt; and &lt;EM&gt;Connectivity&lt;/EM&gt;&lt;/SPAN&gt;. you can use the access-list as i have mentioned earlier. or the other way is in firepower console ( are you using FMC or ASDM to manage your box) in both case go into access control policy and the address you think are creating problem. create a new acl in fmc/asdm of firepower and put them as &lt;STRONG&gt;Trust. &lt;/STRONG&gt;prior to make them trust make sure they are define in discovery policy.&lt;/P&gt;
&lt;P&gt;having said that you have two option either do as access-list on the ASA code (as mentioned previous) or do it in Firepower setting (FMC or ASDM Firepower GUI).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 18:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turning-off-sfr-on-a-single-interface/m-p/4015577#M30325</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-21T18:48:36Z</dc:date>
    </item>
  </channel>
</rss>

