<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower 1010 Stateful Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3921731#M31536</link>
    <description>&lt;P&gt;I recently purchased 3 of the new Firepower 1010. I an using the device up using the on box management, Firepower Device Manager (FDM), to configure the firewalls. I currently don't have enough FMC licenses to connect the firewalls to FMC at this time. With a Cisco ASA I would simply be able to set security levels on each interface to create a stateful firewall. I would like to accomplish the same thing on the Firepower 1010. Does the Firepower 1010 have a feature that would allow me to configure a stateful firewall using FDM? Honestly FDM seems pretty bare bones and I'm not super impressed with it...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated!&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Sep 2019 12:30:18 GMT</pubDate>
    <dc:creator>brandonbittinger</dc:creator>
    <dc:date>2019-09-10T12:30:18Z</dc:date>
    <item>
      <title>Firepower 1010 Stateful Firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3921731#M31536</link>
      <description>&lt;P&gt;I recently purchased 3 of the new Firepower 1010. I an using the device up using the on box management, Firepower Device Manager (FDM), to configure the firewalls. I currently don't have enough FMC licenses to connect the firewalls to FMC at this time. With a Cisco ASA I would simply be able to set security levels on each interface to create a stateful firewall. I would like to accomplish the same thing on the Firepower 1010. Does the Firepower 1010 have a feature that would allow me to configure a stateful firewall using FDM? Honestly FDM seems pretty bare bones and I'm not super impressed with it...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 12:30:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3921731#M31536</guid>
      <dc:creator>brandonbittinger</dc:creator>
      <dc:date>2019-09-10T12:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Stateful Firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3921764#M31559</link>
      <description>&lt;P&gt;yes you can use FDM to configure,&amp;nbsp; below guide help you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/fdm/fptd-fdm-config-guide-640/fptd-fdm-interfaces.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/640/fdm/fptd-fdm-config-guide-640/fptd-fdm-interfaces.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp1010/firepower-1010-gsg.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp1010/firepower-1010-gsg.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 13:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3921764#M31559</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-10T13:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Stateful Firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3922577#M31576</link>
      <description>&lt;P&gt;So if I create an inside and an outside security zone and apply them to the appropriate interfaces all I should need to do is create an Access Control rule to allow inside to outside and it the 1010 should perform state tracking?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I factory reset the device and it looks like that is all it did by default.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 14:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3922577#M31576</guid>
      <dc:creator>brandonbittinger</dc:creator>
      <dc:date>2019-09-11T14:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Stateful Firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3922589#M31593</link>
      <description>If you are using Zones like you describe then your ACP rule entry would be based on Zones via Zones tab.&lt;BR /&gt;From Inside Zone to Outside Zone "Allow".&lt;BR /&gt;It is stateful and return traffic will be allowed back.</description>
      <pubDate>Wed, 11 Sep 2019 15:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3922589#M31593</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-09-11T15:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Stateful Firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3922972#M31604</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;there's already a default NAT and access control rules configured in FTD for initial traffic to flow.&lt;/P&gt;&lt;P&gt;you'll also need to further tweak the device via FDM.&lt;/P&gt;&lt;P&gt;see helpful link:&lt;/P&gt;&lt;P&gt;&lt;A href="http://ccnpsecuritywannabe.blogspot.com/2019/09/configuring-ftd-623-via-firepower.html" target="_blank" rel="noopener"&gt;http://ccnpsecuritywannabe.blogspot.com/2019/09/configuring-ftd-623-via-firepower.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2019 03:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3922972#M31604</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-09-12T03:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Stateful Firewall</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3923535#M31615</link>
      <description>In this case there is no NAT being used. This Firewall terminates isolated PVLANs and there is no NAT.&lt;BR /&gt;&lt;BR /&gt;I realized that I actually have a miconfiguration on the downstream switch that was the issue. The stateful firewall was working as it was supposed to after I resolved the downstream issue. I had the switchport setup to be a trunk with a list of allowed VLANs, evidently I forgot the switchport mode trunk command... I appreciate all of the help however!</description>
      <pubDate>Thu, 12 Sep 2019 20:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-stateful-firewall/m-p/3923535#M31615</guid>
      <dc:creator>brandonbittinger</dc:creator>
      <dc:date>2019-09-12T20:12:37Z</dc:date>
    </item>
  </channel>
</rss>

