<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What ever you can get out of in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192048#M43424</link>
    <description>&lt;P&gt;Hi, We will also doing this setup by using FTD 5508-X.&lt;/P&gt;&lt;P&gt;Would still be possible for a passive deployment using FTD5508-X?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your response.&lt;/P&gt;</description>
    <pubDate>Sun, 01 Oct 2017 00:27:09 GMT</pubDate>
    <dc:creator>Roy Olarte</dc:creator>
    <dc:date>2017-10-01T00:27:09Z</dc:date>
    <item>
      <title>Cisco ASA Firepower - Monitor-Only Mode Deployment Question</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964686#M43409</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We will be doing a POV for ASA Firepower services(ASA 5506X) and came across a question about deployment. Our goal is not to touch/impact the network and introduce the ASA Firepower Services into the production with monitor-only mode to analyze traffic. We knew that the ASA needs to be in transparent for this.&lt;/P&gt;
&lt;P&gt;My question is, Can we just change ASA mode to transparent, assign a interface to Firepower traffic forward, nothing else on ASA as we want to use only firepower services?&lt;/P&gt;
&lt;P&gt;My core switch has connection to Internet router and do not want to put ASA in the path using transparent. Just SPAN from switch to ASA Firepower? Can this be done? Do not want to use ASA at all...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ravi&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964686#M43409</guid>
      <dc:creator>RaviKumar Nadendla</dc:creator>
      <dc:date>2019-03-10T13:43:21Z</dc:date>
    </item>
    <item>
      <title>This is indeed doable.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964687#M43411</link>
      <description>&lt;P&gt;This is indeed doable.&lt;/P&gt;
&lt;P&gt;Page 16-21 in this document:&amp;nbsp;http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/modules-sfr.pdf&lt;/P&gt;
&lt;P&gt;The ASA must be configured in Single context and transparent mode.&lt;/P&gt;
&lt;P&gt;interface gigabitethernet 0/5 &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;traffic-forward sfr monitor-only &amp;nbsp;&lt;BR /&gt;&amp;nbsp;no shutdown&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2016 11:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964687#M43411</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-11-28T11:36:33Z</dc:date>
    </item>
    <item>
      <title>Thanks. Thought of same. I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964688#M43412</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;Is this traffic-forward interface separate from firepower management 1/1 or can I use M1/1 as traffic-forward interface?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 12:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964688#M43412</guid>
      <dc:creator>RaviKumar Nadendla</dc:creator>
      <dc:date>2016-11-29T12:33:44Z</dc:date>
    </item>
    <item>
      <title>You can not use the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964689#M43414</link>
      <description>&lt;P&gt;You can not use the Management port as the listening port.&lt;/P&gt;
&lt;P&gt;The management port is only used for managing the ASA and the Firepower module. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 10:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964689#M43414</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-12-02T10:39:38Z</dc:date>
    </item>
    <item>
      <title>Thanks..Understand now..</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964690#M43417</link>
      <description>&lt;P&gt;Thanks..Understand now..&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My purpose was solved. Now we are success with Firepower services without configuring anything else in&amp;nbsp;ASA in the network.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 14:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964690#M43417</guid>
      <dc:creator>RaviKumar Nadendla</dc:creator>
      <dc:date>2016-12-02T14:27:11Z</dc:date>
    </item>
    <item>
      <title>So a stand-alone ASA-X could,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964691#M43419</link>
      <description>&lt;P&gt;So a stand-alone&amp;nbsp;ASA-X could, in "traffic-forward sfr monitor-only"-mode, provide the visibility for Users/applications/traffic rates/URLs, that we do not get from the classic ASA?&lt;/P&gt;
&lt;P&gt;Can&amp;nbsp;the Firepower module forward all that info by Syslog to my external SIEM/Cloud App analysis system?&lt;/P&gt;
&lt;P&gt;How about performance numbers for this passive setup?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 13:27:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964691#M43419</guid>
      <dc:creator>Thomas Winther</dc:creator>
      <dc:date>2016-12-28T13:27:37Z</dc:date>
    </item>
    <item>
      <title>What ever you can get out of</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964692#M43421</link>
      <description>&lt;P&gt;What ever you can get out of your standard Firepower installation, you can also get out of this passive listening setup with a standalone ASA connected to either a FMC or on-board managed while sending all the syslog&amp;nbsp;you want. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Performance numbers depends on the model of the ASA. You are welcome to call me.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 13:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/2964692#M43421</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2016-12-28T13:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: What ever you can get out of</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192048#M43424</link>
      <description>&lt;P&gt;Hi, We will also doing this setup by using FTD 5508-X.&lt;/P&gt;&lt;P&gt;Would still be possible for a passive deployment using FTD5508-X?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your response.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Oct 2017 00:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192048#M43424</guid>
      <dc:creator>Roy Olarte</dc:creator>
      <dc:date>2017-10-01T00:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: What ever you can get out of</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192084#M43425</link>
      <description>Sure - either an ASA with ASA software and a Firepower service module or an ASA (or Firepower) appliance running FTD can work in such a scenario.</description>
      <pubDate>Sun, 01 Oct 2017 08:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192084#M43425</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-01T08:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: What ever you can get out of</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192098#M43427</link>
      <description>&lt;P&gt;But it is not available for FDM only right?&lt;/P&gt;&lt;P&gt;By the way, for this passive interface deployment, does it also mean one interface is enough to monitor the traffic?&lt;/P&gt;&lt;P&gt;TIA!&lt;/P&gt;</description>
      <pubDate>Sun, 01 Oct 2017 11:46:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192098#M43427</guid>
      <dc:creator>Roy Olarte</dc:creator>
      <dc:date>2017-10-01T11:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: What ever you can get out of</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192128#M43428</link>
      <description>&lt;P&gt;That's correct, you cannot configure passive mode interfaces using FDM. See the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you use Firepower Device Manager to configure the device, there are several limitations to interface configuration. If you need any of the following features, you must use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firepower Management Center&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to configure the device.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A name="concept_6940083A55184D009B6406EF167C9DD4__li_CDB7D878EA164E6D9C5F8D8DF5A1FFCB" target="_blank"&gt;&lt;/A&gt;
&lt;P&gt;Routed firewall mode only is supported. You cannot configure transparent firewall mode interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A name="concept_6940083A55184D009B6406EF167C9DD4__li_6D5075C84D744A889859A2567DE1FE4E" target="_blank"&gt;&lt;/A&gt;
&lt;P&gt;IPS-only mode is not supported. You cannot configure interfaces to be inline, inline tap, passive, or ERSPAN for IPS-only processing. IPS-only mode interfaces bypass many firewall checks and only support IPS security policy. In comparison, Firewall mode interfaces subject traffic to firewall functions such as maintaining flows, tracking flow states at both IP and TCP layers, IP defragmentation, and TCP normalization. You can also optionally configure IPS functions for this firewall mode traffic according to your security policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A name="concept_6940083A55184D009B6406EF167C9DD4__li_3F76D584517C4473BEE8D3E0710E780B" target="_blank"&gt;&lt;/A&gt;
&lt;P&gt;You cannot configure EtherChannel or redundant interfaces.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;(plus several more limitations)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/fdm/fptd-fdm-config-guide-620/fptd-fdm-interfaces.html#concept_6940083A55184D009B6406EF167C9DD4" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/fdm/fptd-fdm-config-guide-620/fptd-fdm-interfaces.html#concept_6940083A55184D009B6406EF167C9DD4&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A single interface is indeed enough to monitor the traffic.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Oct 2017 14:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3192128#M43428</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-01T14:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Firepower - Monitor-Only Mode Deployment Question</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3752439#M43429</link>
      <description>&lt;P&gt;Hi Ravi,&lt;/P&gt;
&lt;P&gt;As far as I understand,in passive monitor-only mode we won't be creating access control policies.Then how do we see recommended actions from FMC.Will it be seen under Threats/Intrusion events?&lt;/P&gt;</description>
      <pubDate>Sun, 25 Nov 2018 20:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-monitor-only-mode-deployment-question/m-p/3752439#M43429</guid>
      <dc:creator>sreejith_r</dc:creator>
      <dc:date>2018-11-25T20:09:22Z</dc:date>
    </item>
  </channel>
</rss>

