<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Marvin, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708120#M44740</link>
    <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;int gi0/0&lt;/P&gt;
&lt;P&gt;firewall transparent&lt;BR /&gt;interface gigabitethernet0/0 &lt;BR /&gt;no nameif&lt;BR /&gt;traffic-forward sfr monitor-only&lt;/P&gt;
&lt;P&gt;no shutdown&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks Cameron&lt;/P&gt;</description>
    <pubDate>Tue, 02 Feb 2016 23:34:27 GMT</pubDate>
    <dc:creator>7maloney4</dc:creator>
    <dc:date>2016-02-02T23:34:27Z</dc:date>
    <item>
      <title>ASA 5585X Firepower hardware module in passive mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708112#M44714</link>
      <description>&lt;P&gt;We would like to connect a ASA 5585X Firepower hardware module to a switch span port to discover current live traffic on the production network.&lt;/P&gt;&lt;P&gt;However there is no traffic being captured using a service-policy.&lt;/P&gt;&lt;P&gt;The documentation I can find is about configuring software Firepower module, with a passive monitor-only interface to capture traffic from a switch span port. The configuration for 5585X Firepower hardware module in passive mode does not mention about switch span port.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118824-configure-firepower-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118824-configure-firepower-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Can 5585X Firewpower hardware module do the same as software module to capture traffic from a switch span port?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708112#M44714</guid>
      <dc:creator>y.lo</dc:creator>
      <dc:date>2019-03-10T13:25:38Z</dc:date>
    </item>
    <item>
      <title>To use a FirePOWER module</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708113#M44715</link>
      <description>&lt;P&gt;To use a FirePOWER module where the ASA is monitor-only off a span port, the ASA must first be in transparent mode. (The default mode is routed.)&lt;/P&gt;
&lt;P&gt;Note that switching to transparent mode will &lt;STRONG&gt;clear the configuration of the ASA!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;So, the following is required at a minimum (given int gi0/0 - otherwise substitute&amp;nbsp;whatever interface is connected to the span port):&lt;/P&gt;

&lt;PRE&gt;
ciscoasa(config)#firewall transparent
ciscoasa(config)# interface gigabitethernet0/0 
ciscoasa(config-if)# no nameif
ciscoasa(config-if)# traffic-forward sfr monitor-only
ciscoasa(config-if)# no shutdown&lt;/PRE&gt;</description>
      <pubDate>Mon, 03 Aug 2015 13:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708113#M44715</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-03T13:16:41Z</dc:date>
    </item>
    <item>
      <title>Thanks for your response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708114#M44716</link>
      <description>&lt;P&gt;Thanks for your response Marvin. However I think the information you provided are for FirePOWER software module.&lt;/P&gt;&lt;P&gt;There is no such command "traffic-forward sfr monitor-only" on any ASA 5585X interface, which runs 9.2.3.4.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the transparent mode, may I know how to switch to it?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 13:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708114#M44716</guid>
      <dc:creator>y.lo</dc:creator>
      <dc:date>2015-08-03T13:24:05Z</dc:date>
    </item>
    <item>
      <title>As noted in the command</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708115#M44719</link>
      <description>&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/T-Z/cmdref4/t2.html#pgfId-1614309"&gt;As noted in the command reference&lt;/A&gt;, transparent mode is a prerequisite for the command. So to setup the traffic-forward command used in span port configurations, the ASA must FIRST be in transparent mode.&lt;/P&gt;&lt;P&gt;The first command I listed does that (and clears your &lt;STRONG&gt;entire&lt;/STRONG&gt; pre-existing configuration - so make sure you are on console and the firewall isn't handling production traffic!).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 13:30:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708115#M44719</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-03T13:30:34Z</dc:date>
    </item>
    <item>
      <title>Thanks for the comment. I</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708116#M44723</link>
      <description>&lt;P&gt;Thanks for the comment. I will give it a try.&lt;/P&gt;
&lt;P&gt;In the document I quoted at the very beginning, it says that to configure passive mode, we should use in a service policy map&lt;/P&gt;

&lt;PRE style="font-size: 11px; overflow: auto; max-width: 650px; height: auto; color: rgb(0, 0, 0); line-height: normal;"&gt;
&lt;STRONG&gt;sfr fail-open&lt;/STRONG&gt; &lt;STRONG&gt;monitor-only&lt;/STRONG&gt;&lt;/PRE&gt;

&lt;P&gt;What is the purpose of this command?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 13:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708116#M44723</guid>
      <dc:creator>y.lo</dc:creator>
      <dc:date>2015-08-03T13:37:54Z</dc:date>
    </item>
    <item>
      <title>You can do it in a service</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708117#M44728</link>
      <description>&lt;P&gt;You can do it in a service policy map like they say. The difference is that also allows the other base ASA features to be configured an operating on the traffic and the FirePOWER module is the passive element. We would use that method when you had an existing routed ASA and only wanted to test the FirePOWER module features without affecting other traffic through the box.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you have a span port, the ASA by definition isn't needed for anything but passive monitoring.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2015 13:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708117#M44728</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-03T13:43:18Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708118#M44730</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;I have set up my asa with the commands above what I notice when I discover the Firepower sensor is that Firesight does not see the GI0/0 data interface. I am assuming that I can forward the spanned sensor data to firesight? Firesight 5.4.1 Firepower 5.4.05-24.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks Cameron&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 05:56:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708118#M44730</guid>
      <dc:creator>7maloney4</dc:creator>
      <dc:date>2016-02-02T05:56:45Z</dc:date>
    </item>
    <item>
      <title>@7maloney4,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708119#M44736</link>
      <description>&lt;P&gt;@7maloney4,&lt;/P&gt;
&lt;P&gt;Please share your configuration, specifically for interface Gi0/0.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 13:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708119#M44736</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-02T13:45:29Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708120#M44740</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;int gi0/0&lt;/P&gt;
&lt;P&gt;firewall transparent&lt;BR /&gt;interface gigabitethernet0/0 &lt;BR /&gt;no nameif&lt;BR /&gt;traffic-forward sfr monitor-only&lt;/P&gt;
&lt;P&gt;no shutdown&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks Cameron&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 23:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708120#M44740</guid>
      <dc:creator>7maloney4</dc:creator>
      <dc:date>2016-02-02T23:34:27Z</dc:date>
    </item>
    <item>
      <title>That looks right. FireSIGHT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708121#M44744</link>
      <description>&lt;P&gt;That looks right. FireSIGHT will not see the data interface and recognize it as part of a security zone in this use case - that's by design.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However your policies should still be effective - i.e., be able to trigger on the passively collected data.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2016 03:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708121#M44744</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-03T03:51:04Z</dc:date>
    </item>
    <item>
      <title>Ah ok when I didn't see the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708122#M44746</link>
      <description>&lt;P&gt;Ah ok when I didn't see the Interface I assumed there was an issue I will have a look for the data.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thankyou for your help Cameron.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2016 04:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5585x-firepower-hardware-module-in-passive-mode/m-p/2708122#M44746</guid>
      <dc:creator>7maloney4</dc:creator>
      <dc:date>2016-02-03T04:41:00Z</dc:date>
    </item>
  </channel>
</rss>

