<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New to Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892379#M921712</link>
    <description>&lt;P&gt;The ASA service policy pushes traffic to the internal Firepower module. The module interacts with the FMC to both receive configuration and send events.&lt;/P&gt;
&lt;P&gt;In an FMC, the policies primarily are under an Access Control policy (ACP). The most common is the ACP itself but can also include Intrusion, Network Discovery, SSL and File polices as well as other elements like Security Intelligence and QoS.&lt;/P&gt;
&lt;P&gt;There are several books as well as numerous free Cisco Live presentations that cover these in much more detail if you're interested in learning more.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jul 2019 03:08:58 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-07-18T03:08:58Z</dc:date>
    <item>
      <title>New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891683#M921705</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've inherited a couple of Cisco ASAs in active/passive mode that have Firepower installed.&amp;nbsp; It seems there is also a VM appliance that I have access too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone provide some handy commands to check how it's configure and what is being utilised?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I can't see what interfaces are being monitored.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anything to give me a head start would be great then I can do some proper reading.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891683#M921705</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2020-02-21T17:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891748#M921706</link>
      <description>&lt;P&gt;If FirePower is already configured you can use ASDM and it will scan Firepower module also. There you can access configuration -&amp;gt; ASA FirePower Module -&amp;gt; Device -&amp;gt; Interfaces. There you can see what interfaces are being placed in Zones and at Access Policy Rules you can see what Zones are placed in Source and Destination. At ASA configuration you can verify Firewall -&amp;gt; Inspect Policy -&amp;gt; global-map (or any other name) -&amp;gt; Check what traffic is passed to firepower for inspection and if it is monitor only or actualy inspecting the traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 09:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891748#M921706</guid>
      <dc:creator>curdubanbogdan</dc:creator>
      <dc:date>2019-07-17T09:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891784#M921707</link>
      <description>&lt;P&gt;All I can find in the ASDM is under Configurations &amp;gt; Firewall &amp;gt; Service Policy Rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here there is a policy called global-class with a tab called 'ASA FirePOWER Inspection' which is enabled and permits traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't see any:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;configuration -&amp;gt; ASA FirePower Module -&amp;gt; Device -&amp;gt; Interfaces&amp;nbsp; or Firewall -&amp;gt; Inspect Policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I do see the ASA FirePOWER Status tab under home and shows as 'Up' for status and application status&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any ideas?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 10:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891784#M921707</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-17T10:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891860#M921708</link>
      <description>&lt;P&gt;From the ASA cli "show module sfr detail". If it is managed by the Firepower Management center (FMC, formerly known as Defense center or DC) that will be indicated in the output. If the module has been setup, similar info will show up on the Firepower section of the ASDM main page (down at the bottom center).&lt;/P&gt;
&lt;P&gt;If the module is FMC-managed then all policies and settings are done on that server.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 12:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891860#M921708</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-17T12:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891949#M921709</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes there is a FMC server, but I have no idea how the ASA servers data to it or how the ASA chooses what interface to monitor, all very confusing :).&amp;nbsp; Seems there is no FirePower section on the ASDM apart from the tab on the home screen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what I see:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;en/act# show module sfr detail&lt;BR /&gt;Getting details from the Service Module, please wait...&lt;/P&gt;&lt;P&gt;Card Type: FirePOWER Services Software Module&lt;BR /&gt;Model: ASA5516&lt;BR /&gt;Hardware version: N/A&lt;BR /&gt;Serial Number: JADx&lt;BR /&gt;Firmware version: N/A&lt;BR /&gt;Software version: 6.2.2.1-73&lt;BR /&gt;MAC Address Range: 005d.xe.x7 to 005d.xe.x7&lt;BR /&gt;App. name: ASA FirePOWER&lt;BR /&gt;App. Status: Up&lt;BR /&gt;App. Status Desc: Normal Operation&lt;BR /&gt;App. version: 6.2.2.1-73&lt;BR /&gt;Data Plane Status: Up&lt;BR /&gt;Console session: Ready&lt;BR /&gt;Status: Up&lt;BR /&gt;DC addr: 172.x.x.5&lt;BR /&gt;Mgmt IP addr: 172.x.x.7&lt;BR /&gt;Mgmt Network mask: 255.255.255.0&lt;BR /&gt;Mgmt Gateway: 172.x.x.254&lt;BR /&gt;Mgmt web ports: 443&lt;BR /&gt;Mgmt TLS enabled: true&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 14:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891949#M921709</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-17T14:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891977#M921710</link>
      <description>&lt;P&gt;Correct. When the Firepower service module is managed by FMC ("&lt;SPAN&gt;DC addr: 172.x.x.5&lt;/SPAN&gt;") the the management of the module is not done at all via ASDM not can you see anything about it other than it's presence, software version, the fact that it is up and remotely managed.&lt;/P&gt;
&lt;P&gt;The module inspects traffic that is sent to it via the ASA backplane according to the class-map/policy-map/service policy construct on the ASA config. Typically we send all traffic to the module (maybe excepting some that we don't want to inspect like for instance encrypted traffic that passes through the ASA). How the module inspects and what it does is completely configured on and reported to the FMC.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 14:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3891977#M921710</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-17T14:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892067#M921711</link>
      <description>Ah I see, so the ASA will have a policy somewhere just pushing all the traffic to the FMC? Then the FMC has policies to monitor what interfaces?&lt;BR /&gt;&lt;BR /&gt;Would you be kind enough to point me in the right direction to where there policies would be on the FMC?&lt;BR /&gt;&lt;BR /&gt;I will check on the ASA at that global service policy as it must list the FMC IP somewhere?&lt;BR /&gt;&lt;BR /&gt;Thanks again!&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Jul 2019 16:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892067#M921711</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-17T16:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892379#M921712</link>
      <description>&lt;P&gt;The ASA service policy pushes traffic to the internal Firepower module. The module interacts with the FMC to both receive configuration and send events.&lt;/P&gt;
&lt;P&gt;In an FMC, the policies primarily are under an Access Control policy (ACP). The most common is the ACP itself but can also include Intrusion, Network Discovery, SSL and File polices as well as other elements like Security Intelligence and QoS.&lt;/P&gt;
&lt;P&gt;There are several books as well as numerous free Cisco Live presentations that cover these in much more detail if you're interested in learning more.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 03:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892379#M921712</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-18T03:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892450#M921713</link>
      <description>Thanks. I will certainly do that.&lt;BR /&gt;&lt;BR /&gt;I just need to first enable or remove an interface and wondered how I do that in FMC?&lt;BR /&gt;&lt;BR /&gt;Kind regards&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Jul 2019 05:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892450#M921713</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-18T05:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892745#M921714</link>
      <description>&lt;P&gt;All interface configuration is done from the ASA. FMC only configures policies and related settings for the Firepower service module.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 13:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892745#M921714</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-18T13:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892752#M921715</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Where on the ASA is this configured? We have many interfaces and I need to see which ones are being monitored.&lt;BR /&gt;&lt;BR /&gt;I can't seem to locate this on the ASDM.</description>
      <pubDate>Thu, 18 Jul 2019 13:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892752#M921715</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-18T13:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892888#M921716</link>
      <description>&lt;P&gt;A Firepower service module (or, by extension, FMC) doesn't monitor ASA interfaces per se. It monitors traffic sent to is by the ASA class-map which is referenced in a policy-map and applied via a service policy (usually global). The class-map can say monitor all traffic or only traffic that matches an ACL. Whatever it scoops up is sent to the service module - irrespective of ASA interfaces.&lt;/P&gt;
&lt;P&gt;Perhaps this flowchart will help explain it:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASA OOO.PNG" style="width: 945px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41150iBB3FA4B94C8A519B/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA OOO.PNG" alt="ASA OOO.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 15:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3892888#M921716</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-18T15:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3893609#M921717</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;there are two ways to manage the ASA with FirePower (FP): locally via ASDM or via a central FMC.&lt;/P&gt;&lt;P&gt;do you want to learn how your current ASA talks to FMC? or are you removing the active/passive pair from FMC and do your own lab?&lt;/P&gt;&lt;P&gt;try to locate for the ASA policy-map and/or firepower ACL (if any).&lt;/P&gt;&lt;P&gt;you can refer to this helpful link to learn about ASA FP, ASDM and FMC:&lt;/P&gt;&lt;P&gt;&lt;A href="http://wannabecybersecurity.blogspot.com/2019/01/cisco-asa-firepower-traffic-redirection.html" target="_blank" rel="noopener"&gt;http://wannabecybersecurity.blogspot.com/2019/01/cisco-asa-firepower-traffic-redirection.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2019 14:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3893609#M921717</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-07-19T14:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3893657#M921718</link>
      <description>I’m trying to work out how the ASA talks to the FMC and how I can select what interfaces it’s monitoring.&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Jul 2019 15:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3893657#M921718</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-19T15:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3893993#M921719</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;the FP module on the ASA talks to FMC via the global policy map (and ACL) traffic redirection and registering the managed device/sensor (ASA FP) to the FMC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you configure the security zones which the ASA interfaces are associated and then apply the FMC access control policy (ACP).&lt;/P&gt;&lt;P&gt;see helpful link:&lt;/P&gt;&lt;P&gt;&lt;A href="http://wannabecybersecurity.blogspot.com/2019/06/configuring-cisco-fmc-objects-and.html" target="_blank" rel="noopener"&gt;http://wannabecybersecurity.blogspot.com/2019/06/configuring-cisco-fmc-objects-and.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 01:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3893993#M921719</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-07-20T01:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894055#M921720</link>
      <description>&lt;P&gt;So when the FirePOWER module is setup you are asked to point it to the FMC IP and that's it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did find this global policy which I guess is auto generated:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;en/act# session sfr con&lt;BR /&gt;Opening console session with module sfr.&lt;BR /&gt;Connected to module sfr. Escape character sequence is 'CTRL-^X'.&lt;/P&gt;&lt;P&gt;&amp;gt; show managers&lt;BR /&gt;Type : Manager&lt;BR /&gt;Host : 172.x.x.5&lt;BR /&gt;Registration : Completed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;System&amp;gt; show summary&lt;BR /&gt;-----------[ xxx-lh-sfr-02.xx.xx.local ]------------&lt;BR /&gt;Model : ASA5516 (72) Version 6.2.2.1 (Build 73)&lt;BR /&gt;UUID : 39c6acdc-1aae-11e8-b5d-8568d7f2&lt;BR /&gt;Rules update version : 2019-07-17-001-vrt&lt;BR /&gt;VDB version : 294&lt;BR /&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;------------------[ policy info ]-------------------&lt;BR /&gt;Access Control Policy : Cisco123-Default&lt;BR /&gt;Intrusion Policy : Balanced Security and Connectivity&lt;/P&gt;&lt;P&gt;--------------------[ outside ]---------------------&lt;BR /&gt;Physical Interface : GigabitEthernet1/1&lt;BR /&gt;Type : ASA&lt;BR /&gt;Security Zone : None&lt;BR /&gt;Status : Enabled&lt;BR /&gt;Load Balancing Mode : N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I'm assuming all traffic then is sent to the module and on the FMC I can choose what interface to monitor from there?&amp;nbsp; I can's see how I can select a new interface to monitor or deselect.&amp;nbsp; See below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41302i7056C45D559F8479/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC1.PNG" alt="FMC1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a policy of some sort:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41303iA036D11AFEAB6CE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC2.PNG" alt="FMC2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To me it's like this isn't even setup properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 10:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894055#M921720</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-20T10:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894074#M921721</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;your FMC has intrusion policy rule (IPS) configured. notice the yellow shield icon is enabled.&lt;/P&gt;&lt;P&gt;it seems like your FMC is not fully configured. notice there's a zero (0) count under logging (scroll icon).&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 11:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894074#M921721</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-07-20T11:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894076#M921722</link>
      <description>&lt;P&gt;You have not confirmed what is setup on the ASA with respect to what I mentioned earlier. i.e.:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;"&lt;SPAN&gt;The module inspects traffic that is sent to it via the ASA backplane according to the class-map/policy-map/service policy construct on the ASA config.&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;If the ASA isn't sending traffic then the module cannot inspect anything - no matter what is or is not configured in the FMC and deployed to the module with respect to policy.&lt;/P&gt;
&lt;P&gt;When we deploy an ASA with Firepower service module, it is very common that all of the access-lists and port forwarding etc. continues to be handled by the ASA config. That includes all interface configuration and everything you usually find in an ASA without any service module.&lt;/P&gt;
&lt;P&gt;The Firepower service module gives us the opportunity to further inspect the traffic for intrusion detection and prevention purposes - traffic which has already been allowed, NATted, will be routed etc. by the parent ASA. Those inspections are in the form of Snort rules, security intelligence checks (looking for IP and URL blacklists and whitelists for source or destination traffic), protocol conformance, file inspections (if you have the Malware license), URL policy enforcement (if you have the URL Filtering license) and so forth.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 11:34:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894076#M921722</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-20T11:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894121#M921723</link>
      <description>&lt;P&gt;Strange as I do get email alerts from time to say certain traffic has been dropped.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 14:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894121#M921723</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-20T14:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: New to Firepower</title>
      <link>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894124#M921724</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought the global policy listed above was what you required, can you let me know what commands should identify how this is setup and I will post back?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is strange I've been getting email alerts on dropped traffic (although it's stopped recently) and I can't on the FMC where this is configured.&amp;nbsp; I've been asked to add our guest network interface on the ASA to the FirePOWER inspection rules, but as you can see I've struggling to find this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 14:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-to-firepower/m-p/3894124#M921724</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-07-20T14:26:57Z</dc:date>
    </item>
  </channel>
</rss>

