<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC verify Sip is not inspected in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3908978#M925367</link>
    <description>&lt;P&gt;In a Firepower service module managed by&amp;nbsp;FMC you can do this via Flexconfig. Create a Flexconfig object and enter these commands:&lt;/P&gt;
&lt;PRE&gt;policy-map global_policy
class inspection_default
no inspect sip&lt;/PRE&gt;
&lt;P&gt;Then bind this Flex object to Flex Policy and deploy.&lt;/P&gt;
&lt;P&gt;If you are using ASDM management, you cannot change this inspection since Flexconfig is not supported with ASDM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are running FTD, this is one of the few things that can be changed via cli:&lt;/P&gt;
&lt;PRE&gt;&amp;gt; show running-config | begin global_policy
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
  inspect icmp error 
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
  set connection decrement-ttl
!
service-policy global_policy global
service-policy policy_map_Inside-Lab interface Inside-Lab
prompt hostname context 
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
snort preserve-connection
Cryptochecksum:aa16121921d798a166b3f53cb302b677
: end
&amp;gt; 
&amp;gt; &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;configure inspection sip disable&lt;/STRONG&gt;&lt;/FONT&gt;
Building configuration...
Cryptochecksum: 077fc587 091d47b6 e43a3da9 567421df 

16047 bytes copied in 0.70 secs
[OK]
&amp;gt; show running-config | begin global_policy
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
  inspect icmp error 
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
  set connection decrement-ttl
!
service-policy global_policy global
service-policy policy_map_Inside-Lab interface Inside-Lab
prompt hostname context 
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
snort preserve-connection
Cryptochecksum:077fc587091d47b6e43a3da9567421df
: end
&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Aug 2019 04:08:30 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-08-16T04:08:30Z</dc:date>
    <item>
      <title>FMC verify Sip is not inspected</title>
      <link>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3908860#M925366</link>
      <description>&lt;P&gt;I'm running FMC 6.2.3.14 on 18 ASA devices.&lt;/P&gt;&lt;P&gt;I have disabled SIP inspection on my ASA devices, but how do I do this in the firepower policies?&lt;/P&gt;&lt;P&gt;I'm assuming the sfr policy on the asa routes all traffic through the firepower module, which means that firepower is looking at SIP.&amp;nbsp; this is what i would like to disable.&lt;/P&gt;&lt;P&gt;any help would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here's the relevant part of my running config from my ASA if needed&lt;/P&gt;&lt;P&gt;access-list sfr_redirect extended permit ip any any&lt;/P&gt;&lt;P&gt;class-map sfr&lt;BR /&gt;match access-list sfr_redirect&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map netflow&lt;BR /&gt;match any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect icmp&lt;BR /&gt;class sfr&lt;BR /&gt;sfr fail-open&lt;BR /&gt;class netflow&lt;BR /&gt;flow-export event-type all destination 192.168.x.x&lt;BR /&gt;class class-default&lt;BR /&gt;set connection decrement-ttl&lt;BR /&gt;user-statistics accounting&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3908860#M925366</guid>
      <dc:creator>Lee Dress</dc:creator>
      <dc:date>2020-02-21T17:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: FMC verify Sip is not inspected</title>
      <link>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3908978#M925367</link>
      <description>&lt;P&gt;In a Firepower service module managed by&amp;nbsp;FMC you can do this via Flexconfig. Create a Flexconfig object and enter these commands:&lt;/P&gt;
&lt;PRE&gt;policy-map global_policy
class inspection_default
no inspect sip&lt;/PRE&gt;
&lt;P&gt;Then bind this Flex object to Flex Policy and deploy.&lt;/P&gt;
&lt;P&gt;If you are using ASDM management, you cannot change this inspection since Flexconfig is not supported with ASDM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are running FTD, this is one of the few things that can be changed via cli:&lt;/P&gt;
&lt;PRE&gt;&amp;gt; show running-config | begin global_policy
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
  inspect icmp error 
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
  set connection decrement-ttl
!
service-policy global_policy global
service-policy policy_map_Inside-Lab interface Inside-Lab
prompt hostname context 
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
snort preserve-connection
Cryptochecksum:aa16121921d798a166b3f53cb302b677
: end
&amp;gt; 
&amp;gt; &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;configure inspection sip disable&lt;/STRONG&gt;&lt;/FONT&gt;
Building configuration...
Cryptochecksum: 077fc587 091d47b6 e43a3da9 567421df 

16047 bytes copied in 0.70 secs
[OK]
&amp;gt; show running-config | begin global_policy
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
  inspect icmp error 
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
  set connection decrement-ttl
!
service-policy global_policy global
service-policy policy_map_Inside-Lab interface Inside-Lab
prompt hostname context 
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
snort preserve-connection
Cryptochecksum:077fc587091d47b6e43a3da9567421df
: end
&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 04:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3908978#M925367</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-08-16T04:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: FMC verify Sip is not inspected</title>
      <link>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3909155#M925368</link>
      <description>&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;I'm running FMC.&lt;/P&gt;&lt;P&gt;I added a no_sip object and added the commands you mentioned.&lt;/P&gt;&lt;P&gt;then I created a disable sip Policy and appended the object to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I click on policy assignments, none of my firepower devices are listed. so I can't depoly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did I miss a step?&amp;nbsp; I haven't used flex config at all before so maybe I'm missing something here.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 12:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3909155#M925368</guid>
      <dc:creator>Lee Dress</dc:creator>
      <dc:date>2019-08-16T12:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: FMC verify Sip is not inspected</title>
      <link>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3909186#M925369</link>
      <description>&lt;P&gt;Ah - sorry I was writing the procedure for an FTD device. Flexconfigs do not apply to ASA Firepower service modules (sfr). That's why you don't see them as an available policy target.&lt;/P&gt;
&lt;P&gt;The sfr module should not be inspecting SIP traffic for protocol conformance as that function would be handled (or bypassed as it would be in your case) by the associated ASA software.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 13:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3909186#M925369</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-08-16T13:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: FMC verify Sip is not inspected</title>
      <link>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3909205#M925370</link>
      <description>&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just needed to verify that SIP was not inspected.&lt;/P&gt;&lt;P&gt;since the ASA says no inspect sip, I just wanted to make sure that the firepower module was following suit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your help again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 14:21:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-verify-sip-is-not-inspected/m-p/3909205#M925370</guid>
      <dc:creator>Lee Dress</dc:creator>
      <dc:date>2019-08-16T14:21:26Z</dc:date>
    </item>
  </channel>
</rss>

