<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC Object Management / ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3407997#M925807</link>
    <description>&lt;P&gt;Hi Yogesh,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jun 2018 13:54:32 GMT</pubDate>
    <dc:creator>GRANT3779</dc:creator>
    <dc:date>2018-06-29T13:54:32Z</dc:date>
    <item>
      <title>FMC Object Management / ACL</title>
      <link>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3407957#M925805</link>
      <description>&lt;P&gt;Within the FMC where exactly do the ACLs under Object Management fit in with deploying configs to registered devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For FTD devices I was under the impressions Prefilter and ACP rules took&amp;nbsp;over the role of the traditional ACL on an ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are the ACLs under Object Management meant for the devices running traditional ASA with FirePOWER services? If so, how exactly are they applied to the ASA Interfaces via FMC?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3407957#M925805</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2020-02-21T15:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Object Management / ACL</title>
      <link>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3407983#M925806</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where do you see the ACL in object management?&lt;/P&gt;
&lt;P&gt;FMC deploys the policy same way on FTD as it does not firepower (from top overview)&lt;/P&gt;
&lt;P&gt;Its all about access control policy with objects created which can be used in multiple policies.&lt;/P&gt;
&lt;P&gt;There is no ACL in object management as far as I see. Can you give screenshot of what do you mean?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 13:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3407983#M925806</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2018-06-29T13:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Object Management / ACL</title>
      <link>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3407997#M925807</link>
      <description>&lt;P&gt;Hi Yogesh,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 13:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3407997#M925807</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2018-06-29T13:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Object Management / ACL</title>
      <link>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3408000#M925808</link>
      <description>&lt;P&gt;Split-tunneling and VPN Filters for Anyconnect are configured as ACL's on the Firepower, same as how they are on the ASA. This is where you would configure them. If you have configured them from the VPN section, they would show up here.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 13:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3408000#M925808</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-06-29T13:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Object Management / ACL</title>
      <link>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3408002#M925809</link>
      <description>&lt;P&gt;ACL objects are used for Route-maps as well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 14:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3408002#M925809</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-06-29T14:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Object Management / ACL</title>
      <link>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3834628#M925810</link>
      <description>&lt;P&gt;Hey Rahul,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is using the standard and Extended ACL's really the only way to control anyconnect clients? I am using a couple of 2110's for VPN clients only as a recent SD-WAN implementation has freed them up and I would rather use these than older ASA5520's. I have one each at 2 sites and managing them with the FMC. The outside interface has a static external IP and the inside is attached to the core on a separate VLAN for the device. I am using separate address pools on the FTD boxes for different groups of contractor, employees from different departments ect. Is there anyway to apply all the features of ACP and prefilter to the VPN clients?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 00:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-object-management-acl/m-p/3834628#M925810</guid>
      <dc:creator>Scott Reedman</dc:creator>
      <dc:date>2019-04-09T00:26:07Z</dc:date>
    </item>
  </channel>
</rss>

