<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ask the expert- Best practices on Cisco FirePOWER in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353758#M925933</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319784"&gt;@elizer man-on&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use user identity in your Access Control Policies (ACPs) which can include URL filtering conditions. One very good source for that identity is ISE. It is passive from the Firepower point of view so I believe it fits what you are asking when you refer to "single sign on".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You integrate ISE as an identity source to your Firepower Management Center by following the procedure described in the configuration guide here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/user_identity_sources.html#task_70A1D11CEE7E4F7F84CF90777F8E195F" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/user_identity_sources.html#task_70A1D11CEE7E4F7F84CF90777F8E195F&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Mar 2018 06:34:36 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2018-03-23T06:34:36Z</dc:date>
    <item>
      <title>Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3347195#M925910</link>
      <description>&lt;P&gt;&lt;IMG style="padding-left: 10px;" src="/legacyfs/online/legacy/7/0/4/60407-Cisco-Designated-VIP-PROGRAM-Logo-Main-200x105px.jpg " border="0" width="130" align="right" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;This topic is a chance to discuss more about&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;all you need to know about Cisco FirePOWER security solution. On this session, Marvin Rhoads will be answering all kind of questions about FirePOWER Management Center (FMC), FirePOWER Threat Defense (FTD) and FirePOWER service modules to FirePOWER appliances. All kind of topics related to this solution, such as operation, configuration, design architecture, troubleshooting, installation and licensing will be covered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Centralize, integrate, and simplify security management on your network&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Calibri',sans-serif; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;To participate in this event, please use the&lt;/STRONG&gt; &lt;IMG src="https://community.cisco.com/legacyfs/online/media/reply-button.png" border="0" alt="Join the Discussion : Cisco Ask the Expert" width="75" height="27" /&gt;&lt;FONT color="#808080"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;button below&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;to ask your questions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#ff0000"&gt;&lt;STRONG&gt;&lt;FONT color="#00CCFF"&gt;Ask questions from Monday, March 19th to Friday 30th 2018&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Featured Expert&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="CSC Photo - Marvin Rhoads.jpg" style="width: 95px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8823i96DE7B91BB58E8C0/image-dimensions/95x108?v=v2" width="95" height="108" role="button" title="CSC Photo - Marvin Rhoads.jpg" alt="CSC Photo - Marvin Rhoads.jpg" /&gt;&lt;/span&gt;&lt;STRONG&gt;&lt;A href="https://supportforums.cisco.com/t5/user/viewprofilepage/user-id/326046" target="_self"&gt;Marvin Rhoads&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;is a network security engineer with over 3 decades of experience. He focuses on Cisco network security solutions in his work as an independent consultant performing client-facing design and deployment services for several Cisco Partners. In addition to his 25 years of experience as a Cisco customer, Marvin has worked with Cisco partners for the past 7 years. Marvin holds several security and professional certifications, including a CCNP Security. He holds a Master’s Degree in Systems Engineering and a Bachelor’s Degree in Electronics Engineering Technology. He’s currently pursuing a CCIE Security certification.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Marvin is passionate about helping and learning from his peers in the industry. He has been an active Cisco Support Community contributor since 2001. He has been named as a &lt;A href="https://supportforums.cisco.com/t5/custom/page/page-id/cisco-designated-vips" target="_self"&gt;Cisco Designated VIP&lt;/A&gt; for 6 years in a row. In 2017 he was recognized as a member of the elite &lt;A href="https://supportforums.cisco.com/t5/cisco-cafe-blogs/congratulations-marvin-rhoads-our-newest-hall-of-fame-member/ba-p/3098600" target="_self"&gt;Cisco Support Community Hall of Fame program&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Marvin might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation at the &lt;A href="https://supportforums.cisco.com/t5/security/ct-p/4561-security" target="_self"&gt;Security&lt;/A&gt; Category.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Find other events or open new discussions &lt;A href="https://supportforums.cisco.com/t5/community-ideas/bd-p/5911-discussions-community-ideas " target="_self"&gt;https://supportforums.cisco.com/t5/community-ideas/bd-p/5911-discussions-community-ideas&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff8c00;"&gt;&lt;STRONG&gt;**Ratings Encourage Participation! **&lt;BR /&gt;Please be sure to rate the Answers to Questions&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3347195#M925910</guid>
      <dc:creator>Cisco Moderador</dc:creator>
      <dc:date>2020-02-21T15:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3352845#M925911</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;thanks for hosting expert event on FTD&lt;/P&gt;
&lt;P&gt;we are trying to integrate FMC and FTD to Windows NPS radius server for centralized administration, we tried to find some Cisco docs to configure FMC and FTD radius attributes but we were not successful yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you share any write up with step by step instructions how can I integrate FMC and FTD to windows radius for the management access authentication&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;Basavaraj&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 04:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3352845#M925911</guid>
      <dc:creator>Basavaraj Ningappa</dc:creator>
      <dc:date>2018-03-22T04:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3352947#M925912</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/338535"&gt;@Basavaraj Ningappa&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please refer to the Firepower Management Center configuration guide section on RADIUS authentication for system users here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/firepower_system_user_management.html#ID-2263-0000052e" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/firepower_system_user_management.html#ID-2263-0000052e&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It gives a step-by-step guide from the perspective of the FMC end. I'm not aware of any guide that will also cover the NPS server side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you trying to add specific attributes not already included in the&amp;nbsp;&lt;SPAN&gt;not included in the&amp;nbsp;&lt;/SPAN&gt;&lt;SAMP class="codeph"&gt;&lt;A target="_blank" name="ID-2263-00000670__ID-2263-00000687"&gt;&lt;/A&gt;dictionary&lt;/SAMP&gt;&lt;SPAN&gt;&amp;nbsp;file in&amp;nbsp;&lt;/SPAN&gt;&lt;SAMP class="codeph"&gt;&lt;A target="_blank" name="ID-2263-00000670__ID-2263-00000688"&gt;&lt;/A&gt;/etc/radiusclient/&lt;/SAMP&gt;&lt;SPAN&gt;&amp;nbsp;? If so, note that any new attributes must be distinct from those included in the built-in dictionary.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 08:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3352947#M925912</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-22T08:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353019#M925913</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;Thanks for your reference, we have added FMC IP as a radius client on the NPS side and in the FMC we have configured external authentication in fmc, but for some reason it didn't work, then we have raised the TAC case and TAC told that they are not supporting radius now. below is the message from TAC&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: rgb(31, 73, 125); font-size: 12pt;"&gt;&lt;FONT face="Calibri"&gt;We had a discussion with our BU and they concluded that FMC and microsoft NPS integration hasn’t been tested by the BU and there’s no relevant documentation for that as of now but they might test it and publish the documentation for the it in future.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: rgb(31, 73, 125); font-size: 12pt;"&gt;&lt;FONT face="Calibri"&gt;&amp;nbsp;&lt;SPAN style="color: rgb(31, 73, 125); font-size: 12pt;"&gt;&lt;FONT face="Calibri"&gt;If you have any questions or doubts, please do not hesitate to send me an e-mail. I'll be more than glad to help with your issue. Hope to hear from you soon."&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: rgb(31, 73, 125); font-size: 12pt;"&gt;&lt;SPAN style="color: rgb(31, 73, 125); font-size: 12pt;"&gt;&lt;FONT face="Calibri"&gt;If there is any solution now for this now, if you can share it with me that will be great.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: rgb(31, 73, 125); font-size: 12pt;"&gt;&lt;FONT face="Calibri"&gt;Thanks&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: rgb(31, 73, 125); font-size: 12pt;"&gt;&lt;FONT face="Calibri"&gt;Basavaraj&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 11:34:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353019#M925913</guid>
      <dc:creator>Basavaraj Ningappa</dc:creator>
      <dc:date>2018-03-22T11:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353045#M925914</link>
      <description>&lt;P&gt;While TAC might not support NPS integration per se, you should be able to make RADIUS work as an external authentication method. I use ISE as my external RADIUS server in my lab FMC and it works fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RADIUS is (mostly) clear text so you should be able to perform some packet captures to isolate and troubleshoot where the failure is occurring.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 12:24:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353045#M925914</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-22T12:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353351#M925915</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A design question, an FTD-HA set in front of a DC/server farm.&lt;/P&gt;
&lt;P&gt;We need to implement a transparent FTD FW - in pair of ports. The question is this connection is a trunk port, and will carry 5+ VLANs through this north-south traffic. I cannot find a solid document for this type of design. l find lots about layer1, layer2, and layer3 in separate documentation. Layer 1 does support trunk port. Layer2 does support VLAN, layer3 does support route mode with BVI or transparent mode.&lt;/P&gt;
&lt;P&gt;But I cannot find one that stated layer1/2 as trunk port with multiple VLANs and supported in transparent mode.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I/we believe it should work. But don't want to test it in production.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Antien&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353351#M925915</guid>
      <dc:creator>antienho</dc:creator>
      <dc:date>2018-03-22T16:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353370#M925916</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, congratulations to have the spirit to alwayls help people, this is something that in the technology side isn´t easy to find. Go ahead! You are in the right path! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;About questions for Cisco Firepower, I have a couple below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.- It is recommended in a regular implementation with ASA FTD or ASA with FirePOWER to add ALL traffic to be inspected by IPS &amp;amp; AMP engines? I know that security rules recommend to always verify every packet that comes from Internet to our internal network, but probably there are some best practices that can consider to isolate traffic from Guest Users, Some specific Applications like: Microsoft Update, Anti-Virus/Malware clients, etc. in order to improve the performance in the box.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.- For SSL decryption: Which are the best practices considering the first question, in where probably we don´t need to inspect ALL SSL traffic in the networks? Is evident that all ASA´s or Firepower appliance have a degradation of their performance, so I would like to know your inputs about this point due encryption traffic is something that is here as a day to day operation and we need to consider it due the amount of traffic that uses this kind of cipher.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your inputs and comments,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Neyton Avila&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353370#M925916</guid>
      <dc:creator>Jorge Neyton Avila Pacheco</dc:creator>
      <dc:date>2018-03-22T17:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353394#M925917</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/107000"&gt;@Jorge Neyton Avila Pacheco&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the encouraging words.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding your questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. In the context of your sensor being an Internet edge device, there are cases where you may not want to inspect incoming traffic. For instance, I have had scenarios where a significant amount of the incoming traffic was IPsec that terminated on a "behind the firewall" device. In that case we exempted all of that traffic from IPS inspection and got back a lot of capacity. For deployments other than the Internet edge there may be similar exemptions that are appropriate - for instance, bulk data transfers like backups between trusted hosts in a data center deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. SSL decryption is increasingly problematic for many reasons. The best use case for is is incoming SSL traffic to a server where you have the certificate and private key. For outbound traffic you not only have the challenges of being a "man-in-the-middle" and needing to decrypt and re-sign but also an increasing number of applications (iTunes, Dropbox etc.) and sites are resistant to this approach because of techniques like certificate pinning and related ones. The performance impact of trying to decrypt all SSL are significant as well. I usually advocate an approach that puts inspection of that sort of traffic closer to the user - things like Cisco AMP for Endpoints and Umbrella are my favored solutions as they will see the traffic in its unencrypted form by nature of where they sit.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353394#M925917</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-22T17:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353410#M925918</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/42852"&gt;@antienho&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can do what you are asking about by using subinterfaces and tagging the VLANs on each side of the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remember you can always lab it using an FTDv and a free evaluation license.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353410#M925918</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-22T17:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353416#M925919</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;for your answer, I will consider all your comments in future implementations and designs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a great day! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Neyton Avila&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353416#M925919</guid>
      <dc:creator>Jorge Neyton Avila Pacheco</dc:creator>
      <dc:date>2018-03-22T17:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353436#M925920</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When will the FP 2100 support SSL/TLS Decryption in hardware? The majority of my clients (I'm with a Partner) are bringing up the trend of Malware being transported in TLS to get around the inspections of FirePower and other IPS devices. The Cisco 2018 Annual Cyber Security Report also highlighted this trend. Palo Alto has been doing hardware decryption in many of their models for some time now and it is hard to for FirePower to complete against PA in the face of this obvious discrepancy. Also, are the FP 4100 models every going to have hardware decryption chipsets? It is my knowledge that they don't ship with the chipset at all. Also, is there any plan for the FTD line of ASA 5500X's to get TLS descryption chipsets? Or will there future replacement models with them?&lt;BR /&gt;&lt;BR /&gt;I know that CPU based decryption is possible but the few (very few) Cisco documents I've seen referencing this option in FTD say that there is a 50-80% performance decrease on the FTD if you use CPU based decryption so this doesn't seem like a viable alternative.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mark DeLong&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 18:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353436#M925920</guid>
      <dc:creator>Mark DeLong</dc:creator>
      <dc:date>2018-03-22T18:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353438#M925921</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When will FTD based AnyConnect VPN support local usernames for authentication? Also, when will it support LDAP attribute maps and LDAP based authorization?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Mark DeLong&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 18:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353438#M925921</guid>
      <dc:creator>Mark DeLong</dc:creator>
      <dc:date>2018-03-22T18:34:11Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353544#M925922</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what are your best practices for deploying branch FTDs with a centralized management if a public IP is used for the FTD mgmt Port?&lt;/P&gt;
&lt;P&gt;Just restricting e.g SSH etc... in&amp;nbsp;&lt;STRONG&gt;Devices &amp;gt; Platform Settings&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Anton&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 21:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353544#M925922</guid>
      <dc:creator>Anton Hinterleitner</dc:creator>
      <dc:date>2018-03-22T21:14:14Z</dc:date>
    </item>
    <item>
      <title>Best practices on Cisco FirePOWER - FTDv</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353563#M925923</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;may I ask another question regarding FTDv?&lt;/P&gt;
&lt;P&gt;Do you have some&amp;nbsp;experience or best practices&amp;nbsp;using it in a&amp;nbsp;production environment?&lt;/P&gt;
&lt;P&gt;From my perspective, due to the performance limitations and license costs it isn't really an option at the moment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Anton&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 21:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353563#M925923</guid>
      <dc:creator>Anton Hinterleitner</dc:creator>
      <dc:date>2018-03-22T21:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353626#M925924</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291338"&gt;@Mark DeLong&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You make very good points about the challenges of protecting against threats in SSL/TLS payloads. Cisco is acutely aware of them as well and currently addresses them with several shipping products such as AMP for Endpoints, Umbrella and the recently announced Encrypted Traffic Analytics (ETA) technology.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not authorized to comment on non-publicly-announced future releases from Cisco. I suggest contacting your local Cisco account manager or partner (moot for you since you're already a partner, but useful for the larger audience) to arrange for briefings under non-disclosure agreement which may shed light on future plans. As a partner you also have avenues via the partner enablement team (Partner Security community, SEVT etc.) by which to get roadmap information.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can say as a general industry observation that decrypting all outbound traffic at the Internet edge is falling out of favor. It is problematic in the best of cases even with dedicated hardware appliances, whether from Cisco or other vendors. Products (iTunes, Dropbox, others) and protocols (e.g., http/2) are increasing rightly resistant to man-in-the-middle technologies that fundamentally break the chain of trust between client and server.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 02:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353626#M925924</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-23T02:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353628#M925925</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291338"&gt;@Mark DeLong&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm not authorized to comment on non-publicly-announced future releases from Cisco. I suggest contacting your local Cisco account manager or partner to arrange for briefings under non-disclosure agreement which may shed light on future plans.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That said, Cisco's general direction is to advance the FTD platform towards parity with the rich features already available with ASA-based remote access VPN. Some features may be left behind but the ones you cited are by no means corner cases. I see them commonly used among my customers. I would expect them to be currently under development within Cisco.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 01:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353628#M925925</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-23T01:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the expert- Best practices on Cisco FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353632#M925926</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/56373"&gt;@Anton Hinterleitner&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What you suggest is currently the best available practice on the appliance itself. If you have an upstream router, you can layer in some ACL protection on it as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many of us are hesitant placing control plane interfaces on a publicly exposed address. While some of that is rooted in practice drawn from historically unhardened protocols and implementations, I believe it's a valid concern that remains even with current technologies such as Firepower which uses only the relatively secure ssh and the sftunnel (a proprietary implementation of ssl/tls over tcp/8305) protocols as you alluded.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would hope to see a more robust implementation from Cisco in future releases but, for now, what we have is a limited set of choices for hardening the branch deployments.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 01:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353632#M925926</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-23T01:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices on Cisco FirePOWER - FTDv</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353634#M925927</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/56373"&gt;@Anton Hinterleitner&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FTDv is a viable option for many customers as there are a very broad set of requirements out there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I agree that it does have limitations that go along with its capabilities. However the ability to spin it up quickly in a virtual environment (including public cloud) are attractive to many customers. Not everybody needs the performance (throughput mostly) that's available on the hardware-based appliances.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Licensing costs can be a challenge; but we normally defer that discussion to outside the support community.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 01:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353634#M925927</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-23T01:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices on Cisco FirePOWER - FTDv</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353659#M925928</link>
      <description>Hi Marvin - thanks for taking the time to answer these questions . I have also posted this in the firewall section so apologies for doubling up:&lt;BR /&gt;&lt;BR /&gt;I am about to pull the trigger on refreshing our old ASA's with 2110 FTD devices however I was just wanting to double check that they will support Site to site IKEv1 VPN to 3rd party equipment? (not sure if its cisco etc)&lt;BR /&gt;&lt;BR /&gt;I read on the firewall.cx site its only supported between FTD and ASA devices? Is this outdated information? I cant find anything specifying this limitation in the current cisco documentation.&lt;BR /&gt;&lt;BR /&gt; &lt;A href="http://www.firewall.cx/cisco-technical-knowledgebase/cisco-firewalls/1197-cisco-asa-firepower-threat-defense-ftd-installation-management.html" target="_blank"&gt;http://www.firewall.cx/cisco-technical-knowledgebase/cisco-firewalls/1197-cisco-asa-firepower-threat-defense-ftd-installation-management.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"Site-to-Site VPN. Only supports Site-to-Site VPN between FTD appliances and FTD to ASA"</description>
      <pubDate>Fri, 23 Mar 2018 02:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353659#M925928</guid>
      <dc:creator>Nick Currie</dc:creator>
      <dc:date>2018-03-23T02:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices on Cisco FirePOWER - FTDv</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353667#M925929</link>
      <description>&lt;P&gt;Site-to-site IPsec IKEv1 VPN is standards-based so there's no reason why it shouldn't work in principle.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My experience is that as long as you're using a common implementation (single link, pre-shared key, the usual transform sets, basic routing with NAT exemption for interesting traffic etc.) that multi-vendor interoperability is not an issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some of the very obscure features may not be currently available but other than that you shouldn't have any problem. The underlying Lina code in FTD uses the same bits as the traditional ASA operating system for this feature.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 03:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-best-practices-on-cisco-firepower/m-p/3353667#M925929</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-23T03:09:39Z</dc:date>
    </item>
  </channel>
</rss>

