<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Prefilter or Access Control Policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3834942#M948871</link>
    <description>&lt;P&gt;I converted my ACL from ASA to FTD.&amp;nbsp; Just know that all rules imported from ASA will be put into the pre-filter policy. My best explanation is that pre-filter is more like traditional ASA policy where as Access Control Policy allows you to apply layer 7 inspection for file, applications, URL, etc. Just remember to add your implicit drop to the bottom of the pre-filter policy should you use one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One other note is that should you have any traffic you do not wish to inspect, then you can use pre-filter rules with the fast path option or drop option. If you select Analyze in your pre-filter rule, then it will pass the packet onto the Access Control Policy for further inspection.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Apr 2019 12:42:54 GMT</pubDate>
    <dc:creator>jmeetze80</dc:creator>
    <dc:date>2019-04-09T12:42:54Z</dc:date>
    <item>
      <title>Firepower Prefilter or Access Control Policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3832096#M948854</link>
      <description>&lt;P&gt;I am converting ASA configuration to FTD. I have both 2100 and 4100 series platforms. My requirement is simple, converting all ACLs and NATs etc. I&amp;nbsp; do not have any upper layer inspection enabled on ASA IPS etc. The FTD is on Base license. I have three questions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Is there any benefit of configuring the rules in Acces Control Policy versus the Prefilter policy since I have only base license?&lt;/P&gt;&lt;P&gt;2. What additional fetaure other than layer 3/4 port blocking I can get out of the base license?&lt;/P&gt;&lt;P&gt;3. Is there any additional consideration I should keep in mind for future in case if I get additional licences for IPS and Malware etc while doing this configuraiton to make it easy for future license enabling?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3832096#M948854</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2020-02-21T17:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Prefilter or Access Control Policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3834241#M948860</link>
      <description>&lt;P&gt;Any comment on this?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 13:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3834241#M948860</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2019-04-08T13:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Prefilter or Access Control Policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3834293#M948866</link>
      <description>&lt;P&gt;1. Not a whole lot security wise. Mostly some application visibility and reporting / analysis capabilities. So you can filter based on application as determined by inspection vs. just by 5-tuple. I prefer ACP unless I know I want to fastpath the flow and never analyze it any further.&lt;/P&gt;
&lt;P&gt;2. See #1.&lt;/P&gt;
&lt;P&gt;3. By putting your rules in as ACP entries it is easier to add the IPS, URL and/or File (Malware) policy elements later.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 14:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3834293#M948866</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-04-08T14:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Prefilter or Access Control Policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3834942#M948871</link>
      <description>&lt;P&gt;I converted my ACL from ASA to FTD.&amp;nbsp; Just know that all rules imported from ASA will be put into the pre-filter policy. My best explanation is that pre-filter is more like traditional ASA policy where as Access Control Policy allows you to apply layer 7 inspection for file, applications, URL, etc. Just remember to add your implicit drop to the bottom of the pre-filter policy should you use one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One other note is that should you have any traffic you do not wish to inspect, then you can use pre-filter rules with the fast path option or drop option. If you select Analyze in your pre-filter rule, then it will pass the packet onto the Access Control Policy for further inspection.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 12:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3834942#M948871</guid>
      <dc:creator>jmeetze80</dc:creator>
      <dc:date>2019-04-09T12:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Prefilter or Access Control Policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3836435#M948876</link>
      <description>&lt;P&gt;with new Cisco migration tool you can't migrate policy to the prefilter container, it has to be ACP.&lt;/P&gt;&lt;P&gt;you need to use FMC as a migration tool.&lt;/P&gt;&lt;P&gt;another issue, if you migrate them to ACP, you need to edit policies individually to apply IPS/IDS or AMP policies if you need to.&lt;/P&gt;&lt;P&gt;Also , logging should be enabled on all rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, the migration tool is not much helpful, you need to do bit of manual work as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would recommend:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1- Migrate ASAs to Prefilter container&lt;/P&gt;&lt;P&gt;2-Select action as Analyze&amp;nbsp;&lt;/P&gt;&lt;P&gt;3-At ACP , configure a policy (permit any any) , enable logging and attach IPS/IDS and AMP policies&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2019 01:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3836435#M948876</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2019-04-11T01:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Prefilter or Access Control Policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3840224#M948880</link>
      <description>&lt;P&gt;The new conversion tool only has option for Access Control Policy, so in order to do pre-filter I would either have to do it manual or use the older migration tool (both options are not attractive). It leaves me with only one option of Access Control Policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although I would have preferred to use the pre-filter and only Analyze the traffic that I needed to send for further treatment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the other hand only ACP would give me&amp;nbsp;&lt;SPAN&gt;User Control, Application Rules, SSL decryption, and Network discovery with the Base license.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I would go for Access Control Policy.&amp;nbsp;Is it the right approach in this case? &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 11:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/3840224#M948880</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2019-04-17T11:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Prefilter or Access Control Policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/4446765#M1082805</link>
      <description>&lt;P&gt;Latest tool will convert ASA rules to prefilter rules.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 21:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-prefilter-or-access-control-policy/m-p/4446765#M1082805</guid>
      <dc:creator>Jack G</dc:creator>
      <dc:date>2021-08-09T21:23:51Z</dc:date>
    </item>
  </channel>
</rss>

