<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA MPF vs IPS vs WSA vs AMP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-mpf-vs-ips-vs-wsa-vs-amp/m-p/3310834#M998916</link>
    <description>&lt;P&gt;The ASA can do L7 inspection but its capabilities are very limited. You have to know in advance the exact URLs you want to filter, you cannot filter on categories, there's almost no reporting of the filtering, etc. etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NGIPS like ASA with Firepower Services and URL Filtering license or ASA/Firepower appliance running FTD image can do much more with respect to URL filtering. All the things I mentioned above plus more. A WSA, as a purpose built appliance, has even more capabilities - very granular reporting, more categories etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AMP for Endpoints has very limited URL filtering functionality- it is primarily a malware protection tool (with Antivirus).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco Umbrella is the other option. It is a very good URL filtering tool with the advantage that it can cover clients both on- and off-premises with the roaming client.&lt;/P&gt;</description>
    <pubDate>Sat, 13 Jan 2018 14:05:22 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2018-01-13T14:05:22Z</dc:date>
    <item>
      <title>ASA MPF vs IPS vs WSA vs AMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-mpf-vs-ips-vs-wsa-vs-amp/m-p/3310782#M998913</link>
      <description>&lt;P&gt;Hello people,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been under the impression that an IPS was used in conjunction with an ASA because ASA can work only on L3/L4 and cant check the payload of a packet. But if ASA can do L7 inspection, URL filtering etc with the help of&amp;nbsp; MPF, then why are the the devices like IPS, WSA being used to do the same?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mpf-vs-ips-vs-wsa-vs-amp/m-p/3310782#M998913</guid>
      <dc:creator>abhijith891</dc:creator>
      <dc:date>2020-02-21T15:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA MPF vs IPS vs WSA vs AMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-mpf-vs-ips-vs-wsa-vs-amp/m-p/3310834#M998916</link>
      <description>&lt;P&gt;The ASA can do L7 inspection but its capabilities are very limited. You have to know in advance the exact URLs you want to filter, you cannot filter on categories, there's almost no reporting of the filtering, etc. etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NGIPS like ASA with Firepower Services and URL Filtering license or ASA/Firepower appliance running FTD image can do much more with respect to URL filtering. All the things I mentioned above plus more. A WSA, as a purpose built appliance, has even more capabilities - very granular reporting, more categories etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AMP for Endpoints has very limited URL filtering functionality- it is primarily a malware protection tool (with Antivirus).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco Umbrella is the other option. It is a very good URL filtering tool with the advantage that it can cover clients both on- and off-premises with the roaming client.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jan 2018 14:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mpf-vs-ips-vs-wsa-vs-amp/m-p/3310834#M998916</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-01-13T14:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA MPF vs IPS vs WSA vs AMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-mpf-vs-ips-vs-wsa-vs-amp/m-p/3310841#M998921</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA can do very basic stuff with L7 header, basically it can just make sure that l7 traffic is adhering to RFP for that particular protocol. We can do bare minimum with layer 7 policies even if we were to modify the default policy for the defined protocols. Also, ASA does not even handle all the well defined protocols at layer 7.&lt;/P&gt;
&lt;P&gt;It can not deep analyze the traffic on l7 layer and is not aware of the attack patterns which ofcourse an additional module like IPS or Sourcefire can do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jan 2018 14:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mpf-vs-ips-vs-wsa-vs-amp/m-p/3310841#M998921</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-01-13T14:28:05Z</dc:date>
    </item>
  </channel>
</rss>

