03-04-2019 01:40 AM - edited 02-21-2020 08:53 AM
Probably a simple setting that im missing. All LAN, DMZ etc outgoing traffic is inspected by the FirePower interface on our 5516 and is working great. However, I have all client remote access VPN traffic tunnelling through the ASA, no split tunnelling, but the traffic isnt being inspected by the FirePower.
Any pointers?
Solved! Go to Solution.
03-04-2019 03:56 AM
Fixed. I needed to create a seperate network object in firepower.
03-04-2019 02:16 AM
When you say "tunneling through the ASA" do you mean it is terminating on a different VPN headend or on the ASA itself?
03-04-2019 03:21 AM
The remote device (ie laptop) is sending all traffic through the Remote Access VPN to the ASA. So if the remote user browses the internet the traffic is going across the VPN. This traffic is not being inspected by the FirePower, which I want it to be.
03-04-2019 03:56 AM
Fixed. I needed to create a seperate network object in firepower.
03-04-2019 03:59 AM
OK, understood.
Make sure your access control policy is setup to inspect the "outside-outside" traffic that would be presented in this scenario.
There are examples of how to do this in the following article:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide