Identify flows that are triggering Automatic Application Bypass (AAB)
we have a bunch of ASA firewalls with FirePOWER modules and we recently upgraded them to a latest 6.2 version of code.
I have been getting some AAB (Automatic Application Bypass) related health events and i was wondering if there is a way, through the CLI to identify elephant flows that are triggering AAB. I remember that about a year ago we experienced some slowness on our network (caused by latency on the SFR module on our Data Center Firewall) but because the module was on 5.4 and IAB/AAB was not available, TAC wasn't able to identify the flows that are causing this (so that we bypass them on the ASA level -> not send the traffic to the module).
I believe there are ways so that you can get flow data for when AAB is kicking in.
ProblemTaking a snapshot of ISE virtual machines is not supported but it still happens occasionally due to administrators taking a snapshot manually or an integrated technology that automatically takes snapshots to back up VMs. When taking a snapsho...
Hi all, Is it available on Stealthwatch 7 Client or web interface the ability to import the Netflow Exporters names? I found only the possibility to configure manually the name of each Netflow Exporter, but not a bulk configuration.
User Experience Enhancements
As part of Cisco Customer Experience program, we are working towards a more uniform user experience and terminology harmonization. This program runs across all Cisco security products.
We are ali...
Join us on Thursday, October 10 at 10 am PT to meet the CEO and Founder of Cisco's most recent security investment.
In today’s cybersecurity arms race, how does Cisco stay one step ahead in the battle against attackers? One key strategy is keeping tabs on...