12-03-2019 04:39 PM - edited 02-21-2020 09:44 AM
We have a VMware Firesight server in one office and 3 ASA 5505 appliances. I made a configuration change on the Firesight server by adding a DNS rule that ended up blocking the connecting from an ASA in a remote office from the Firepower management server. Is there a way to modify the firepower policy on the ASA from CMD to allow the ASA to connect to the management server again? Maybe rollback deployment or whitelist the remote server? Currently all internet traffic is being blocked at the remote office because of this new policy.
Solved! Go to Solution.
12-04-2019 10:16 PM
If you have both images running (ASA with FirePOWER) then your standard ASA features (L3/L4 ACLs, NAT, VPN, etc) are still managed independently from the FMC. Thus, if the connectivity is broken due to ASA configurations then you should be able to make the appropriate changes via CLI/ASDM. If the connectivity is broken due to rules in the FirePOWER module then you can re-configure the ASA to bypass the module temporarily so you can restore the connectivity, then make the appropriate changes in the FMC and then re-configure the ASA again to inspect traffic through the FirePOWER module.
You have two options to temporary bypass the FirePOWER module:
For more information on this, you can reference the following link:
I hope this helps!
Thank you for rating helpful posts!
12-03-2019 05:16 PM
Hi there-
Thank you for rating helpful posts!
12-03-2019 05:48 PM
12-03-2019 07:50 PM
Are you running the unified image (FTD) or ASA with FirePOWER services where you have both the ASA and Firepower software running?
Thank you for rating helpful posts!
12-04-2019 02:38 AM
12-04-2019 10:16 PM
If you have both images running (ASA with FirePOWER) then your standard ASA features (L3/L4 ACLs, NAT, VPN, etc) are still managed independently from the FMC. Thus, if the connectivity is broken due to ASA configurations then you should be able to make the appropriate changes via CLI/ASDM. If the connectivity is broken due to rules in the FirePOWER module then you can re-configure the ASA to bypass the module temporarily so you can restore the connectivity, then make the appropriate changes in the FMC and then re-configure the ASA again to inspect traffic through the FirePOWER module.
You have two options to temporary bypass the FirePOWER module:
For more information on this, you can reference the following link:
I hope this helps!
Thank you for rating helpful posts!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide