09-11-2021 09:10 AM
Hi All
I'm using Cisco ASa 5516 and we have module FirePOWER.
I'd like to know how do I generate traffic to see in this option.
ASA FirePOWER Reporting.
I appreciate your help guys.
thank you
Alex
Solved! Go to Solution.
09-11-2021 09:41 AM - edited 09-11-2021 09:44 AM
In order for reporting to work you need to configure some rule. forexample Firepower need to see the traffic that is passing by the IPS moudles so it can started feed up the information.
here this link is good start for you
Have you redirected the traffic to SFR module.
In order to redirect traffic to the ASA SFR module, you must create a service policy that identifies specific traffic. Complete these steps in order to redirect traffic to an ASA SFR module:
ciscoasa(config)# access-list sfr_redirect extended permit ip any any
ciscoasa(config)# class-map sfr
ciscoasa(config-cmap)# match access-list sfr_redirect
Note: You cannot configure both a passive mode and inline mode at the same time on the ASA. Only one type of security policy is allowed.
ciscoasa(config)# policy-map global_policy
ciscoasa(config-pmap)# class sfr
ciscoasa(config-pmap-c)# sfr fail-open
09-11-2021 12:02 PM - edited 09-11-2021 12:06 PM
This seem strange
Global policy:
Service-policy: global_policy
Class-map: sfr_class
SFR: card status Up, mode fail-open monitor-only
packet input 0, packet output 645942, drop 0, reset-drop 0
could you run these command
!
show run all class-map sfr_class
!
and get the access-list from this class map and then give command
(Example) show access-list sfr_redirect
09-11-2021 09:41 AM - edited 09-11-2021 09:44 AM
In order for reporting to work you need to configure some rule. forexample Firepower need to see the traffic that is passing by the IPS moudles so it can started feed up the information.
here this link is good start for you
Have you redirected the traffic to SFR module.
In order to redirect traffic to the ASA SFR module, you must create a service policy that identifies specific traffic. Complete these steps in order to redirect traffic to an ASA SFR module:
ciscoasa(config)# access-list sfr_redirect extended permit ip any any
ciscoasa(config)# class-map sfr
ciscoasa(config-cmap)# match access-list sfr_redirect
Note: You cannot configure both a passive mode and inline mode at the same time on the ASA. Only one type of security policy is allowed.
ciscoasa(config)# policy-map global_policy
ciscoasa(config-pmap)# class sfr
ciscoasa(config-pmap-c)# sfr fail-open
09-11-2021 11:25 AM
Hi Sheraz thank you
I already created the acl
access-list sfr_redirection_acl extended permit ip any any
class-map sfr_class
match access-list sfr_redirection_acl
class sfr_class
sfr fail-open monitor-only
Bu I didn't see any traffic in FirePOWER reporting
09-11-2021 11:44 AM
can you run these command and show us the output
show service-policy sfr
show module sfr
Also have to configured any rule for the Firepower IPS insection etc?
09-11-2021 11:50 AM
09-11-2021 12:02 PM - edited 09-11-2021 12:06 PM
This seem strange
Global policy:
Service-policy: global_policy
Class-map: sfr_class
SFR: card status Up, mode fail-open monitor-only
packet input 0, packet output 645942, drop 0, reset-drop 0
could you run these command
!
show run all class-map sfr_class
!
and get the access-list from this class map and then give command
(Example) show access-list sfr_redirect
09-11-2021 12:05 PM
I agree
And how do I fix it?
the command I received form TAC Cisco
09-11-2021 12:09 PM
You already opened an case with cisco in this regards?
09-11-2021 12:14 PM
I'll open the case.
Thank you
Alex
09-11-2021 11:43 AM
Hi Sheraz
My main goal is
interface wguest monitoring the all traffic
source wguest 172.29.13.0/24 destination below monitoring these networks and application below.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: