04-11-2016 02:26 PM - edited 02-21-2020 05:47 AM
Safeguarding your network assets and data from today’s threats isn’t easy. You need detailed visibility into all your network layers and resources. With the Cisco Firepower solutions, that’s what you get. This visibility provides the contextual awareness you need to properly evaluate the users, hosts, and applications running in your network, detect multi-vendor threats, and mount an automated defense response. Plus, the Firepower solution not only protects your network against known and unknown threats before at attack - but does so during and after an attack as well. In independent tests at NSS Labs, among the world’s leading information security research and advisory companies, the Firepower solution was rated 99.4 percent effective in stopping threats and a perfect 100 percent effective in not allowing evasion techniques to succeed. This session will provide an opportunity to learn and ask questions about overview of Firepower solution, use-case scenarios and insights on basic troubleshooting and best practices recommended by engineering.
Ask questions from Wednesday April 27 to May 6, 2016
Featured Experts
Aastha Bhardwaj has been a Customer Support Engineer in the Technical assistance Center Firepower team at Cisco Systems since May 2012. Aastha has 7 years of overall experience in security. She works with engineering and customers to resolve complex issues and creates documents and trainings to help customers use the product more fluidly. She is an expert in security technologies and products such as ASA, IPS, CX, FWSM, and Firepower. Aastha holds a CCIE Certification in Security (#46900), as well as Sourcefire Certified Expert (SFCE#126176). She graduated with a Bachelors’ Degree in Information Technology from Graphic Era Institute of Technology at Dehradun India. She also loves cooking and enjoys traveling the world.
John Bennion has been a Customer Support Engineer in the Technical Assistance Center Firepower team in RTP since 2013. He has expertise in Cisco Firepower. John holds the CCNA and CCNP certifications in Routing as Switching and has obtained a Bachelors’ Degree in Computer Information Systems with minors in business and mathematics from the University of Colorado at Pueblo, CO.
Find other https://supportforums.cisco.com/expert-corner/events.
** Ratings Encourage Participation! **
Please be sure to rate the Answers to Questions
https://supportforums.cisco.com/expert-corner/events ">https://supportforums.cisco.com/expert-corner/events.
We look forward to your participation. This event is open to all, including partners. Please Share this event in your social channels. Have a technical question? Get answers here before opening a TAC case by visiting the Cisco Support Community.
04-11-2016 03:04 PM
I can't see this event. I can see:
Ask the Expert: Cisco Expressway
Ask the Expert: Threat Defense for a Secure Enterprise Branch
Ask the Expert: Cisco Nexus 7000 Series Switches and FabricPath
Am I looking in the wrong place?
04-15-2016 04:35 PM
Hey Philip,
You can register on link : https://supportforums.cisco.com/event/12952026/webcast-performance-troubleshooting-cisco-firepower
Regards,
Aastha Bhardwaj
04-15-2016 04:38 PM
Hello Philip,
Thank you for your interest. This event will open on April 27th, after the live webcast. We invite you to attend the webcast. You can register here.
Kind Regards,
Monica
04-28-2016 02:06 PM
Hello Aastha and John,
I have a question. 4. Would you recommend enabling SSL decryption as a way to inspect encrypted traffic?
04-29-2016 05:34 AM
The answer is yes. SSL decryption is a very good way to inspect encrypted traffic. just remember that SSL decryption is very resource intensive. we have to decrypt the traffic then pass it through inspection and after we are done we encrypt it again.
if you plan on using SSL decryption please make sure your device has been spect for it so you are sure it can handle SSL decryption with the amount of traffic you are passing.
05-01-2016 10:10 PM
Hi Jonh,
Is there any official documentation regarding recommended amount of SSL traffic that can be processed by different models of Cisco ASAs. I ask you about it because datasheets with perfomance values was published before SSL decryption feature on these platforms and as i understand it won't be correctly to consider that values if we plan to use SSL decryption.
How we can determine the amount of SSL traffic that can be proccessed by Firepower modules?
05-02-2016 08:33 AM
Oleg,
we do not currently have any official documentation. from what i understand it is currently in the works.
my recommendation would be to get with a Cisco sales rep and have them analyze your environment so that can provide you with a list of options that would best fit your needs
05-04-2016 01:47 PM
With SSL decryption are you recommending outbound initiated SSL decryption as well?
05-05-2016 06:53 AM
If you need to inspect all traffic through your network than yes i would recommend it. SSL decryption is the only way to inspect HTTPS or other encrypted traffic. there are things we can do without decrypting the traffic but there is a chance that an attack will come though on a session that was initiated internally.
some of the best ways to protect against this without using SSL decryption would be through security intelligence and URL/application filtering. you can use these tools to filter out known vulnerable sites.
05-04-2016 02:44 PM
I have a question in regards to Host limits of the FMC. We have 50 000 host limit.
When configuring Network Discovery. Is it this component that starts to consume the 50 000 limit? Or will internal hosts being processed through snort rules also start to use up the limited number?
How much time of inactivity from a host until the number is put back into the pool?
Thanks
05-05-2016 05:26 AM
Hello,
The 50,000 limit refers to the network discovery host limit. as soon as you reach the 50,000 limit, the system will start to prune old entries off to make room for new entries. entries will be removed if they haven't been updated in a week.
my recommendation would be to limit the ip range you are looking at in network discovery so you are only discovering the ip ranges that are most relevant to you.
also remember that if you do reach this limit there will be no impact to network performance.
05-07-2016 01:39 AM
Hi Team,
Been using the Virtual FMC with asa/sfr deployed at sites. Great product. Just spun up one at home the 5506x inbuilt sfr. I don't see network discovery.
Can you explain the difference in regards to the information I will be able to populate when driving sfr via asdm.
Thanks
05-09-2016 09:37 AM
Hi Evan,
Managing the device via Defense center gives you more visibility in terms on Monitoring and reporting unlike on ASDM . Network discovery is not teher on ASDM its Defense center feature.
Refer article for reporting on ASDM: http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Reporting.html
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide