04-29-2015 02:15 PM - edited 03-12-2019 05:40 AM
Hi -
Need some clarifications, please.
I have a requirment needed to put FirePower management interface and ASA-Inside interface on a different subnets, does it support?
From what i read so far, most of document suggests to put both interfaces on the same subnet, is there a reason to do that?
I may be wrong but i think FirePower uses management interface to communicate with FireSight for control and comamnd traffic only, the actual data plane traffic is still flowing from ASA-Outside to Inside and vice versa, so as long as there is an ip connectivity between FireSight and FirePower, it should be ok, right? or am i totally wrong, they have to be on the same subnet?
ASA5515-x with FirePower 5.3.1
Thanks in advance for your help.
Solved! Go to Solution.
04-29-2015 08:12 PM
Separate subnets are fine.
Like you've correctly observed - the FirePOWER module only needs to communicate (IP-wise) with FireSIGHT Management Center.
That path is completely independent of the data plane path through the ASA. The ASA redirects traffic via the service-policy to the FirePOWER module completely internally to the appliance.
04-29-2015 08:12 PM
Separate subnets are fine.
Like you've correctly observed - the FirePOWER module only needs to communicate (IP-wise) with FireSIGHT Management Center.
That path is completely independent of the data plane path through the ASA. The ASA redirects traffic via the service-policy to the FirePOWER module completely internally to the appliance.
05-01-2015 09:10 AM
Thanks Marvin for taking time to review it.
I tested the setup in lab, yes, it is completely independent and working fine.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide