cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
442
Views
0
Helpful
5
Replies

Cisco Asa Firepower

mproenca2014
Level 1
Level 1

Hi you all,

Where do I implement firewall rules in a Cisco Asa with Firepower?

Is it in Asa Module or Firepower Module?

Thanks

5 Replies 5

Collin Clark
VIP Alumni
VIP Alumni

In the ASA.

Ok,

So now i'm facing another issue.

I configured a remote vpn, cisco anyconnect, but the traffic goes trough my firewall rules, I mean, nothing is dropped, everything passes to my local interface.

What am I missing?

By default that is the correct behavior. If you need to restrict access then you will have to create an ACL.

http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6

That's correct.

And I created a rule for all interfaces denying everything.

Any to Any Deny.

access-list INSIDE_access_in extended deny ip any any

access-list ART_access_in_1 extended deny ip any any

access-list NOS_access_in extended deny ip any any

But still working. I cannot see what's missing.

My first comment is that you show us access list configuration but do not show us how the access lists are applied and how they are applied is critical to whether they work or not.

But the really important comment is that for AnyConnect the normal behavior is that access lists on interfaces do not evaluate or control AnyConnect VPN traffic. The expected behavior is that anything that comes into the ASA via AnyConnect will be allowed to pass through the ASA. If you want to control VPN traffic you should look into using VPN filters.

HTH

Rick

HTH

Rick
Review Cisco Networking for a $25 gift card