12-04-2020 08:56 AM
Hello @Rob Ingram @balaji.bandi @Richard Burts @Aref Alsouqi
I have Cisco ASA with Firepower Module, I want to confirm that Firewall is having features like IPS/IDS, DNS filtering, Botnet Protection etc.
There is one Internal server which exposed on port 443 for Public Access without moving it to DMZ zone, I want to make sure ASA is blocking all blacklisted IPs to connect to it.
How should I check that all these features are in place ?
Thanks
Solved! Go to Solution.
12-04-2020 09:16 AM
Examine the Access Control Policy (ACP) rule that allows the incoming traffic. In addition the specific rule allowing the desired traffic, there should be a highlighted (non-dimmed) "Shield " icon on the right indicating an IPS policy is in place. Then check the Security Intelligence tab of the ACP to ensure all of the undesirable categories of traffic such as Botnet, CNC etc. are in the Blacklist column.
I'm not exactly sure what you mean by DNS Filtering. Can you elaborate on that one?
12-04-2020 09:16 AM
Examine the Access Control Policy (ACP) rule that allows the incoming traffic. In addition the specific rule allowing the desired traffic, there should be a highlighted (non-dimmed) "Shield " icon on the right indicating an IPS policy is in place. Then check the Security Intelligence tab of the ACP to ensure all of the undesirable categories of traffic such as Botnet, CNC etc. are in the Blacklist column.
I'm not exactly sure what you mean by DNS Filtering. Can you elaborate on that one?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide