Disable Security Intelligence on FTD Access Control Policy
This might sound strange but I want to have a policy on a 2110 FTD Appliance that does not use Security Intelligence.
The firewall is an internal device that is used to screen PCI users from the rest of the network, as such it is not able to communicate with the outside world - so I don't need the DNS scannig features - also I haven't bought a threat license for the devices.
I have deleted the DNS Feeds but it still seems to want to use this.
Is it possible to remove the Security Intelligence section completely - or is this a way to force you to buy a threat policy for every firewall?
That almost completely worked, I don't have any license errors on the FTD policy but I now have the firewalls complaining that the feeds (which they are not using are out of date). Any idea on how to clear this one out (the firewalls were on eval before I licensed them). The only thing I can think is to remove the policies and this may cure the issue if I re-apply them. I think during eval they ran with all the features enabled.
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to leverage Microsoft Single Sign-On for multiple ISE Portals (for example Sponsor and Guest/BYOD Portals).
At the time of this writing, ISE cann...
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to create a BYOD Flow to provide Wireless network access using an employee’s Azure AD credentials.
The table below shows the whole Cisco Security solutions + Splunk integrations add-ons. Kindly let me know if I have missed some add-ons or if there are any new updates. Thank you!
Hope this will be helpful for everyone who is looking for Splunk in...
A python based script to generate report if there are disabled rules under an Access Control Policy and an option to delete those rules in bulk.
Step 1 Download the script on PCStep 2 Make sure python3 is installed on PC and have reach...
A python based script to generate report if there are double logging on FMC ACP (logging at beginning and end), having rule action "Allow" or "Trust". (Option1 )
Also, the logging at the begging will be disabled if logging is detected for both beginning ...