11-05-2017 07:24 PM - edited 02-21-2020 06:39 AM
Just wondering if the 2100 Firepower appliance is running in transparent mode and we allow all traffic through, how does it protect the traffic from malicious activity?
Solved! Go to Solution.
11-06-2017 07:36 PM
You just select the Default Action as shown below when creating your Access Control Policy:
12-04-2017 08:15 AM
Since it is not terminating the VPN it can do very little other than confirm that the packets conform to the IPsec protocol specification.
11-05-2017 10:52 PM
Even if you don't have any block rules in your access control policy you should at the very least have a default Intrusion policy and use the Security Intelligence feed.
Most customers use the "balanced security and connectivity" intrusion policy. That intrusion policy will block intrusions with CVSS score 9 or greater from the current and past 2 years.
Please refer to Cisco Live presentation BRKSEC-3300 for more details.
11-06-2017 11:15 AM
11-06-2017 07:36 PM
You just select the Default Action as shown below when creating your Access Control Policy:
11-07-2017 11:06 AM
Thank you Marvin. It was helpful.
12-04-2017 07:51 AM
Just curious if the Firepower can inspect Site-to-Site VPN through the Firepower. Is there anything special that needs to be for it?
12-04-2017 08:15 AM
Since it is not terminating the VPN it can do very little other than confirm that the packets conform to the IPsec protocol specification.
12-04-2017 08:33 AM
Ok, thank you Marvin.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide