10-21-2018 12:26 PM - edited 03-12-2019 07:02 AM
Hi all
We are using ASA 5500-X firewalls with firepower services. They are installed and active in our network. During the FMC installation, default Access Control Policy is define with default action "Intrusion prevention: Balanced Security and Connectivity". We want to use firepower as an IPS, so i have few questions regarding initial configuration.
Is the system works as IPS as it is configured now with only default action "Intrusion prevention: Balanced Security and Connectivity" set?
Do we need to create custom intrusion policy and choose it in the default action of the default access control policy?
Should we first set default action "Network Discovery Only" and then switch to Intrusion prevention?
We have created custom intrusion policy with default configuration (Drop when inline, Base policy: Balanced Security and Connectivity). When we try to apply this policy in access control policy we are getting "No access control rules configured. Improve performance by setting this access control policy's default intrusion policy and variable set (pre-rule inspection) identically to its default action intrusion policy and variable set (post-rule inspection).
Thanks in advance!
10-24-2018 06:49 AM
Hi,
did you create Access Policy and selected the inspection using the policy you created? like the access policy below?
10-24-2018 08:19 AM
We have one Access Control Policy which was created during the installation process. There are no rules added until now and just set default action "Intrusion Prevention: Balanced Security and Connectivity". We didn't create newer policy afterwards.
10-24-2018 11:05 AM
You can add new policy in access rules
source inside destination outside
then enable the inspection as in the image and select your ips policy
that should be it
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide