cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
700
Views
10
Helpful
5
Replies

LocalFW ACL Vs Firesight Pushed ACL

orielrose
Level 1
Level 1

Hi Guys

If we have a Network policy pushed from Firesight to ASA and it has got a local policy applied on the interface, which would take precedence ?

Also is there any way we could check on the ASA what policy it has received from Firesight ?

2 Accepted Solutions

Accepted Solutions

Marvin Rhoads
Hall of Fame
Hall of Fame

How are you pushing a policy to the ASA from Firesight?

Do you mean you have a policy pushed to the ASA's FirePOWER service module?

In that case, they are quite separate things. The ASA evaluates ingress and egress interface ACLs when the packet is presented to the interface. The service module evaluates the flow against its policies when it receives the packet from the parent ASA as part of the policy-map.

So it's not one or the other, it's both and the net result is their cumulative policy when applied in series (like a Boolean logical "AND").

See this link for a picture:

https://ccie-or-null.net/2014/12/10/packet-flow-with-firepower/

View solution in original post

You're welcome.

They are complimentary.

Think of the ASA ACL as your first tool in blocking intruders. Prevent random port scanners and such.

For those incoming connections on legitimate ports that are permitted by an ACL, the FirePOWER module can then do a payload inspection at layer 4+ to check for protocol conformance and malicious content.

Please rate useful replies and mark your question as answered when it has been.

View solution in original post

5 Replies 5

Marvin Rhoads
Hall of Fame
Hall of Fame

How are you pushing a policy to the ASA from Firesight?

Do you mean you have a policy pushed to the ASA's FirePOWER service module?

In that case, they are quite separate things. The ASA evaluates ingress and egress interface ACLs when the packet is presented to the interface. The service module evaluates the flow against its policies when it receives the packet from the parent ASA as part of the policy-map.

So it's not one or the other, it's both and the net result is their cumulative policy when applied in series (like a Boolean logical "AND").

See this link for a picture:

https://ccie-or-null.net/2014/12/10/packet-flow-with-firepower/

Marvin

Thank you so much that makes it really clear. One more question just to double check, if we have Firepower Access-control policy we really don't need ASA ACE ? I don't see advantage of filtering something twice ?

You're welcome.

They are complimentary.

Think of the ASA ACL as your first tool in blocking intruders. Prevent random port scanners and such.

For those incoming connections on legitimate ports that are permitted by an ACL, the FirePOWER module can then do a payload inspection at layer 4+ to check for protocol conformance and malicious content.

Please rate useful replies and mark your question as answered when it has been.

hi i have the similar question about the ACL policy under firesight.  How granular does the ACL in the firesight has to be?  should i duplicate the exact copy (line by line) of the ACL in the ASA to the firesight?  

They dont have to be as granular as your asa ACLs. In case you want to block malware / files using File Policy, block URL categories etc you might wanna use a single rule for all your traffic or a more granular one if you want to enable IPS for certain flows.

Review Cisco Networking for a $25 gift card