10-17-2015 02:48 AM - edited 03-11-2019 11:45 PM
hi,
i'm trying to redirect ALL traffic to a firepower module on an ASA5515x.
could someone advise what's the best way to do it or both achieve the same thing?
option 1:
class-map global-class
match any
policy-map global_policy
class global-class
sfr fail-open
OR
option 2:
access-list SFR_ACL extended permit ip any any
class-map SFR
match access-list SFR_ACL
policy-map global_policy
class SFR
sfr fail-open
Solved! Go to Solution.
10-17-2015 03:16 PM
There is also option three:
policy-map global_policy class class-default sfr fail-open
Although all three ways should work, I would consider this one the most elegant if you want all traffic to be sent to SFR.
10-17-2015 03:16 PM
There is also option three:
policy-map global_policy class class-default sfr fail-open
Although all three ways should work, I would consider this one the most elegant if you want all traffic to be sent to SFR.
10-17-2015 04:55 PM
hi karsten,
thanks for feedback!
how about whitelist an IP or subnet?
do you create a deny ACL on the ASA or everything is done on FireSight?
10-17-2015 11:22 PM
That depends on the sizing of your ASA.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide