02-19-2019 10:25 AM - edited 03-12-2019 07:18 AM
For firepower configured with Passive Interface to do Discovery, show Connection, Intrusion, File, and Malware events, do we need to configure any policies (Discovery, Access Control, Intrusion, Malware&File) similar to those needed for Inline deployments. I have an idea, but not sure about it, which is that the Access Policy assigned to the device, will have no rules, just the Default Action (Discover or IPS), but have no idea how the Malware&File Policy will be applied (if supported in this mode).
Thanks,
Wafik
02-19-2019 01:45 PM
For a passive sensor you would still have to write some policy to inspect, or perform discovery, on traffic. The difference would be that even if you were to make the policy inline, the sensor wouldn't be able to convict and drop traffic.
If you're just looking for passive sensing:
02-20-2019 06:12 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide