10-21-2020 03:17 PM
I have a someone asked this below today...
Does following commands on ASA with Firepower make traffic bypass the Firepower inspection?
His setup is fairly simple which has "permit ip any any" in class-map/policy-map for firepower redirection. There are two interfaces on ASA: Inside interface with Security level 100 and outside interface with security level 0. No Specific ACL configured on inside interface (just the implicit allow traffic to lower security level interface) and some ACLs configured on the outside interface.
I know ASA with "same-security-traffic intra-interface" command would still check traffic with the ACLs but his inside interface does not have any explicitly defined ACLs. So will the "implicit allow" count as ACL/Firewall rule so that traffic would be redirected to firepower before exiting out the same inside interface?
Regarding "sysopt connection permit-vpn" feature, ASA would allow decrypted user VPN traffic bypass the ACL on the outside interface. But will the traffic still be redirected to firepower?
I wanted to test these but I do not have ASA with Firepower in lab... Hope someone could clarify.
10-21-2020 04:15 PM - edited 10-21-2020 04:17 PM
The traffic will still be sent to FirePOWER module for inspection. In case of VPN traffic, the traffic will hit the ASA outside interface, being decrypted, and then sent to the FirePOWER module for inspection. If the traffic is not hitting any security policy to drop it, it will be sent back to the ASA, and then will be sent out the inside interface. Similar would happen for the traffic coming from and exiting the inside interface as well. The command same-security-traffic intra-interface is just to allow the traffic to get in and out of the same interface, but it does imply any security bypass at all. Instead the command sysopt connection permit-vpn is to allow the VPN traffic to bypass the L3/L4 ACLs applied to the ASA interface, but also here, it won't imply any inspection bypass.
10-22-2020 12:26 AM
10-22-2020 04:53 AM - edited 10-22-2020 07:14 AM
Thanks, I agree as far as the traffic matches an permit ACL on the inbound traffic path interface, it would be trying to sent the traffic to firepower. But will the default implicit permit on inside interface count as the permit ACL? If so, then the answer for this is clear...
I could try the packet tracer for the user VPN traffic. But my understanding is "sysopt connection permit-vpn" would bypass the ACL on the inbound interface which is outside. According to the flow chart below, only traffic matches the inbound interface permit ACL would be redirected to firepower...Am I wrong? If decrypted VPN traffic bypasses the outside interface ACL (permit or deny), would it still be redirected to firepower as well?
10-22-2020 05:09 AM
According to the flow chart below, only traffic matches the inbound interface permit ACL would be redirected to firepower...Am I wrong?
Of course traffic would need to pass the interface level ACL, but after it passes the interface ACL it would still need to match the ACL configured in the policy map for redirection to Firepower. All commands that have so far been mentioned are commands related to interface level access. Also, sysopt and same-security-level commands are also at interface level so these cannot exempt traffic from being passed to Firepower.
Packet tracer will show if traffic is being redirected to Firepower in the additional comments section of each step. However, if you want to check traffic that has entered Firepower you will need to login to the SFR module and run system support firewall-engine-debug and / or system support trace
10-22-2020 12:48 AM
All the commands you have posted are related to interface level access. Redirection to the Firepower module is configured under the policy-map. As long as the policy-map is configured to redirect traffic and the ACL that is configured for that policy-map is being match, then all traffic matching that ACL will be redirected to the Firepower module.
config example:
access-list fpr-redirect extended permit ip any any
class-map Firepower
match access-list fpr-redirect
policy-map global_policy
class Firepower
sfr fail-open
10-22-2020 04:54 AM
Only traffic matches input interface permit ACL would be examed against the class-map/policy-map for firepower inspection redirection.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide