cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Who Me Too'd this topic

FirePower doesn't work when use Active Directory Group as a filter in Access Control Rule

suradech.por
Level 1
Level 1

I'm doing PoV of Cisco ASA with FirePower with my customer. I would like to integrate firepower to MS Active Directory. Everything seem work properly.


- Installation of Firepower user agent complete successfully. Connection to AD work fine. Log is GREEN.

- I created a Realm in FireSight and can download users and groups from Active Directory.

- I created an identity policy with passive authentication (using the Realm I've created)

- I can use AD "user" account as a filter in access control rule and it work just fine.

However if I create access control rule with AD "Group", the rule never get match. I'm sure that the user I test is a member of the group. Connection Event show that the system skip that rule and the traffic then is blocked by default action below. It look like Firepower doesn't know that the user belong to the group.

I'm using

- Firepower user agent for Active Directory v2.3 build 10.

- ASA 5515 Software Version 9.5(2)

- FirePower module version 6.0.0-1005

- Firepower Management Center for VMWare

Any suggestion would be appreciated. Thanks in advance.

Who Me Too'd this topic