Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello everybody,I have the case where a backup was interrupted by a Firepower-Modulein a ASA by IPS. It recogniced a "eicar test string download attempt"Event Information
Event POLICY-OTHER eicar test string download attempt (1:37732:4)
Timestamp 202...
Hi guys,I have an issue with a Firepower 1010 (running 6.5) and the FDM.I have a long list with public IP addresses (one address per line) and need to create a Blacklist in the FDM (FMC cannot be used there).When I go in FDM under Policies > Security...
Hi guys,I have just a short question:How can a realize a blocking for a long list of IP addresses without entering them manually one by one.The list is here:https://paste.cryptolaemus.com/emotet/2019/06/21/emotet-malware-IoCs_06-21-19.htmlIs there a ...
Hi guys,today I am faced with a NAT issue and want to ask you for your valued advice.An external host (and only this host) should access the outside interface of the ASA (OS rel. 8.4(7)30) and this should be translated to an internal server for ALL k...
Hi guys,today I am faced with a NAT issue and want to ask you for your valued advice.An external host (and only this host) should access the outside interface of the ASA (OS rel. 8.4(7)30) and this should be translated to an internal server for all k...
Hi Rahul, thanks for your hint! Are you sure that a 1:1 NAT with the outside interface is not possible if the ASA can recognize the source IP address and just NAT if it is a certain one? The host with this source IP do not use AnyConnect. Theoretical...
Hi adufresneb, thanks for the hint!@everyone:Even without the possibility of the packet tracer tool there is the quesition:Do I need to use NAT (and if yes what kind) when transfering traffic betweenthe DMZ interfaces of the Firepower in the given si...
Hi RJI, thanks for the hints!I found the reason in the NAT because the existing 'nat (outside,outside)' command was insufficient. The Packet tracer pointed to an ACL and sent me to the wrong trace Thanks a lot!