Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I have usernames starting with special characters e.g '*' and having trouble configuring them for LDAP within FMC. For the Web UI - we configured the 'user name template' as %s under the External Authentication object and are excluding the special ch...
Hello All,
The upgrade of FMC from v6.0.1.2 to v6.1.0.3 has messed up the rule import timestamp for all the intrusion rules in the intrusion policy.
1. Checking the 'comments' section for the rule shows the rule import time 'Time' as 12/31/1969 for...
Hello All,
Is there an easy way to update the network objects in FMC other than manually creating/updating each one by one? We have hundreds of network objects that we would like to import from Infoblox but I cannot see an easy way to do it currently...
I'm currently looking at creating a backup and restore plan for the FMC and firepower sensors. I want to ensure that we have all the configuration and events backed up in case of any disaster. I wanted to understand what we lose if we do not backup t...
Hello All, I was evaluating the User Agent and thinking about implementing 'User Control' functionality in Sourcefire. Can someone who has already implemented this in their environments provide some use-cases where 'user control' proves to be useful?...
Thanks for the comments. We are already sending events over to a SIEM from the FMC. I'm not concerned about the configuration since we are regularly backing up the FMC externally. My only concern is missing events which are not sent over to FMC from ...
Was anyone able to open a Cisco case opened to detect this? Few of which we are seeing are below. These are still continuing throughout this morning.
W32.Auto.357267.182447.in01W32.Auto.83c528.182440.in01W32.Auto.61CF22.182446.in02W32.Auto.9ca11c.18...
Thanks, but the vulnerabilities data in defense center is not the exact same data. It lists down the vulnerabilities based on the information it sees in the packet (e.g OS version etc.) and correlates with its vulnerability DB to list the vulnerabili...