Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
We're having an issue with some old Polycom IP-331 Phones and ISE. ISE will not authenticate any Polycom Phones that show their MAC Address in the Data VLAN (21) AND Voice VLAN (22) on a switchport. When the MAC Address table for a port only shows th...
Cisco, when are you going to implement this feature? As cloud WAFs become more common, the need for Network Administrators to be able to see the original IP Address in the connection event logs is now critical. This feature has been requested since 5...
Google or Cisco planning to fix this? Been over a year and this problem still exists. The second workaround on Cisco's Bug Report does not work, and we do not wish to tunnel all dns.
I hate to necro such an old thread, but I don't feel like all of your questions were completely answered. I have the same thing going on with #2: "2. A show interface command shows Jumbo packets being transmitted on our 9k but MTU size still states 1...
It would be nice if you could get some feedback from the community because we have a similar issue and ISE will not authenticate any Polycom Phones that show their MAC Address in the Data VLAN (21) AND Voice VLAN (22) on a switchport. When the MAC Ad...
@noisey_uk wrote:
You can use the REST API to do this (and other bulk operations) relatively easily.
Useful links:
https://<FMC IP>/api/api-explorer/#featureect/urlgroups_POST
https://www.cisco.com/c/en/us/td/docs/security/firepower/ftd-api/guide/ftd...
This is good advice depending on what you want to accomplish. If you still want to see that traffic in your FirePower Events then you do not want to exclude that traffic on the ASA via Access List. If you don't care about seeing that traffic in FireP...