C H A P T E R
7-1
Cisco ASA Series Firewall CLI Configuration Guide
7
ASA FirePOWER Module
This chapter describes how to configure the ASA FirePOWER module that runs on the ASA.
•
About the ASA FirePOWER Module, page 7-1
•
Licensing Requirements for the ASA FirePOWER Module, page 7-5
•
Guidelines for ASA FirePOWER, page 7-5
•
Defaults for ASA FirePOWER, page 7-6
•
Perform Initial ASA FirePOWER Setup, page 7-7
•
Configure the ASA FirePOWER Module, page 7-10
•
Managing the ASA FirePOWER Module, page 7-13
•
Monitoring the ASA FirePOWER Module, page 7-21
•
Examples for the ASA FirePOWER Module, page 7-23
•
History for the ASA FirePOWER Module, page 7-24
About the ASA FirePOWER Module
The ASA FirePOWER module supplies next-generation firewall services, including Next-Generation
Intrusion Prevention System (NGIPS), Application Visibility and Control (AVC), URL filtering, and
Advanced Malware Protection (AMP).
The ASA FirePOWER module runs a separate application from the ASA. The module can be a hardware
module (on the ASA 5585-X only) or a software module (all other models).
•
How the ASA FirePOWER Module Works with the ASA, page 7-1
•
ASA FirePOWER Management, page 7-5
•
Compatibility with ASA Features, page 7-5
How the ASA FirePOWER Module Works with the ASA
You can configure your ASA FirePOWER module using one of the following deployment models:
•
Inline mode—In an inline deployment, the actual traffic is sent to the ASA FirePOWER module, and
the module’s policy affects what happens to the traffic. After dropping undesired traffic and taking
any other actions applied by policy, the traffic is returned to the ASA for further processing and
ultimate transmission.
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......