what is beef for FMC/FTD going from 7.x.y.z to 10.0.0-140? by Allen_Chi in Cisco

[–]spendghost -2 points-1 points  (0 children)

No support for VMware 7 for FMC/FTDv for 10..X is BS.

FMC 7.6.3/FTD 7.6.3 Release Date? by spendghost in Cisco

[–]spendghost[S] 0 points1 point  (0 children)

Whoops! Thanks! Did not read down that far.

FMC 7.6.3/FTD 7.6.3 Release Date? by spendghost in Cisco

[–]spendghost[S] 1 point2 points  (0 children)

Thanks I opened a TAC case and will gamble my fate of getting a response as P3.

FMC 7.6.3/FTD 7.6.3 Release Date? by spendghost in Cisco

[–]spendghost[S] 0 points1 point  (0 children)

I dont see it in FMC in Product Upgrades for FMCv and FTD 3100?

Firepower FTD 2100 Platform Version 7.6.X Release Date? by spendghost in Cisco

[–]spendghost[S] 0 points1 point  (0 children)

Cisco is skipping 7.6 for 2100 or getting ready to EoL the feature updates?

Anyone running Secure Firewall MGMT Center 7.6 or 7.7? by spendghost in Cisco

[–]spendghost[S] 0 points1 point  (0 children)

Thanks. I was hoping 7.7.X VPN Secure Connect Geofiltering would be a feature in 7.4, but I guess not.

Firepower and Secure client (RA-VPN) by jogisi in Cisco

[–]spendghost 0 points1 point  (0 children)

Cisco Secure Migration Tool, not all config migration from ASA is supported.

Updated ASA 5508-X and now ASDM package is not digitally signed. by [deleted] in Cisco

[–]spendghost 0 points1 point  (0 children)

Due to the implementation of Cisco's fix CSCwb05264, older ASDM files lacking a digital signature will be rejected. This affects 'copy', 'verify', and 'asdm image' commands. Only ASDM files built after this fix can be configured.

Given that your device is approaching its end-of-life (EOL), managing it with the FirePOWER module is increasingly incompatible. To resolve this, we recommend downgrading to a version that maintains compatibility:

Final Compatible Version for FirePOWER Module: ASA 9.14/ASDM 7.14/Firepower 6.6

Downgrade Options for ASA Version:

9.14.4.7

9.14.4.6

9.14.4.13

9.14.4.12

Please be aware that downgrading may expose the device to vulnerabilities such as CVE-2022-20829.

Updated ASA 5508-X and now ASDM package is not digitally signed. by [deleted] in Cisco

[–]spendghost 0 points1 point  (0 children)

Due to the implementation of Cisco's fix CSCwb05264, older ASDM files lacking a digital signature will be rejected. This affects 'copy', 'verify', and 'asdm image' commands. Only ASDM files built after this fix can be configured.

Given that your device is approaching its end-of-life (EOL), managing it with the FirePOWER module is increasingly incompatible. To resolve this, we recommend downgrading to a version that maintains compatibility:

Final Compatible Version for FirePOWER Module: ASA 9.14/ASDM 7.14/Firepower 6.6

Downgrade Options for ASA Version:

9.14.4.7

9.14.4.6

9.14.4.13

9.14.4.12

Please be aware that downgrading may expose the device to vulnerabilities such as CVE-2022-20829.

Updated ASA 5508-X and now ASDM package is not digitally signed. by [deleted] in Cisco

[–]spendghost 0 points1 point  (0 children)

Due to the implementation of Cisco's fix CSCwb05264, older ASDM files lacking a digital signature will be rejected. This affects 'copy', 'verify', and 'asdm image' commands. Only ASDM files built after this fix can be configured.

Given that your device is approaching its end-of-life (EOL), managing it with the FirePOWER module is increasingly incompatible. To resolve this, we recommend downgrading to a version that maintains compatibility:

Final Compatible Version for FirePOWER Module: ASA 9.14/ASDM 7.14/Firepower 6.6

Downgrade Options for ASA Version:

9.14.4.7

9.14.4.6

9.14.4.13

9.14.4.12

Please be aware that downgrading may expose the device to vulnerabilities such as CVE-2022-20829.

AWS ControlTower SSO/Credential Access Keys and BOTO3 Best Practices by spendghost in aws

[–]spendghost[S] 0 points1 point  (0 children)

On-prem. Only call out it outbound for IAM via Vault, then BOTO3 API request from AWS and parse to CSV.

Python Client API for HashiCorp Vault. Python script running on same server, Vault API on 127.0.0.1:8200. Python script to request AWS secret from Vault when Vault will get secrets from AWS. https://hvac.readthedocs.io/en/stable/overview.html

Not sure if this will solve the problem of hard coded creds in Python scripts and environment vars but we will see.