Adding Cisco ASA is very good, but ASA line up will be soon EOL and replaced with FirePower 2100, 4100, etc. It would beneficial to add support for FirePower and Palo Alto deep Integration support for things like VPN Tunnels, ACL Filters, etc.
Yes. Add Palo Alto!
FirePower Support as part of the enhanced ASA monitoring please. We are planning to move to fire power in the next quarter as i'm sure most ASA users will be.
Yes this should be done asap
this would be great for both please....
A good read for all...
Firepower 2100 – The Architectural “Need to Know”
D
Yep, this is coming for us as well. I like the ASA stuff and this is going to be crucial going forward.
Bump
A must supported device should be in NPM now.
We got both FirePower and Palo Altos. Just got NPM the other day. Tomorrow we will be replacing our ASAs with FirePower 4110s so I will be loosing all the nice ASA features I just got!
Sadly, unless I don't properly understand NCM and its inability to support FTD and FCM, you'll discover you've also lost your ability to manage, alert on, and restore firewall configuration changes.
Or, are you putting ASA software on your 4110's instead of FTD software? In that case you might not be so badly off . . .
A must have. More fire power always desired
This is a critical function needed. We have many customers, more of whom are moving to Cisco FirePower and others who are PaloAlto users.
Moving to Firepower AS firewalls next quarter as well, please add more support.
Actually the Cisco ASA 5500-X with FirePOWER Services line is not end of life and has none set as yet. I am a state government employee and we cannot use the 2100 or the 4100 series as they have not been given the FIPS 140-2 certification yet.
Is this link useful to your concern?
FIPS 140 - Cisco
I've been having troubles getting Cisco 2130 FTD to integrate with SW even to gather basic list of interfaces. SW says to ask Cisco to change where they are storing their interface information within SNMP. (Really?). Cisco says upload the MOBS into Solarwinds. Would really love to use SW to monitor these fitrewalls.
I vote to add FTD to SolarWinds to backup/monitor etc...
Yes, please add support for the Cisco Firepower:
More specifically, complete Firepower support both ASA-OS and FXOS sides. It looks like the FX side snmp configuration is either buggy or is incomplete. I currently have a TAC case open and I am either going to have Cisco TAC or my Account Manager to send a message to the Cisco Business Unit to add better snmp support that mirrors the ASA or Nexus.
Yes please (support for the Cisco Firepower Management Center and the individual sfr modules on the ASA's) Thanks You.
Please add support for the Cisco Firepower Management Center and the individual ASA's.
yes Cisco Firepower 6.2.x and higher Please! As well as asas Thank You
Cisco FMC/FTD monitoring via NPM.
YES! Palo Alto support PLEASE!
Bump. We're doing more FirePOWER with FTD than planning on keeping ASA's in "ASA-mode". More and more of our ASA's are being upgraded to FirePOWER solutions, and our firewall purchases are all going to be managed via FMC.
Better support of this branch of Cisco's solutions is something we need from SolarWinds.
Yes! Cisco FMC and FTD monitoring please.
Yes please add some support for Cisco FMC and FTD. Slowly losing any visibility to our firewalls in Solarwinds as each of our ASAs get replaced with an FTD.
YES!!! Add Firepower, please.
Connection Event logs from Cisco FirePower are an absolute must.
The WebTrafficAudit event misses a lot of traffic.
Please add support for Firepower devices! Thanks!!!!!!!!
Firepower, please!
One vote for adding Firepower monitoring..
Next vote for Cisco FMC and FTD monitoring.