<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTD with two outside interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-with-two-outside-interfaces/m-p/3696779#M1004680</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to configure an Firepower 2110 so that it has two Ouside interfaces.&lt;/P&gt;
&lt;P&gt;Offcourse, I will put an Default Gateway route on interface Outside_1 and I wil have all my traffic go this direction. But I need e.g. that my second, Outside_2, interface be an AnyConnect gateway. What options do I have? I assume that FTD doesn't allow two active default routes to two different interfaces.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My idea is that I configure an&amp;nbsp;Router with Source and destination NAT on Outside_2 interface so that the FTD only sees that Router on this Interface but this would be just too complicated. Is there any other solutions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dejan&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:09:47 GMT</pubDate>
    <dc:creator>dejan_jov1</dc:creator>
    <dc:date>2020-02-21T16:09:47Z</dc:date>
    <item>
      <title>FTD with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/ftd-with-two-outside-interfaces/m-p/3696779#M1004680</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to configure an Firepower 2110 so that it has two Ouside interfaces.&lt;/P&gt;
&lt;P&gt;Offcourse, I will put an Default Gateway route on interface Outside_1 and I wil have all my traffic go this direction. But I need e.g. that my second, Outside_2, interface be an AnyConnect gateway. What options do I have? I assume that FTD doesn't allow two active default routes to two different interfaces.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My idea is that I configure an&amp;nbsp;Router with Source and destination NAT on Outside_2 interface so that the FTD only sees that Router on this Interface but this would be just too complicated. Is there any other solutions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dejan&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-with-two-outside-interfaces/m-p/3696779#M1004680</guid>
      <dc:creator>dejan_jov1</dc:creator>
      <dc:date>2020-02-21T16:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTD with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/ftd-with-two-outside-interfaces/m-p/3697201#M1004684</link>
      <description>You don't have another option. The source IPs are dynamic and the return&lt;BR /&gt;traffic will always go through default gateway. You option isn't too&lt;BR /&gt;complicated and commonly used. You can have multi-context deployment and&lt;BR /&gt;keep one-context for VPN use while the other one for internet.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Aug 2018 17:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-with-two-outside-interfaces/m-p/3697201#M1004684</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-08-29T17:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTD with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/ftd-with-two-outside-interfaces/m-p/3716144#M1004685</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I configured PBR over FlexConfig on this Firepower so it solved this problem. The FlexConfig was a little bit tricky to configure but at the end it’s functioning as expected. The issue that I think that I still have here is that the FlexConfig isn’t really supported. From the FMC Configuration Guide:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"&lt;SPAN class="searchMark primary"&gt;Flex&lt;/SPAN&gt;&lt;SPAN&gt;Config features may become deprecated at any time. For fully guaranteed feature support, you must wait for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Firepower Management Center&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;support. When in doubt, do not use&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="searchMark primary"&gt;Flex&lt;/SPAN&gt;&lt;SPAN&gt;Config policies.&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/flexconfig_policies.html?bookSearch=true#id_39808" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/flexconfig_policies.html?bookSearch=true#id_39808&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope the migration from FlexConfig will not be painfull...&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 10:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-with-two-outside-interfaces/m-p/3716144#M1004685</guid>
      <dc:creator>dejan_jov1</dc:creator>
      <dc:date>2018-10-01T10:32:15Z</dc:date>
    </item>
  </channel>
</rss>

