<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FIREPOWER 2130 EIGRP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3837397#M1013833</link>
    <description>&lt;P&gt;I've not done EIGRP authentication on any of my deployments.&lt;/P&gt;
&lt;P&gt;Have you checked the running-config section specific to authentication ("show running-config authentication") to validate that your Flexconfig is pushing what you want? You should have something like:&lt;/P&gt;
&lt;PRE&gt;authentication key eigrp 10 cisco123 key-id 1 
authentication mode eigrp 10 md5&lt;/PRE&gt;
&lt;P&gt;If that's confirmed there already, then I suspect a bug may indeed be the case.&lt;/P&gt;</description>
    <pubDate>Fri, 12 Apr 2019 05:58:27 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-04-12T05:58:27Z</dc:date>
    <item>
      <title>FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3724132#M1013823</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd like to know if the last firepower 2130 OS is EIGRP compatible nativly or only using Flexconfig ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it is not native can we have an ASA OS on an firepower appliance ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;strange question I know but EIGRP is absolutely needed by my customer ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thks for help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3724132#M1013823</guid>
      <dc:creator>bayela001</dc:creator>
      <dc:date>2019-03-12T14:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3724191#M1013825</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the EIGRP is still only possible over FlexConfig to configure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/flexconfig_policies.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/flexconfig_policies.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, you can run an ASA OS on 2100 Firepower:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/fp2100/asa-2100-gsg/getting-started.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/fp2100/asa-2100-gsg/getting-started.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Fri, 12 Oct 2018 08:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3724191#M1013825</guid>
      <dc:creator>dejan_jov1</dc:creator>
      <dc:date>2018-10-12T08:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3724360#M1013826</link>
      <description>&lt;P&gt;For a Firepower appliance running FTD you can only configure EIGRP via using FlexConfig. Note that it is limited to being an EIGRP stub. Other than that it works fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can run ASA OS on a Firepower appliance and configure EIGRP. However if you do you will NOT be able to run a Firepower service module - only the base ASA.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Oct 2018 13:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3724360#M1013826</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-12T13:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3833399#M1013828</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm having problems with getting EIGRP working on a FPR2120.&lt;/P&gt;&lt;P&gt;I've configured it using Flexconfig and when looking at the running-config, ie show running-config router eigrp, I can see that the configuration has been applied to the firewall.&lt;/P&gt;&lt;P&gt;&amp;gt; show running-config router eigrp&lt;BR /&gt;router eigrp 13&lt;BR /&gt;eigrp router-id 10.57.63.201&lt;BR /&gt;eigrp stub static redistributed&lt;BR /&gt;network 192.168.6.0 255.255.255.0&lt;BR /&gt;network 10.57.47.0 255.255.255.224&lt;BR /&gt;network 172.17.48.0 255.255.255.192&lt;BR /&gt;network 10.57.48.0 255.255.255.0&lt;BR /&gt;network 10.57.49.0 255.255.255.0&lt;BR /&gt;network 10.57.56.0 255.255.255.192&lt;BR /&gt;network 10.57.56.96 255.255.255.224&lt;BR /&gt;network 10.57.63.200 255.255.255.248&lt;BR /&gt;network 10.57.63.216 255.255.255.248&lt;BR /&gt;network 10.57.63.248 255.255.255.248&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;However, looking at the routing tables, I don't see any EIGRP routes and only the static, connected, routes.&lt;/P&gt;&lt;P&gt;Is there something else that's required to kick off the EIGRP routing? The previous ASA5515 that the 2120 is replacing has had no problems at all.&lt;/P&gt;&lt;P&gt;Much appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 06:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3833399#M1013828</guid>
      <dc:creator>rhuysmans</dc:creator>
      <dc:date>2019-04-06T06:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3833723#M1013830</link>
      <description>&lt;P&gt;There's nothing special that needs to be added above and beyond what your configuration has. Have you checked the interfaces on the expected peers to confirm they match up?&lt;/P&gt;
&lt;P&gt;You could do a capture on one of the expected peering interfaces and see the eigrp packets and possibly determine why peering adjacency isn't establishing.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2019 13:15:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3833723#M1013830</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-04-07T13:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3834678#M1013832</link>
      <description>Hi Marvin,&lt;BR /&gt;&lt;BR /&gt;thanks for the information. I was given access to the L3 switch, that the&lt;BR /&gt;new 2120s connect to, and can see that EIGRP authentication has been&lt;BR /&gt;configured on it. I was thinking, great, no problems, I'll configure&lt;BR /&gt;authentication using the Flexconfig and all will be well.&lt;BR /&gt;I did configure the authentication on the 2120, and it matches the L3&lt;BR /&gt;switch identically, however on both devices I am getting authentication&lt;BR /&gt;errors (code 5). I have tried everything, different Flexconfig approaches,&lt;BR /&gt;new key-chains on the L3 switch but the two devices will not talk&lt;BR /&gt;together. I did remove the authentication and EIGRP works. The 2120&lt;BR /&gt;receives all the routes and it's good. Put authentication back on and the&lt;BR /&gt;Code 5 error msg appears. When I put the old firewall (5515) back in then&lt;BR /&gt;EIGRP pops up no problems. It uses the EIGRP authentication as well and&lt;BR /&gt;has been working for years.&lt;BR /&gt;&lt;BR /&gt;To me it seems like a bug with 6.3.0.2. Because the FPR2120 is brand new&lt;BR /&gt;with only warranty so far I can't raise a TAC case.&lt;BR /&gt;&lt;BR /&gt;Have you seen this type of problem before?&lt;BR /&gt;&lt;BR /&gt;Many thanks for your assistance.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 09 Apr 2019 03:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3834678#M1013832</guid>
      <dc:creator>rhuysmans</dc:creator>
      <dc:date>2019-04-09T03:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3837397#M1013833</link>
      <description>&lt;P&gt;I've not done EIGRP authentication on any of my deployments.&lt;/P&gt;
&lt;P&gt;Have you checked the running-config section specific to authentication ("show running-config authentication") to validate that your Flexconfig is pushing what you want? You should have something like:&lt;/P&gt;
&lt;PRE&gt;authentication key eigrp 10 cisco123 key-id 1 
authentication mode eigrp 10 md5&lt;/PRE&gt;
&lt;P&gt;If that's confirmed there already, then I suspect a bug may indeed be the case.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2019 05:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3837397#M1013833</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-04-12T05:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3837422#M1013834</link>
      <description>Thanks Marvin,&lt;BR /&gt;&lt;BR /&gt;yes, I've checked the Flexconfig and it is pushing exactly what I need. I&lt;BR /&gt;believe that there's an issue with the Flexconfig "secret key" parameter&lt;BR /&gt;and how the router sees this. Also how the 2120 reads the router's 7&lt;BR /&gt;encrypted key as well, as both sides are displaying authentication errors.&lt;BR /&gt;&lt;BR /&gt;I believe that this is a bug and will contact Cisco about it.&lt;BR /&gt;&lt;BR /&gt;Many thanks for the support.&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Apr 2019 07:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3837422#M1013834</guid>
      <dc:creator>rhuysmans</dc:creator>
      <dc:date>2019-04-12T07:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3880618#M1013835</link>
      <description>&lt;P&gt;For anyone else having the same issue, I ran in to this also. After entering in the key in to the EirgpAuthKey text object, it wouldn't apply in the config, a default of "cisco123" was being applied.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;What I had to do was edit the flexconfig object "Eigrp_Interface_Configure_1" I created, Click the "Insert" option and select "Insert Secret Key". This allows you to edit the value and enter in the correct key.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was able to verify from the cli (via "system support diagnostic-cli")&lt;/P&gt;&lt;P&gt;more system:running-config | inc key eigrp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 09:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3880618#M1013835</guid>
      <dc:creator>KeithCopeland</dc:creator>
      <dc:date>2019-06-27T09:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3942903#M1013836</link>
      <description>&lt;P&gt;Hi Marvin, I don't think EIGRP on FTD is limited to stub only, it should be the same as ASA. Do you have any evidence?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2019 22:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3942903#M1013836</guid>
      <dc:creator>darflore</dc:creator>
      <dc:date>2019-10-17T22:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: FIREPOWER 2130 EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3959893#M1013837</link>
      <description>&lt;P&gt;I'd like to find out if EIGRP is limited to stub or not, too. The latest &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/flexconfig_policies.html" target="_self"&gt;FMC 6.5 manual&lt;/A&gt; says:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="p"&gt;Eigrp_Configure&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;Configures EIGRP routing next-hop, auto-summary, router-id, eigrp-stub.&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;eigrpAS, eigrpNetworks, eigrpDisableAutoSummary, eigrpRouterId, eigrpStubReceiveOnly, eigrpStubRedistributed, eigrpStubConnected, eigrpStubStatic, eigrpStubSummary&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="p"&gt;Eigrp_Interface_Configure&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;Configures EIGRP interface authentication mode, authentication key, hello interval, hold time, split horizon.&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;eigrpIntfList, eigrpAS, eigrpAuthKey, eigrpAuthKeyId, eigrpHelloInterval, eigrpHoldTime, eigrpDisableSplitHorizon&lt;/P&gt;&lt;P class="p"&gt;Also uses the system variable SYS_FTD_ROUTED_INTF_MAP_LIST&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="p"&gt;Eigrp_Unconfigure&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;Clears EIGRP configuration for an autonomous system from the device.&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;—&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="p"&gt;Eigrp_Unconfigure_all&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;Clears all EIGRP configurations.&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="p"&gt;—&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it certainly can configure stub routing, but I'm not sure that means it's required.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Nov 2019 17:11:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-eigrp/m-p/3959893#M1013837</guid>
      <dc:creator>cweinhold</dc:creator>
      <dc:date>2019-11-17T17:11:50Z</dc:date>
    </item>
  </channel>
</rss>

