<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Firepower 4110 Clustering with ASA and FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970406#M1018385</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We have a pair of Cisco 4110 Firepower appliances and have them clustered for the ASA Security Module.&lt;/P&gt;
&lt;P&gt;There appears to be no options to add an additional Logical Device for the Firepower threat Defense Module, so can only assume this is not supported in an Active/Active state.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition on the ASA Module there is no Configuration Tab for Remote Access VPN.&lt;/P&gt;
&lt;P&gt;So my question is how do we incorporate the Threat Defense feature into the ASA, I'm assuming that this would be via the offload engine within Advanced Settings, but requires the ASA to be in Active/Standby mode, and the Firepower Threat Defense logical device will be available?&lt;/P&gt;
&lt;P&gt;Second question is would it have been better to purchase the Cisco ASA 5585X&amp;nbsp;with the FirePOWER Module to support all the regular features of the ASA as well as offloading inspection traffic to the FirePOWER module?&lt;/P&gt;
&lt;P&gt;I&amp;nbsp;have found a fair bit of documentation on the Cisco site but I tend to lose sight of where the reference to FTD and Clustering not being supported or RAS VPN not supported via the ASA or FXOS docs, so was hoping for some insight on here.&lt;/P&gt;
&lt;P&gt;Appreciate any clarity around the Firepower 4110 appliances support and configuration of the FTD and ASA combined features that are supported.&lt;/P&gt;
&lt;P&gt;We are running ASA v9.6(2) and FXOS 2.0.1(86).&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;Mark&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 13:57:41 GMT</pubDate>
    <dc:creator>Mark Massheder</dc:creator>
    <dc:date>2020-02-21T13:57:41Z</dc:date>
    <item>
      <title>Cisco Firepower 4110 Clustering with ASA and FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970406#M1018385</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We have a pair of Cisco 4110 Firepower appliances and have them clustered for the ASA Security Module.&lt;/P&gt;
&lt;P&gt;There appears to be no options to add an additional Logical Device for the Firepower threat Defense Module, so can only assume this is not supported in an Active/Active state.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition on the ASA Module there is no Configuration Tab for Remote Access VPN.&lt;/P&gt;
&lt;P&gt;So my question is how do we incorporate the Threat Defense feature into the ASA, I'm assuming that this would be via the offload engine within Advanced Settings, but requires the ASA to be in Active/Standby mode, and the Firepower Threat Defense logical device will be available?&lt;/P&gt;
&lt;P&gt;Second question is would it have been better to purchase the Cisco ASA 5585X&amp;nbsp;with the FirePOWER Module to support all the regular features of the ASA as well as offloading inspection traffic to the FirePOWER module?&lt;/P&gt;
&lt;P&gt;I&amp;nbsp;have found a fair bit of documentation on the Cisco site but I tend to lose sight of where the reference to FTD and Clustering not being supported or RAS VPN not supported via the ASA or FXOS docs, so was hoping for some insight on here.&lt;/P&gt;
&lt;P&gt;Appreciate any clarity around the Firepower 4110 appliances support and configuration of the FTD and ASA combined features that are supported.&lt;/P&gt;
&lt;P&gt;We are running ASA v9.6(2) and FXOS 2.0.1(86).&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;Mark&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:57:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970406#M1018385</guid>
      <dc:creator>Mark Massheder</dc:creator>
      <dc:date>2020-02-21T13:57:41Z</dc:date>
    </item>
    <item>
      <title>On a FirePOWER 4100 series</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970407#M1018393</link>
      <description>&lt;P&gt;On a FirePOWER 4100 series chassis you can only run a single logical device. Multiple logical devices are only supported on the FirePOWER 9300 which supports up to 3 security modules.&lt;/P&gt;
&lt;P&gt;So you have to choose between the ASA and FTD module types (or technically you could also deploy the RADware vDefense Pro but that's mostly for service providers).&lt;/P&gt;
&lt;P&gt;One or the other and never both.&lt;/P&gt;
&lt;P&gt;The ASA module does support remote access VPN on FirePOWER 4110. I have set one up personally just this month. Have you registered the chassis with smart licensing and applied the ASA licenses (base and 3DES-AES)?&lt;/P&gt;
&lt;P&gt;The ASA modules do support both HA and inter-chassis clustering on the 4100 series hardware.&lt;/P&gt;
&lt;P&gt;If you run FTD image, there is currently no support for remote access VPN. This is a high priority roadmap item for a future release (post-6.2). FTD does not currently support inter-chassis clustering but that should be in the 6.2 release.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 12:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970407#M1018393</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-11-10T12:59:14Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970408#M1018400</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;Many thanks for the informative response.&amp;nbsp; Smart Licensing is enabled&amp;nbsp;and applied to the ASA.&lt;/P&gt;
&lt;P&gt;Extract below:&lt;/P&gt;
&lt;P&gt;License mode: Smart Licensing&lt;/P&gt;
&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&lt;BR /&gt;Maximum VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; : 1024&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Active&lt;BR /&gt;Encryption-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: Enabled&lt;BR /&gt;Encryption-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;Security Contexts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: 10&lt;BR /&gt;Carrier&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: Disabled&lt;BR /&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: 10000&lt;BR /&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: Disabled&lt;BR /&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10000&lt;BR /&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10000&lt;BR /&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled&lt;BR /&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;BR /&gt;Total TLS Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10000&lt;BR /&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;BR /&gt;Cluster&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;/P&gt;
&lt;P&gt;Interestingly when using ASDM for the Firepower 4110 there is no Remote Access Configuration Tab compared with an ASA5520 please see attached screenshot.&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 8pt;"&gt;I did find this though in the ASA CLI config guide 9.6 - &amp;nbsp;&lt;B&gt;&lt;FONT face="Univers-CondensedBold" size="3"&gt;&lt;/FONT&gt;&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;"Unsupported Features with Clustering" - Remote access VPN (SSL VPN and IPsec VPN).&lt;/P&gt;
&lt;P&gt;&lt;FONT face="TimesNewRomanPSMT" size="2"&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 8pt;"&gt;&lt;B&gt;&lt;FONT face="Univers-CondensedBold" size="3"&gt;&lt;/FONT&gt;&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;Will keep reading and experimenting for now though.&lt;/P&gt;
&lt;P&gt;Thanks again for the response.&lt;/P&gt;
&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 13:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970408#M1018400</guid>
      <dc:creator>Mark Massheder</dc:creator>
      <dc:date>2016-11-10T13:59:57Z</dc:date>
    </item>
    <item>
      <title>Remote Access VPN is not</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970409#M1018408</link>
      <description>&lt;P&gt;Remote Access VPN is not supported when using ASA Clustering feature (active/active). Is there a reason for using clustering and not active/standby high availability?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 15:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970409#M1018408</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-11-10T15:01:17Z</dc:date>
    </item>
    <item>
      <title>The clustering (active/active</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970410#M1018414</link>
      <description>&lt;P&gt;The clustering (active/active) was to support dual BGP feeds presented to the Firepower 4110 at separate DC's for one project and the Remote Access VPN would have been to migrate a number of&amp;nbsp;EOL ASA's onto the Firepower 4110 as part of another project, but this&amp;nbsp;is looking less likely now.&lt;/P&gt;
&lt;P&gt;Many thanks for the responses.&lt;/P&gt;
&lt;P&gt;Much appreciated.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 15:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970410#M1018414</guid>
      <dc:creator>Mark Massheder</dc:creator>
      <dc:date>2016-11-10T15:22:20Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, need your inputs</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970411#M1018418</link>
      <description>&lt;P&gt;Hi Marvin, need your inputs on 4100 clustering with FTD , do we need to deploy clustering at FXOS layer or at FTD ( module level ) &amp;nbsp;? Or this has to be done on both ? Also, a recommended method to migrate from ASA 8.4 to FTD ? I can see Cisco Migration tool for FTD is only supporting ASA Code 9.1 and above. Any major configuration changes from 8.4 to 9.1 &amp;nbsp;hence probably i need to first upgrade my production ASA to 9.1 so that I could use migration tool. your thought pls.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 06:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970411#M1018418</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-04-18T06:11:16Z</dc:date>
    </item>
    <item>
      <title>Clustering is at the logical</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970412#M1018421</link>
      <description>&lt;P&gt;Clustering is at the logical device level (i.e. FTD - &lt;STRONG&gt;not&lt;/STRONG&gt; FX-OS).&lt;/P&gt;
&lt;P&gt;If I were doing it, I'd actually do my best to avoid using the migration tool and instead migrate manually. I've heard very little good about the tool.&lt;/P&gt;
&lt;P&gt;If you really want to go that route then yes - simply upgrade your 8.4 ASA to 9.1 first. There are very few syntax changes; but the migration tool is quite particular about seeing exactly what it expects. Any variations, even seemingly inconsequential ones, will cause it to fail.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 06:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970412#M1018421</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-18T06:44:09Z</dc:date>
    </item>
    <item>
      <title>Hello Mark,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970413#M1018427</link>
      <description>&lt;P&gt;Hello Mark,&lt;/P&gt;
&lt;P&gt;Can you able to brief on steps to deploy the cluster on 4100 please ? I am in the process of deploying 4100 cluster for FTD . &amp;nbsp;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 00:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970413#M1018427</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-04-21T00:40:15Z</dc:date>
    </item>
    <item>
      <title>Once you have deployed the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970414#M1018431</link>
      <description>&lt;P&gt;Once you have deployed the individual ASA logical devices you simply interconnect and cluster them no differently than you would with physical ASA appliances.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 10:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-4110-clustering-with-asa-and-ftd/m-p/2970414#M1018431</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-21T10:28:16Z</dc:date>
    </item>
  </channel>
</rss>

