<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sorry but your concern was: in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934321#M1018723</link>
    <description>&lt;P&gt;Sorry but your concern was:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In case this machine fails then whole network will be down. There will be no internet access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;internet access is performed by your firewall, not your management server&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2016 11:12:15 GMT</pubDate>
    <dc:creator>pieterh</dc:creator>
    <dc:date>2016-10-13T11:12:15Z</dc:date>
    <item>
      <title>FireSight Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934318#M1018720</link>
      <description>&lt;P&gt;We have Cisco ASA Firewall 5506-X with FirePower. Firesight in installed on a Virtual Machine. There is only one physical machine for the Firesight. In case this machine fails then whole network will be down. There will be no internet access. We are thinking for a second physical machine to host Firesight so that if one them fails the second one can takeover. We are not sure how to achieve this. Any suggestion will be highly appreciated. We are only using virtual machines not any Cisco Firesight appliance.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934318#M1018720</guid>
      <dc:creator>sultan.ahmed21</dc:creator>
      <dc:date>2019-03-12T13:09:39Z</dc:date>
    </item>
    <item>
      <title>do you mean the firesight</title>
      <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934319#M1018721</link>
      <description>&lt;P&gt;do you mean the firesight&amp;nbsp;management server&amp;nbsp;is installed on a&amp;nbsp;virtual machine?&lt;/P&gt;
&lt;P&gt;The firepower module in the 5506-x receives its configuration&amp;nbsp;from the management server, but otherwise it runs independantly.&lt;/P&gt;
&lt;P&gt;(of course no updates when management server is down)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;what you need is a second 5506-x and configure this as failover pair.&lt;/P&gt;
&lt;P&gt;then use firesight management to keep the firesight configuration consistant on both firepower modules in the 5506-x (distribute the policy to both modules)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 10:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934319#M1018721</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2016-10-13T10:41:18Z</dc:date>
    </item>
    <item>
      <title>Firesight Management Server</title>
      <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934320#M1018722</link>
      <description>&lt;P&gt;Firesight Management Server is installed on a Virtual Machine. We want redundancy for Firesight Management Server not for ASA 5506-X.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 11:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934320#M1018722</guid>
      <dc:creator>sultan.ahmed21</dc:creator>
      <dc:date>2016-10-13T11:01:35Z</dc:date>
    </item>
    <item>
      <title>Sorry but your concern was:</title>
      <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934321#M1018723</link>
      <description>&lt;P&gt;Sorry but your concern was:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In case this machine fails then whole network will be down. There will be no internet access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;internet access is performed by your firewall, not your management server&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 11:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934321#M1018723</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2016-10-13T11:12:15Z</dc:date>
    </item>
    <item>
      <title>That is true. But internet</title>
      <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934322#M1018724</link>
      <description>&lt;P&gt;That is true. But internet access is not allowed when Firesight is down. That is the policy. Unfiltered access to internet is not allowed. As soon as Firesight Management Centre is down, internet access is blocked.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 11:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934322#M1018724</guid>
      <dc:creator>sultan.ahmed21</dc:creator>
      <dc:date>2016-10-13T11:26:53Z</dc:date>
    </item>
    <item>
      <title>ok so a restiction in the</title>
      <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934323#M1018726</link>
      <description>&lt;P&gt;ok so a restiction in the policy needs the management server to be available.&lt;/P&gt;
&lt;P&gt;the management server can be configured in high-availability configuration see&amp;nbsp;&lt;A title="FireSIGHT System User Guide Version 5.4.1" href="http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/Managing-Devices.html#pgfId-7283431"&gt;this document&lt;/A&gt; you need to validate this for your&amp;nbsp;running version&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 11:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934323#M1018726</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2016-10-13T11:35:42Z</dc:date>
    </item>
    <item>
      <title>Sultan,</title>
      <link>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934324#M1018727</link>
      <description>&lt;P&gt;Sultan,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The FMC doesn't enforce the policy on the module. The policy sits on the module and all allowing and blocking is done by the module itself.&lt;/P&gt;
&lt;P&gt;The only thing you lose when the FMC is down is the ability to manage the module.&lt;/P&gt;
&lt;P&gt;I don't know what you mean by unfiltered access to the internet? When the FMC is down the internet access is still going to be filtered.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 19:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-redundancy/m-p/2934324#M1018727</guid>
      <dc:creator>michaellperrin</dc:creator>
      <dc:date>2016-10-14T19:28:54Z</dc:date>
    </item>
  </channel>
</rss>

