<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower NGFW 2110 interfaces can you make them access ports? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-ngfw-2110-interfaces-can-you-make-them-access-ports/m-p/3357277#M1026926</link>
    <description>&lt;P&gt;Hi Dan,&lt;/P&gt;
&lt;P&gt;I never actually tried it on the firepower, but should be similar to the ASA BVI setup.&lt;/P&gt;
&lt;H3 class="topictitle3"&gt;About Routed Firewall Mode&lt;/H3&gt;
&lt;SECTION&gt;
&lt;P&gt;&lt;A name="ID-2106-0000000a__ID-2106-0000000b" target="_blank"&gt;&lt;/A&gt;In routed mode, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firepower Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is considered to be a router hop in the network. Each interface that you want to route between is on a different subnet.&lt;/P&gt;
&lt;P&gt;With Integrated Routing and Bridging, you can use a "bridge group" where you group together multiple interfaces on a network, and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firepower Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;uses bridging techniques to pass traffic between the interfaces. Each bridge group includes a Bridge Virtual Interface (BVI) to which you assign an IP address on the network. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firepower Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;routes between BVIs and regular routed interfaces. If you do not need clustering or EtherChannel or redundant member interfaces, you might consider using routed mode instead of transparent mode. In routed mode, you can have one or more isolated bridge groups like in transparent mode, but also have normal routed interfaces as well for a mixed deployment.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;
&lt;/SECTION&gt;</description>
    <pubDate>Thu, 29 Mar 2018 07:34:48 GMT</pubDate>
    <dc:creator>Bogdan Nita</dc:creator>
    <dc:date>2018-03-29T07:34:48Z</dc:date>
    <item>
      <title>Firepower NGFW 2110 interfaces can you make them access ports?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ngfw-2110-interfaces-can-you-make-them-access-ports/m-p/3357205#M1026925</link>
      <description>&lt;P&gt;HI All, is it possible to connect lets say a host or server directly to one of the 1GB copper or SFP interfaces and use that port as an access port?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know typically the firewall ports are routed ports but, you can also make these ports trunking/sub-interfaces but, I would think you would need the host NIC to have a way to interpret the frames/vlans from the 2110.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone been able to connect to one of the 2110 interfaces and use as a switchport?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ngfw-2110-interfaces-can-you-make-them-access-ports/m-p/3357205#M1026925</guid>
      <dc:creator>dan hale</dc:creator>
      <dc:date>2020-02-21T15:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower NGFW 2110 interfaces can you make them access ports?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ngfw-2110-interfaces-can-you-make-them-access-ports/m-p/3357277#M1026926</link>
      <description>&lt;P&gt;Hi Dan,&lt;/P&gt;
&lt;P&gt;I never actually tried it on the firepower, but should be similar to the ASA BVI setup.&lt;/P&gt;
&lt;H3 class="topictitle3"&gt;About Routed Firewall Mode&lt;/H3&gt;
&lt;SECTION&gt;
&lt;P&gt;&lt;A name="ID-2106-0000000a__ID-2106-0000000b" target="_blank"&gt;&lt;/A&gt;In routed mode, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firepower Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is considered to be a router hop in the network. Each interface that you want to route between is on a different subnet.&lt;/P&gt;
&lt;P&gt;With Integrated Routing and Bridging, you can use a "bridge group" where you group together multiple interfaces on a network, and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firepower Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;uses bridging techniques to pass traffic between the interfaces. Each bridge group includes a Bridge Virtual Interface (BVI) to which you assign an IP address on the network. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firepower Threat Defense device&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;routes between BVIs and regular routed interfaces. If you do not need clustering or EtherChannel or redundant member interfaces, you might consider using routed mode instead of transparent mode. In routed mode, you can have one or more isolated bridge groups like in transparent mode, but also have normal routed interfaces as well for a mixed deployment.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Thu, 29 Mar 2018 07:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ngfw-2110-interfaces-can-you-make-them-access-ports/m-p/3357277#M1026926</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-29T07:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower NGFW 2110 interfaces can you make them access ports?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ngfw-2110-interfaces-can-you-make-them-access-ports/m-p/3357721#M1026927</link>
      <description>&lt;P&gt;Thanks for pointing me in the right direction however, it looks like creating BVI's is not supported on the 2100's.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"you cannot configure bridge groups on Firepower 2100 series or Firepower Threat Defense Virtual devices."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/fdm/fptd-fdm-config-guide-622/fptd-fdm-interfaces.html#id_35464" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/fdm/fptd-fdm-config-guide-622/fptd-fdm-interfaces.html#id_35464&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 18:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ngfw-2110-interfaces-can-you-make-them-access-ports/m-p/3357721#M1026927</guid>
      <dc:creator>dan hale</dc:creator>
      <dc:date>2018-03-29T18:39:45Z</dc:date>
    </item>
  </channel>
</rss>

