<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The answer to the redundancy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644707#M1027672</link>
    <description>&lt;P&gt;The answer to the redundancy question&amp;nbsp;is to get a second Defense Center and configure a High Availability pair. &amp;nbsp;Generally, protecting against&amp;nbsp;failure in the management network is not a need we see while&amp;nbsp;recovering from failure of the entire device/datacenter is a more common requirement.&lt;/P&gt;&lt;P&gt;Events are queued on the device(s) in case of a failure in the management connection to the Defense Center.&lt;/P&gt;&lt;P&gt;That being said, with version 5.4 there are several options for configuring the eh0 and eth1 management interfaces. &amp;nbsp;You can split up management and event traffic or use both of them to process management and event traffic. &amp;nbsp;This allows for faster event rates as well as redundancy. &amp;nbsp;My advice is to look in the help or the FireSIGHT System User Guide&amp;nbsp;and search for "management interfaces" you will find several pages there with diagrams on how the various traffic channels can be used.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 25 Mar 2015 22:37:03 GMT</pubDate>
    <dc:creator>atatistc</dc:creator>
    <dc:date>2015-03-25T22:37:03Z</dc:date>
    <item>
      <title>FS4000 interface bonding</title>
      <link>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644704#M1027666</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;I have a FireSIGHT 4000 mgmt appliance. Anyone knows how to configure a bond (ether-channel) to this appliance? Currently there is not much documentation on the cisco site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Matthias&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644704#M1027666</guid>
      <dc:creator>Matthias Jeker</dc:creator>
      <dc:date>2019-03-12T12:38:48Z</dc:date>
    </item>
    <item>
      <title>Never heard of trying to do</title>
      <link>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644705#M1027668</link>
      <description>&lt;P&gt;Never heard of trying to do an ether-channel to the management interface of a Defense Center (FSMC). &amp;nbsp;It's a 1Gb port and while there are two, the purpose of using the second one is to allow splitting up web UI management and event traffic - not to double the throughput of the management interface. &amp;nbsp;The bottom line is ether-channel is not available on management devices. &amp;lt;-- Correcting myself, you actually can increase the throughput/redundancy of the management connection in v 5.4 by using the second interface. (still don't think ether-channel is supported though)&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2015 21:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644705#M1027668</guid>
      <dc:creator>atatistc</dc:creator>
      <dc:date>2015-03-25T21:33:38Z</dc:date>
    </item>
    <item>
      <title>This is frustrating, isn't it</title>
      <link>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644706#M1027670</link>
      <description>&lt;P&gt;This is frustrating, isn't it? The customer bought a mgmt appliance for 100k and in case of a link failure he loses the ability to collect data?:/ Maybe there is any buffer or something like that on the modules it self? Couldn't find it in the documentation.&lt;/P&gt;&lt;P&gt;I configured it manually in the underlying Linux. It works without any problems (the FSMC doesn't recognize the bond interface in the GUI but that doesn't matter).&lt;/P&gt;&lt;P&gt;Maybe I will go with the recommended solution and just split the mgmt and even traffic. Or is it possible to enable the mgmt and the event traffic on both interfaces to have some kind of redundancy?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2015 21:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644706#M1027670</guid>
      <dc:creator>Matthias Jeker</dc:creator>
      <dc:date>2015-03-25T21:33:39Z</dc:date>
    </item>
    <item>
      <title>The answer to the redundancy</title>
      <link>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644707#M1027672</link>
      <description>&lt;P&gt;The answer to the redundancy question&amp;nbsp;is to get a second Defense Center and configure a High Availability pair. &amp;nbsp;Generally, protecting against&amp;nbsp;failure in the management network is not a need we see while&amp;nbsp;recovering from failure of the entire device/datacenter is a more common requirement.&lt;/P&gt;&lt;P&gt;Events are queued on the device(s) in case of a failure in the management connection to the Defense Center.&lt;/P&gt;&lt;P&gt;That being said, with version 5.4 there are several options for configuring the eh0 and eth1 management interfaces. &amp;nbsp;You can split up management and event traffic or use both of them to process management and event traffic. &amp;nbsp;This allows for faster event rates as well as redundancy. &amp;nbsp;My advice is to look in the help or the FireSIGHT System User Guide&amp;nbsp;and search for "management interfaces" you will find several pages there with diagrams on how the various traffic channels can be used.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2015 22:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644707#M1027672</guid>
      <dc:creator>atatistc</dc:creator>
      <dc:date>2015-03-25T22:37:03Z</dc:date>
    </item>
    <item>
      <title>Thanks a lot for your help</title>
      <link>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644708#M1027674</link>
      <description>&lt;P&gt;Thanks a lot for your help and the clarifications. We currently have two FS4000 appliances for redundancy. I just wanted to have some link redundancy to prevent from a failover in case of a link failure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured it in the following manner:&lt;/P&gt;&lt;P&gt;eth0 -&amp;gt; Events only address x.x.x.x&lt;/P&gt;&lt;P&gt;eth1 -&amp;gt; Mgmt only address y.y.y.y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i pull off eth0 -&amp;gt; both addresses stops from responding (if I do an "ifup eth0" then the address y.y.y.y starts responding. I have no idea how to configure it for failover, loadsharing. It just doesn't work for me. Please not that this is a fresh box (no changes before I tried this).&lt;/P&gt;&lt;P&gt;When i pull off eth1 -&amp;gt; address x.x.x.x stops from responding, address y.y.y.y is reachable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for your helpful answers. I really appreciate that!&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2015 10:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fs4000-interface-bonding/m-p/2644708#M1027674</guid>
      <dc:creator>Matthias Jeker</dc:creator>
      <dc:date>2015-03-26T10:17:10Z</dc:date>
    </item>
  </channel>
</rss>

