<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTDv Integration with AWS Transit Gateway in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftdv-integration-with-aws-transit-gateway/m-p/4267100#M1077030</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I'm&amp;nbsp;looking for a Cisco recommended design for deploying &amp;amp; integrating FTDv FW pair with AWS Transit Gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Design Considerations -&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The 2 firewalls need to be deployed in a separate AWS VPC with 2 availability zones. And traffic failover should be automatic in case of a FTDv or an Availability Zone failure.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could find only the following design ( briefly described in &lt;A href="https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUtthj_CGfP8&amp;amp;data=04%7C01%7CRukshanF%40millenniumitesp.com%7C5b23f1d374944cb1698e08d8b182a47f%7C9742494393ed421f81cef245fd53a717%7C0%7C0%7C637454522607732478%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=bJl3pDCiODSXI7NgnZzxTtGafcEGz9p7E4ScBH4OmLU%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=Utthj_CGfP8&lt;/A&gt; ) under Cisco Secure Firewall YouTube channel.&amp;nbsp;And in this design, 2 CSR 1000V routers are used in addition to the 2FTDv FWs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure why the 2 CSR 1000V routers are required here ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco-Solution.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/100909i6EF9C4990B11139E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cisco-Solution.png" alt="Cisco-Solution.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jan 2021 15:16:19 GMT</pubDate>
    <dc:creator>mcrukshanfernando</dc:creator>
    <dc:date>2021-01-05T15:16:19Z</dc:date>
    <item>
      <title>FTDv Integration with AWS Transit Gateway</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-integration-with-aws-transit-gateway/m-p/4267100#M1077030</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I'm&amp;nbsp;looking for a Cisco recommended design for deploying &amp;amp; integrating FTDv FW pair with AWS Transit Gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Design Considerations -&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The 2 firewalls need to be deployed in a separate AWS VPC with 2 availability zones. And traffic failover should be automatic in case of a FTDv or an Availability Zone failure.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could find only the following design ( briefly described in &lt;A href="https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUtthj_CGfP8&amp;amp;data=04%7C01%7CRukshanF%40millenniumitesp.com%7C5b23f1d374944cb1698e08d8b182a47f%7C9742494393ed421f81cef245fd53a717%7C0%7C0%7C637454522607732478%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=bJl3pDCiODSXI7NgnZzxTtGafcEGz9p7E4ScBH4OmLU%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=Utthj_CGfP8&lt;/A&gt; ) under Cisco Secure Firewall YouTube channel.&amp;nbsp;And in this design, 2 CSR 1000V routers are used in addition to the 2FTDv FWs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure why the 2 CSR 1000V routers are required here ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco-Solution.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/100909i6EF9C4990B11139E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cisco-Solution.png" alt="Cisco-Solution.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-integration-with-aws-transit-gateway/m-p/4267100#M1077030</guid>
      <dc:creator>mcrukshanfernando</dc:creator>
      <dc:date>2021-01-05T15:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv Integration with AWS Transit Gateway</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-integration-with-aws-transit-gateway/m-p/5245121#M1118652</link>
      <description>&lt;P&gt;Since FTD unfortunately don't support GRE termination for some reason even though Cisco invented GRE, there's no direct way to connect the FTD with Transit Gateway.&lt;BR /&gt;&lt;BR /&gt;I want to utilize BGP to share routing updates with Transit Gateway's routing table but stuck due to this limitation and I don't know if this is in the roadmap to allow GRE termination on FTD.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 10:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-integration-with-aws-transit-gateway/m-p/5245121#M1118652</guid>
      <dc:creator>vgaur</dc:creator>
      <dc:date>2025-01-09T10:35:23Z</dc:date>
    </item>
  </channel>
</rss>

