<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static Routes for FTD -  Three sperate interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457681#M1083238</link>
    <description>&lt;P&gt;The moment the interface is in place and active, traffic should not be routed to outside any more. Without an allow rule, traffic should be dropped.&lt;/P&gt;
&lt;P&gt;Are the interfaces active? Do you see them on the CLI with "show interface ip brief", "show route"?&lt;/P&gt;</description>
    <pubDate>Tue, 31 Aug 2021 16:59:28 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2021-08-31T16:59:28Z</dc:date>
    <item>
      <title>Static Routes for FTD -  Three sperate interfaces</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457658#M1083234</link>
      <description>&lt;P&gt;Hello All.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an FTD running 6.6.4. - the current interface config:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;1. Inside Zone - Interface 10.10.10.1 (network 10.10.0.0)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2. Outside Zone - Interface 10.20.20.248 (network 10.20.20.0)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;3. Route - any-ipv4, outside, global, 10.20.20.1, false, 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need to add two more interfaces:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;1. DMZ Zone - Interface 10.40.40.254 (network 10.40.40.0)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2. DMZ Zone - Interface 10.50.50.254 (network 10.50.50.0)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;3. I need routes that will allow data from my inside zone (network 10.10.0.0) to these networks (10.40.40.0 and 10.50.50.0) also.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;&lt;U&gt;What would my routes be? I do not have a spare to test with, so I am worried that I will block myself by adding a incorrect route.&amp;nbsp;&lt;/U&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Any help would be greatly&amp;nbsp;&lt;SPAN&gt;appreciated.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2021 16:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457658#M1083234</guid>
      <dc:creator>t3chH0und</dc:creator>
      <dc:date>2021-08-31T16:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Static Routes for FTD -  Three sperate interfaces</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457663#M1083236</link>
      <description>&lt;P&gt;You don't need any additional routes. The firewall is aware of these networks when it has an IP in that new net. But you need to allow this communication in your security-policy.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2021 16:44:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457663#M1083236</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2021-08-31T16:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: Static Routes for FTD -  Three sperate interfaces</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457672#M1083237</link>
      <description>Thank you. I added the interfaces; however, a traceroute to the 10.40.40.0 or 10.50.50.0 networks stills routes to the outside interface, not the new interfaces. When that happened, I assumed I needed a new static route. So by allowing in my policy, the date should route to the new interfaces?&lt;BR /&gt;</description>
      <pubDate>Tue, 31 Aug 2021 16:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457672#M1083237</guid>
      <dc:creator>t3chH0und</dc:creator>
      <dc:date>2021-08-31T16:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: Static Routes for FTD -  Three sperate interfaces</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457681#M1083238</link>
      <description>&lt;P&gt;The moment the interface is in place and active, traffic should not be routed to outside any more. Without an allow rule, traffic should be dropped.&lt;/P&gt;
&lt;P&gt;Are the interfaces active? Do you see them on the CLI with "show interface ip brief", "show route"?&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2021 16:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-for-ftd-three-sperate-interfaces/m-p/4457681#M1083238</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2021-08-31T16:59:28Z</dc:date>
    </item>
  </channel>
</rss>

