<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions on migrating active/standby ASA pair from ASA image to F in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4546905#M1087130</link>
    <description>&lt;P&gt;A quick follow up to this... Does the Firepower 4115 require any additional hardware to run the FTD image?&lt;/P&gt;</description>
    <pubDate>Mon, 07 Feb 2022 21:05:44 GMT</pubDate>
    <dc:creator>spfister336</dc:creator>
    <dc:date>2022-02-07T21:05:44Z</dc:date>
    <item>
      <title>Questions on migrating active/standby ASA pair from ASA image to FTD</title>
      <link>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4543662#M1086984</link>
      <description>&lt;P&gt;We have two Cisco Firepower 4115s in active/standby mode, in a routed configuration. These have been running fine for a little over a year now. We currently run the ASA image (the previous firewall was a pair for ASA 5585Xs). Lately, we have been considering moving to the ftd image. I have a few questions:&lt;/P&gt;&lt;P&gt;- What is the best method to migrate to the new image, with minimal downtime?&lt;BR /&gt;- We are interested initially, in automatically blocking certain known problem ip addresses with something like abuseipdb. Is there a way to do this easily without going to the ftd image?&lt;BR /&gt;- Will new licensing be needed? How do we know if we already have it?&lt;BR /&gt;- I've heard mention that ACLs that use FQDNs may have problems being transitioned. Is that the case? Any way to analyze the current configuation for problem areas like this?&lt;BR /&gt;- For a single pair of devices, is FDM sufficient? Any need to go to FMC in this situation?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 21:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4543662#M1086984</guid>
      <dc:creator>spfister336</dc:creator>
      <dc:date>2022-02-01T21:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on migrating active/standby ASA pair from ASA image to F</title>
      <link>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4543715#M1086988</link>
      <description>&lt;P&gt;here are my suggestions :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- What is the best method to migrate to the new image, with minimal downtime?&amp;nbsp; - use ASA to&amp;nbsp; Migration tool, if not big rules, its time to clean up old rules and move with a fresh rule base (so you can get rid of organically grown rules).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can do offline testing all the rule base migrated and once you are happy with the audit, you need to have small downtime for OLD to new cutover with the same IP address you like to use.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;- We are interested initially, in automatically blocking certain known problem ip addresses with something like abuseipdb. Is there a way to do this easily without going to the ftd image?&amp;nbsp; - ASA&amp;nbsp; any way going to End of Life, so you have no other option than moving to FTD, cisco Force, or suggest you that way.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;- Will new licensing be needed? How do we know if we already have it?&amp;nbsp; &amp;nbsp;- depends on what you purchased, the old ASA License no Longer used here you need a new License, and what other options like IPS...so on&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;- I've heard mention that ACLs that use FQDNs may have problems being transitioned. Is that the case? Any way to analyze the current configuration for problem areas like this? - yes FTD supports this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;- For a single pair of devices, is FDM sufficient? Any need to go to FMC in this situation?&amp;nbsp; &amp;nbsp;- if you like full-blown management, FMC is the only option i can think of here.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 07:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4543715#M1086988</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-02-02T07:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on migrating active/standby ASA pair from ASA image to F</title>
      <link>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4543817#M1086991</link>
      <description>&lt;P&gt;Just to put my thought on this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;- What is the best method to migrate to the new image, with minimal downtime?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Migration tool is a great start with. however the migration tool has caveats. for example outbound access-list is not supported in the migration tool 2.4. hence if you have a small&amp;nbsp; depoyment (not large configure) than you should be fine. but if you have a big deployment in that case first stage this up once using the migration tool (with approach test and work)&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/migration-tool/migration-guide-fps/ASA2FTD-with-FPS-FP-Migration-Tool.html" target="_self"&gt;here&lt;/A&gt;&amp;nbsp; is the documentation to start with. and &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/migration-tool/migration-guide-fps/ASA2FTD-with-FPS-FP-Migration-Tool/ASA2FTD-with-FP-Migration-Tool_appendix_0101.html" target="_self"&gt;here&lt;/A&gt; cisco migration tool give you an example of moving ASA into FTD image (2100 series) concept would be same for your appliance 4100.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;- We are interested initially, in automatically blocking certain known problem ip addresses with something like abuseipdb. Is there a way to do this easily without going to the ftd image?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I do not think ASA software will go EOL. but yes the ASA hardware is gone EOL and cisco encourage to take the FTD appliance route. with FTD you can use the security intelligence which is&amp;nbsp; a build in fuction and connected to cisco Taloas network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;- Will new licensing be needed? How do we know if we already have it?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;FTD appliance using FTD image need a cisco smart licence &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/215838-fmc-and-ftd-smart-license-registration-a.html" target="_self"&gt;here&lt;/A&gt; and &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/licensing/faq/firepower-license-FAQ.html#id_50521" target="_self"&gt;here&lt;/A&gt;&amp;nbsp; a good start with. but if you have a cisco support contract in place or have a cisco portal licensing you should be easily convert your traditional lic into a smart lic. otherwise TAC licensing team is very helpful to sort this out for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;- I've heard mention that ACLs that use FQDNs may have problems being transitioned. Is that the case? Any way to analyze the current configuation for problem areas like this?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Cisco is very commited with firewall migration tool. new relase of migration tool keep coming up with enchanced features. there are some caveats but it all depends on your migration configuration what you running on. migration tool does support &lt;SPAN&gt;IPv4 and IPv6 &lt;SPAN class="highlight selected appended"&gt;FQDN&lt;/SPAN&gt; objects and groups.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;- For a single pair of devices, is FDM sufficient? Any need to go to FMC in this situation?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;This is a more of personal company choice. if you have resoruce (virtual resources) run the FMC as virtual appliance and make most out of it. plus if you want to run your 4100 in muti-instance than why not use a FMC and manage all the firewall in at one pane of glass. less headache jumping/moving from one GUI to another.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 06:49:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4543817#M1086991</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-02T06:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on migrating active/standby ASA pair from ASA image to F</title>
      <link>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4546905#M1087130</link>
      <description>&lt;P&gt;A quick follow up to this... Does the Firepower 4115 require any additional hardware to run the FTD image?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 21:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4546905#M1087130</guid>
      <dc:creator>spfister336</dc:creator>
      <dc:date>2022-02-07T21:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Questions on migrating active/standby ASA pair from ASA image to F</title>
      <link>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4546921#M1087134</link>
      <description>&lt;P&gt;Nope FTD 4115 is the beast. &lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-c78-742474.html" target="_self"&gt;here the Data Sheet&lt;/A&gt; and also remember the FTD 4000 series run the FXOS under lay and on top you can run&amp;nbsp; FTD or the ASA code.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no additional hardware require as the 4115 come as multi-instance. means you can setup a different container according to your requirments.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 21:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-on-migrating-active-standby-asa-pair-from-asa-image-to/m-p/4546921#M1087134</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-07T21:26:39Z</dc:date>
    </item>
  </channel>
</rss>

