<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Dual ISP Loadbalancing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620685#M1090497</link>
    <description>&lt;P&gt;I agree because technically there is no load balancing happening within the config and the system, what really happened is you just divide manually the traffic of your inside lan to 2 outside interfaces. I really dont know why cisco cannot develop a system that can ratio the inside traffic to pass to your multiple outside interface automatically. In my experience with sonicwall NSA firewalls, they are capable of doing such ratio balancing depends on the percentage you assign to either outside interface and it works well but the downside of NSA's are they are too buggy sometimes.&lt;/P&gt;</description>
    <pubDate>Mon, 30 May 2022 16:29:03 GMT</pubDate>
    <dc:creator>Herald Sison</dc:creator>
    <dc:date>2022-05-30T16:29:03Z</dc:date>
    <item>
      <title>FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3673546#M1005608</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please suggest any way to Dual ISP load-balancing on Cisco FTD running Version 6.2.3.3.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3673546#M1005608</guid>
      <dc:creator>Piyush_Sharma</dc:creator>
      <dc:date>2020-02-21T16:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3743696#M1005610</link>
      <description>&lt;P&gt;I use PBR via FlexConfig. But in this scenario i don't have sla for auto change channel when one of it is down.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 04:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3743696#M1005610</guid>
      <dc:creator>Maxim Kraev</dc:creator>
      <dc:date>2018-11-12T04:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3743733#M1005612</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You can configure Policy Based Routing in FTD with IP SLA. You can Load-balance the traffic as per the accesslist you mentioned in the route-map. With the help of tracking the availability of next hop you can achieve auto switch traffic when one interface is down. With the help of Flex config you do the configuration of PBR, below video link will help you to configure PBR in FTD with IP SLA.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=MKcSBTJ55e8" target="_blank"&gt;https://www.youtube.com/watch?v=MKcSBTJ55e8&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 06:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3743733#M1005612</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-11-12T06:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3743762#M1005613</link>
      <description>&lt;P&gt;You cannot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It has the same basic capabilities in this regard as an ASA. There's the ability to failover plus some rudimentary policy based routing. Neither equates to what one would call ISP load balancing though.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 07:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3743762#M1005613</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-12T07:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3745387#M1005614</link>
      <description>&lt;P&gt;Thanks! Good manual!&lt;/P&gt;
&lt;P&gt;But when i assign tracks to default routes i have error -&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;More than one interface defined&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;SLA Monitor requires only one interface for route tracking&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;More than one interface defined for SLA Monitor which is referred by Static Route&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Please select only one interface for SLA Monitor referred by Static Route&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why in this video all good?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 22:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3745387#M1005614</guid>
      <dc:creator>Maxim Kraev</dc:creator>
      <dc:date>2018-11-12T22:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3746270#M1005615</link>
      <description>&lt;P&gt;I found the problem. I have mistakes in security zones. So i have two interface in one security zones. Because of this tracking didn't assigning. Now all works! Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 04:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3746270#M1005615</guid>
      <dc:creator>Maxim Kraev</dc:creator>
      <dc:date>2018-11-14T04:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3746432#M1005616</link>
      <description>Good to here that...</description>
      <pubDate>Wed, 14 Nov 2018 10:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/3746432#M1005616</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-11-14T10:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4006191#M1005617</link>
      <description>&lt;P&gt;I know it is an old post but I agree, for one, you can not simply load balance NAT translations. But failover.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 18:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4006191#M1005617</guid>
      <dc:creator>SIMMN</dc:creator>
      <dc:date>2020-01-03T18:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4274826#M1077445</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/332768"&gt;@Maxim Kraev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you managed dual ISP failover between 2 WAN links using FTD and managing the box using FMD manageled via the web ?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 19:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4274826#M1077445</guid>
      <dc:creator>HaniAbuelkhair6735</dc:creator>
      <dc:date>2021-01-18T19:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620682#M1090496</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how did you actually make it work? I have tried on my FTD 7.0.1.1 and FMC7.0.1.1 but still the traffic still goes to the ISP1 and no traffic is going in to the ISP2. However my failover works well when i shutdown ISP1 all traffic goes to ISP2.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;can i ask a step by step process on this one? I tried watching the youtube video provided but i can barely understand what he is saying and the video is a bit blurry to watch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you in advance sir more power&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 16:24:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620682#M1090496</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2022-05-30T16:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620685#M1090497</link>
      <description>&lt;P&gt;I agree because technically there is no load balancing happening within the config and the system, what really happened is you just divide manually the traffic of your inside lan to 2 outside interfaces. I really dont know why cisco cannot develop a system that can ratio the inside traffic to pass to your multiple outside interface automatically. In my experience with sonicwall NSA firewalls, they are capable of doing such ratio balancing depends on the percentage you assign to either outside interface and it works well but the downside of NSA's are they are too buggy sometimes.&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 16:29:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620685#M1090497</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2022-05-30T16:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620744#M1090500</link>
      <description>&lt;P&gt;Cisco has made a tactical decision not to pursue that feature set with their firewalls. They would prefer to sell you a Viptela or other SD-WAN solution to address that need (and increase revenue).&lt;/P&gt;
&lt;P&gt;Right or wrong, that's how they do it and their profits and stock dividends tell them the market is rewarding that decision.&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 18:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620744#M1090500</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-05-30T18:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620868#M1090507</link>
      <description>&lt;P&gt;Thanks sir, is there a detailed document that can help me with this setup? i have tried watching the video link posted above but unfortunately the video is a bit blurry and i barely can understand his words and also he did not setup up everything from scratch that is why i am a bit confused,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UPDATE: i made it work just fine!&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 09:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4620868#M1090507</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2022-05-31T09:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4622061#M1090540</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;&lt;P&gt;i have configured PBR via flex config and it works now. i have divided the traffic in to 2 and it was successful however only 1 traffic can connect to the site to site vpn and the other one cannot.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i already added 2 vpn configurations for each traffic but still only one is going through? is there anything that i need to tweak to make the 2 traffic connected to the site to site vpn?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 05:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4622061#M1090540</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2022-06-01T05:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4622526#M1090548</link>
      <description>&lt;P&gt;When traffic is being sent over a site-to-site VPN, it does so based on the first match to the crypto map ACLs in that section of the configuration. So it will not load balance that subset of your traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 12:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4622526#M1090548</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-06-01T12:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4623439#M1090588</link>
      <description>&lt;P&gt;Is there a remedy for this one sir? I have tried configuring 2 site to site vpn for each outisde interfaces but still only 1 interface gets connected. The weird thing is that ASA from the other peer of the S2S VPN can ping all subnets of the FTD but on the FTD only 1 interace can ping thr ASA and the other interface got an RTO.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2022 16:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4623439#M1090588</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2022-06-02T16:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915550#M1103918</link>
      <description>&lt;P&gt;So, if one has two default routes (one for each ISP) with the same&amp;nbsp;&lt;SPAN&gt;Metric field value of 1, the firewall won't attempt to load balance at all? I'm not sure how the firewall determines&amp;nbsp;which default route to use if both are 1.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2023 15:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915550#M1103918</guid>
      <dc:creator>Jack G</dc:creator>
      <dc:date>2023-08-31T15:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915565#M1103920</link>
      <description>&lt;P&gt;If you have provider-independent network and two ISP routers you can have two equal cost default routes on a given interface. In that case, your FTD will dynamically hash traffic based on source and destination address and port to balance it across the two routes. (The method is not configurable.)&lt;/P&gt;
&lt;P&gt;ECMP is also now supported and you can read more about that feature in the configuration guides.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2023 15:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915565#M1103920</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-08-31T15:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915579#M1103923</link>
      <description>&lt;P&gt;Yes, ECMP and path monitoring does appear to be the way to go. Wondering what's left before an FTD can be considered "SD-WAN" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2023 16:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915579#M1103923</guid>
      <dc:creator>Jack G</dc:creator>
      <dc:date>2023-08-31T16:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Dual ISP Loadbalancing</title>
      <link>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915586#M1103926</link>
      <description>&lt;P&gt;Stay tuned for release 7.4 which adds some more advanced path monitoring features.&lt;/P&gt;
&lt;P&gt;7.2 already added a bunch:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/routing-policy-based.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/routing-policy-based.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2023 16:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-dual-isp-loadbalancing/m-p/4915586#M1103926</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-08-31T16:18:52Z</dc:date>
    </item>
  </channel>
</rss>

