<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: flexconfig in Cisco FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640946#M1091434</link>
    <description>&lt;P&gt;For PBR, the Flexconfig policy references the ACL. so changing the ACL suffices to change the net behavior of the Flexconfig policy&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2022 16:07:15 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2022-06-29T16:07:15Z</dc:date>
    <item>
      <title>flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640664#M1091409</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a cisco ftd configure via fmc.&lt;/P&gt;&lt;P&gt;We have a guest ADSL connection configured via Flexconfig PBR to route the guest subnet 10.10.251.0/24 to ADSL GW.&lt;/P&gt;&lt;P&gt;Now i have a requirement to exclude 2 ip addresses from the 251 range from the flexconfig PBR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need assistance how i can achieve it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 07:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640664#M1091409</guid>
      <dc:creator>shaikh.zaid22</dc:creator>
      <dc:date>2022-06-29T07:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640683#M1091412</link>
      <description>&lt;P&gt;check this guide :&amp;nbsp; ( remove related config related to IP subnet you looking to remove) so it used default route&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2021/04/18/ftd-policy-based-routing/" target="_blank"&gt;https://integratingit.wordpress.com/2021/04/18/ftd-policy-based-routing/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/217588-configure-pbr-with-ip-slas-for-dual-isp.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/217588-configure-pbr-with-ip-slas-for-dual-isp.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 08:14:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640683#M1091412</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-06-29T08:14:06Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640740#M1091420</link>
      <description>&lt;P&gt;I am assuming you have an ACL that is matching on the traffic that is to be sent to the guest subnet?&amp;nbsp; If so, then it is just a matter of adding deny statement at the top of that ACL for the two IPs you want to exclude and then deploy.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 09:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640740#M1091420</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-29T09:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640756#M1091421</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are correct, i have one subnet in one ACL that is called-in to the Flexconfig.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From this same subnet i want to remove/axe two ip addresses to not get forwarded towards the ADSL GW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So shall just add the two ip's in the same ACL with Actions as Block ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 10:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640756#M1091421</guid>
      <dc:creator>shaikh.zaid22</dc:creator>
      <dc:date>2022-06-29T10:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640759#M1091422</link>
      <description>&lt;P&gt;Correct, just add the two IP in the same ACL with block action, above the permit rule (this is important), and you should be good.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 11:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640759#M1091422</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-29T11:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640763#M1091423</link>
      <description>&lt;P&gt;Thanks Marius. I will do as directed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, do i not have to touch anything in the flexconfig part ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only ACL changes will suffice right ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks once again&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 11:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640763#M1091423</guid>
      <dc:creator>shaikh.zaid22</dc:creator>
      <dc:date>2022-06-29T11:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640767#M1091425</link>
      <description>&lt;P&gt;Just the ACL configuration.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 11:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640767#M1091425</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-29T11:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640946#M1091434</link>
      <description>&lt;P&gt;For PBR, the Flexconfig policy references the ACL. so changing the ACL suffices to change the net behavior of the Flexconfig policy&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 16:07:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4640946#M1091434</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-06-29T16:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: flexconfig in Cisco FTD</title>
      <link>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4642722#M1091508</link>
      <description>&lt;P&gt;Thank Marius.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It worked.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jul 2022 08:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/flexconfig-in-cisco-ftd/m-p/4642722#M1091508</guid>
      <dc:creator>shaikh.zaid22</dc:creator>
      <dc:date>2022-07-02T08:37:17Z</dc:date>
    </item>
  </channel>
</rss>

