<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Management Interface Multiple ISPs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658703#M1092212</link>
    <description>&lt;P&gt;Sure thing!&lt;BR /&gt;&lt;BR /&gt;The NAT config below doesn't have the VPN rules added but for what I'm trying to do this is what I have configured:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nat.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158291iA3440AADAAD59EE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat.png" alt="nat.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Jul 2022 17:00:10 GMT</pubDate>
    <dc:creator>ste.ant</dc:creator>
    <dc:date>2022-07-27T17:00:10Z</dc:date>
    <item>
      <title>FTD Management Interface Multiple ISPs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658624#M1092202</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm not able to manage FTD from its remote FMC when it fails over from ISP1 to ISP2.&lt;/P&gt;&lt;P&gt;- 1 x FTD 1010 (7.0.1.1)&lt;BR /&gt;- ISP1 connected to E1/1, ISP2 connected to E1/2&lt;BR /&gt;- FTD Management Interface connected to E1/3 (routed port)&lt;BR /&gt;- Route tracking enabled for ISP1&lt;BR /&gt;&lt;BR /&gt;Long story short, when FTD fails over to ISP2, I can ping FMC on TCP/8305 from FTD Management Interface successfully but the "sf tunnel" won't come up. Performing a packet trace on the FTD shows that the Management Interface tries to go out through ISP1 even though the routing table tells it to go out ISP2 interface (it complains about a sub-optimal route).&lt;/P&gt;&lt;P&gt;Has anyone been able to get this to work?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 14:51:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658624#M1092202</guid>
      <dc:creator>ste.ant</dc:creator>
      <dc:date>2022-07-27T14:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Management Interface Multiple ISPs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658673#M1092207</link>
      <description>&lt;P&gt;if you use NAT&amp;nbsp;&lt;BR /&gt;add route-lookup to NAT&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 16:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658673#M1092207</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-07-27T16:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Management Interface Multiple ISPs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658689#M1092210</link>
      <description>&lt;P&gt;I have NAT configured but I can only use route-lookup if the original and translated source address is the same but it's not in my case (I have two rules - translate the Management Interface to (1) "isp1-outside" and (2) "isp2-outside" interface address). I do it this way to avoid the Management Interface from going over the VPN tunnel.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 16:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658689#M1092210</guid>
      <dc:creator>ste.ant</dc:creator>
      <dc:date>2022-07-27T16:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Management Interface Multiple ISPs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658697#M1092211</link>
      <description>&lt;P&gt;the NAT is routed the traffic through the ISP1 even if the RIB is route via ISP2&lt;BR /&gt;for the NAT can you share the NAT you use?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 16:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658697#M1092211</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-07-27T16:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Management Interface Multiple ISPs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658703#M1092212</link>
      <description>&lt;P&gt;Sure thing!&lt;BR /&gt;&lt;BR /&gt;The NAT config below doesn't have the VPN rules added but for what I'm trying to do this is what I have configured:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nat.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158291iA3440AADAAD59EE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat.png" alt="nat.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 17:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4658703#M1092212</guid>
      <dc:creator>ste.ant</dc:creator>
      <dc:date>2022-07-27T17:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Management Interface Multiple ISPs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4667927#M1092607</link>
      <description>&lt;P&gt;Hi, it's still not working... any idea?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2022 17:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4667927#M1092607</guid>
      <dc:creator>ste.ant</dc:creator>
      <dc:date>2022-08-11T17:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Management Interface Multiple ISPs</title>
      <link>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4686250#M1093344</link>
      <description>&lt;P&gt;I figured it out -&lt;/P&gt;&lt;P&gt;I created two EEM FlexConfig objects:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My_EEM-FTD-MgmtIf_1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;event&amp;nbsp;manager&amp;nbsp;applet&amp;nbsp;NAT-FTD-MgmtIf1&lt;BR /&gt;event&amp;nbsp;syslog&amp;nbsp;id&amp;nbsp;622001&lt;BR /&gt;action&amp;nbsp;1&amp;nbsp;cli&amp;nbsp;command&amp;nbsp;"no&amp;nbsp;nat&amp;nbsp;(mgmt-ftd,outside)&amp;nbsp;source&amp;nbsp;static&amp;nbsp;Host-FTDMgmtIf&amp;nbsp;interface&amp;nbsp;destination&amp;nbsp;static HostFMC_outside HostFMC_outside&amp;nbsp;service tcp_8305 tcp_8305"&lt;BR /&gt;action&amp;nbsp;2&amp;nbsp;cli&amp;nbsp;command&amp;nbsp;"clear&amp;nbsp;conn&amp;nbsp;address X.X.X.X"&lt;BR /&gt;output&amp;nbsp;none&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My_EEM-FTD-MgmtIf_2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;event&amp;nbsp;manager&amp;nbsp;applet&amp;nbsp;NAT-FTD-MgmtIf2&lt;BR /&gt;event&amp;nbsp;syslog&amp;nbsp;id&amp;nbsp;622001&amp;nbsp;occurs&amp;nbsp;2&lt;BR /&gt;action&amp;nbsp;1&amp;nbsp;cli&amp;nbsp;command&amp;nbsp;"nat&amp;nbsp;(mgmt-ftd,outside)&amp;nbsp;&lt;STRONG&gt;1&lt;/STRONG&gt;&amp;nbsp;source&amp;nbsp;static&amp;nbsp;Host-FTDMgmtIf&amp;nbsp;interface&amp;nbsp;destination&amp;nbsp;static HostFMC_outside HostFMC_outside&amp;nbsp;service tcp_8305 tcp_8305"&lt;BR /&gt;action&amp;nbsp;2&amp;nbsp;cli&amp;nbsp;command&amp;nbsp;"clear&amp;nbsp;conn&amp;nbsp;address X.X.X.X"&lt;BR /&gt;output&amp;nbsp;none&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My_EEM-FTD-MgmtIf_1&lt;/STRONG&gt; removes NAT statement to &lt;STRONG&gt;outside&lt;/STRONG&gt; when outside is down (first occurrence of Syslog 622001). It also clears Mgmt interface connections to FMC (IP address X.X.X.X)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My_EEM-FTD-MgmtIf_2&lt;/STRONG&gt; adds NAT statement to &lt;STRONG&gt;outside&lt;/STRONG&gt; in position &lt;STRONG&gt;1&lt;/STRONG&gt; when outside2 is down ("every other" occurrence of Syslog 622001). It also clears Mgmt interface connections to FMC (IP address X.X.X.X)&lt;/P&gt;&lt;P&gt;Apply both FlexConfig objects to FTD using Append. Whenever the outside interface goes down/route to outside is removed from the routing table using route tracking, the static NAT rule for it is removed from the NAT table (this avoids NAT Divert) and when the outside interfaces is up/route tracking is up, the static NAT rule for it is re-added to the NAT table in position 1. Clearing the connections to the FMC is very important because if you don't they hang around and you'll end up in a situation where network traffic goes via ISP1 but FTD management traffic goes to FMC via ISP2.&lt;/P&gt;&lt;P&gt;I hope this helps someone.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 14:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-management-interface-multiple-isps/m-p/4686250#M1093344</guid>
      <dc:creator>ste.ant</dc:creator>
      <dc:date>2022-09-13T14:11:42Z</dc:date>
    </item>
  </channel>
</rss>

