<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replace Secondary Firepower when in HA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666168#M1092529</link>
    <description>&lt;P&gt;could you issue the command configure high-availability disable on the Primary FTD.&lt;/P&gt;
&lt;P&gt;Marvin answer a similar post with similar issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/cannot-delete-a-ftd-device-from-fmc-when-l2l-vpn-tunnel-is/td-p/4506257" target="_blank"&gt;https://community.cisco.com/t5/network-security/cannot-delete-a-ftd-device-from-fmc-when-l2l-vpn-tunnel-is/td-p/4506257&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can capture all of the relevant VPN parameters from either screenshots via a "show run" from the cli.&lt;/P&gt;
&lt;P&gt;If you need the preshared key you can go to the lina cli (system support diagnostic-cli) and use "more system:running-config".&lt;/P&gt;
&lt;P&gt;Then you can remove the config in FMC and delete the device and use the parameters you've gathered to recreate it later on the new device. It only takes 10-15 minutes to do so.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Aug 2022 08:26:08 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2022-08-09T08:26:08Z</dc:date>
    <item>
      <title>Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665793#M1092501</link>
      <description>&lt;P&gt;Have to replace a faulty secondary firepower, I am trying to delete the secondary from FMC that is setup in HA , but I cannot find the correct information to delete this.&lt;/P&gt;&lt;P&gt;I can click the bin button, but get this error "Confirm Delete" see below, and I am not sure ho to proceed.&lt;/P&gt;&lt;P&gt;But I am guessing the primary will run as it is then I should be able to delete the secondary then re-add the new firewall.&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 15:23:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665793#M1092501</guid>
      <dc:creator>Garry Cooper</dc:creator>
      <dc:date>2022-08-08T15:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665804#M1092503</link>
      <description>&lt;P&gt;follow below thread :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/ftd-how-to-put-a-reimaged-ha-member-back-to-the-ha-pair/td-p/3831973" target="_blank"&gt;https://community.cisco.com/t5/network-security/ftd-how-to-put-a-reimaged-ha-member-back-to-the-ha-pair/td-p/3831973&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 15:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665804#M1092503</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-08-08T15:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665871#M1092514</link>
      <description>&lt;P&gt;Well the error message is telling you how to delete the high availability configuration.&amp;nbsp; You go into the CLI and issue the command "configure high-availability disable".&amp;nbsp; I would suggest performing a device backup of the primary / active FTD before doing this, that way you will have a quick way back should the current active happen to lose its configuration.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 18:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665871#M1092514</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-08T18:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665990#M1092517</link>
      <description>&lt;P&gt;&lt;STRONG&gt; can click the bin button, but get this error "Confirm Delete" see below, and I am not sure ho to proceed.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In order to replace the faulty appliances you need to break the HA pair. Therefore your approach is right but its understandable as these appliances are in the production so you want to be extra carefull. having said that, its safe to press the "Confirm Delete".&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;But I am guessing the primary will run as it is then I should be able to delete the secondary then re-add the new firewall.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;you are&amp;nbsp;absolutely correct. once you break the HA pair. The Primay active firewall stay in production and service/serve the traffic. it will not impact on your production traffic in any means. There is no need to go into CLI of the FTD and issue the command. FMC do all labour work for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NOTE: When we break the HA pair only the failover configuration are removed on both firewalls. by default, Firewall is in always in "Secondary" mode. That is why when we steup the HA pair we manually setup one appliance as "Primary".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212699-configure-ftd-high-availability-on-firep.html#anc11" target="_self"&gt;Here&lt;/A&gt; Cisco official document explain the process of breaking the HA-FTD pair.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you get your new appliance FTD you need to make the HA-pair again. In that case make sure you make your primary appliance in production as primary. in case if you make new appliance primary, this appliance will wipe your production configuration. in that case in order to get the issue fix you have to apply the FTD restore. Just a caution thought to mentioned this. All the best.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 20:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4665990#M1092517</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-08-08T20:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666111#M1092525</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;&amp;nbsp;as we have ran into this issue in the past with one of our HA pairs. Take backup of Primary, make note of all the settings of the secondary instance on the chassis, break HA pair and then delete secondary from FMC. Delete instance from chassis, reinstall new instance with same settings, bring back into FMC and rebuild HA pair.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 05:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666111#M1092525</guid>
      <dc:creator>manofsteel03</dc:creator>
      <dc:date>2022-08-09T05:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666147#M1092526</link>
      <description>&lt;P&gt;Your approach is correct.&lt;/P&gt;
&lt;P&gt;Before you break the HA, make sure to take a screenshot of the interface page, so that once you re-add another unit as HA, you have all the info such as secondary IP address, any specific mac address entered etc.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 07:27:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666147#M1092526</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2022-08-09T07:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666155#M1092528</link>
      <description>&lt;P&gt;Thanks for the replies, but tried this morning to delete the secondary ftd but get this error.&lt;/P&gt;&lt;P&gt;Error&lt;/P&gt;&lt;P&gt;The Device NCC-Civic-FTD-HA cannot be deleted because the following VPN Configuration(s) refer to this device.&lt;/P&gt;&lt;P&gt;See attached image.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 07:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666155#M1092528</guid>
      <dc:creator>Garry Cooper</dc:creator>
      <dc:date>2022-08-09T07:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666168#M1092529</link>
      <description>&lt;P&gt;could you issue the command configure high-availability disable on the Primary FTD.&lt;/P&gt;
&lt;P&gt;Marvin answer a similar post with similar issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/cannot-delete-a-ftd-device-from-fmc-when-l2l-vpn-tunnel-is/td-p/4506257" target="_blank"&gt;https://community.cisco.com/t5/network-security/cannot-delete-a-ftd-device-from-fmc-when-l2l-vpn-tunnel-is/td-p/4506257&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can capture all of the relevant VPN parameters from either screenshots via a "show run" from the cli.&lt;/P&gt;
&lt;P&gt;If you need the preshared key you can go to the lina cli (system support diagnostic-cli) and use "more system:running-config".&lt;/P&gt;
&lt;P&gt;Then you can remove the config in FMC and delete the device and use the parameters you've gathered to recreate it later on the new device. It only takes 10-15 minutes to do so.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 08:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666168#M1092529</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-08-09T08:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666177#M1092531</link>
      <description>&lt;P&gt;first off make sure you have a complete backup of your FMC and FTD devices before you begin.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;unplug the failed FTD data interfaces from the network (if the cables are not marked, i suggest either marking them or at least taking note of which port each cable connects to on the FTD and the switch)&lt;/LI&gt;
&lt;LI&gt;Via CLI issue the command configure high-availability disable on the failed device.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 09 Aug 2022 08:49:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4666177#M1092531</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-09T08:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4667052#M1092545</link>
      <description>&lt;P&gt;Found a different way to get the FTD added to FMC&lt;/P&gt;&lt;P&gt;By changing the IP in the Device settings, allowed me to add the device to FMC&lt;/P&gt;&lt;P&gt;See attached pic.&lt;/P&gt;&lt;P&gt;My new issue is now that I have the FTD in FMC it will not allow me to upgrade to same firmware as the primary.&lt;/P&gt;&lt;P&gt;Primary is 6.6.5.2&lt;/P&gt;&lt;P&gt;Secondary 6.6.5&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 07:53:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4667052#M1092545</guid>
      <dc:creator>Garry Cooper</dc:creator>
      <dc:date>2022-08-10T07:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4667086#M1092546</link>
      <description>&lt;P&gt;is the FTD still in HA remember that deleting it from the HA in GUI does not disable HA at in the firewall (as mentioned in the message you get when deleting the HA pair in GUI)? might be that you need to make the FTD a standalone, then upgrade, then add it back to the HA pair.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 08:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4667086#M1092546</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-10T08:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4667126#M1092551</link>
      <description>&lt;P&gt;As mentioned by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt; you need to make sure prior to making the HA pair the same software version match on the FTDs otherwise the HA will not make a pair.&lt;/P&gt;
&lt;DIV class="elementor-element elementor-element-851c314 elementor-widget elementor-widget-text-editor" data-id="851c314" data-element_type="widget" data-widget_type="text-editor.default"&gt;
&lt;DIV class="elementor-widget-container"&gt;
&lt;DIV class="elementor-text-editor elementor-clearfix"&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN&gt;The 2 units in the HA must: &lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Be the same model&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Have the same number and types of interfaces&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Be in the same firewall mode (routed or transparent)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Have the same software version&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Be in the same domain or group on the FMC &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Have the same NTP configuration &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Be fully deployed on the FMC with no uncommitted changes&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Not have DHCP or PPPoE configuration in any of their interfaces&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;FTD devices in HA mush have the same license&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;HA configurations require two smart license entitlements; one for each device in the pair.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 10 Aug 2022 10:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4667126#M1092551</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-08-10T10:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4668612#M1092645</link>
      <description>&lt;P&gt;If rest everything else is in place, and there is just the minor version mismatch, there is a way to install the update via root for the secondary device.&lt;/P&gt;
&lt;P&gt;You will need to push the file&amp;nbsp;6.6.5.2 to FTD in path&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;/var/sf/updates/&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;using wget and then install it via command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;install_update.pl /var/sf/updates/&amp;lt;name of the upgrade package&amp;gt; --detach&lt;/LI-CODE&gt;
&lt;P&gt;e.g.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;install_update.pl /var/sf/updates/Cisco_FTD_SSP_FP2K_Upgrade-6.6.1-91.sh.REL.tar --detach&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="markedContent"&gt;You might want to get TAC support if you need assistance with this and you are unable to place the file in the directory /var/sf/updates&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Do rate helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2022 20:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4668612#M1092645</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2022-08-12T20:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4668630#M1092648</link>
      <description>&lt;P&gt;instead of doing all this hassel from the FTD CLI. why not once the FTD is added in the FMC. Prior to making the HA pair push the minor patch update from the FMC update tab (you only need to download the minor software from cisco download and upload into the FMC). more save method without involving the TAC support when using the FTD CLI and things go wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once the FTD update is done. processed to make the HA pair.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2022 20:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4668630#M1092648</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-08-12T20:49:42Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4668708#M1092652</link>
      <description>&lt;P&gt;Because Garry has mentioned this "My new issue is now that I have the FTD in FMC it will not allow me to upgrade to same firmware as the primary."&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;</description>
      <pubDate>Sat, 13 Aug 2022 07:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4668708#M1092652</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2022-08-13T07:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669089#M1092667</link>
      <description>&lt;P&gt;Just an update to my issue, so got Tac involved and they found an issue with FMC not synchronizing that was causing the issue me not allow the upgrade.&amp;nbsp; Once fixed I could upgrade to same version as primary.&lt;/P&gt;&lt;P&gt;My issue now is I need to force break HA so I can get rid of the faulty secondary ftd this still present in FMC.&lt;/P&gt;&lt;P&gt;If I try to delete the secondary it throws and error about the VPN Config "The Device 'NCC-Civic-FTD-HA' cannot be deleted because the following VPN Configuration(s) refer this device."&amp;nbsp; I have over 100 VPN's setup so not an option the just delete and redo,&lt;/P&gt;&lt;P&gt;Tac say I need to force delete, see image below.&lt;/P&gt;&lt;P&gt;Anyone know timescale on how long this will take.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 08:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669089#M1092667</guid>
      <dc:creator>Garry Cooper</dc:creator>
      <dc:date>2022-08-15T08:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669117#M1092670</link>
      <description>&lt;P&gt;You need to log into the CLI and issue the command "configure high-availability disable".&lt;/P&gt;
&lt;P&gt;I suggest that before doing this you have a complete backup of the FMC and FTD device.&lt;/P&gt;
&lt;P&gt;If FTD has been removed from the network and it is just the presence of the FTD object in the GUI, then check the box for force and continue with the delete.&amp;nbsp; It should only take a few seconds.&amp;nbsp; But still make sure you have a full backup ready to be restored.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 09:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669117#M1092670</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-15T09:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669122#M1092671</link>
      <description>&lt;P&gt;Marius.&lt;/P&gt;&lt;P&gt;Thanks for the reply,&amp;nbsp; just had an email from tac saying that it will take upto 20 mins, if I force the break ha..&lt;/P&gt;&lt;P&gt;But this totally defeats the object of having HA, if you have a working primary and you need to remove some simple ha config to re introduce a secondary, and this will cause service disruption.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 09:38:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669122#M1092671</guid>
      <dc:creator>Garry Cooper</dc:creator>
      <dc:date>2022-08-15T09:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669135#M1092672</link>
      <description>&lt;P&gt;I dont see how this would take 20 minutes.&amp;nbsp; I have never tried the "force" option but for a regular break it is just the deployment time.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 10:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669135#M1092672</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-15T10:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Secondary Firepower when in HA</title>
      <link>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669930#M1092718</link>
      <description>&lt;P&gt;Just an update, got both firepowers back in HA.&lt;/P&gt;&lt;P&gt;Doing a Force does interupt traffic, but for only about 20 secs.&lt;/P&gt;&lt;P&gt;It then drops again after makeing HA again.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2022 13:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-secondary-firepower-when-in-ha/m-p/4669930#M1092718</guid>
      <dc:creator>Garry Cooper</dc:creator>
      <dc:date>2022-08-16T13:07:31Z</dc:date>
    </item>
  </channel>
</rss>

