<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Adding third firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777041#M1097871</link>
    <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; Here is what I am looking at&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcook0001_1-1676575974489.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176647i081CB570DBE3E0E7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gcook0001_1-1676575974489.png" alt="gcook0001_1-1676575974489.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal is to have the PC access the internet via Firepower-3, the server via Firepower-1. I need to have the PC be&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;able to reach the server, and vice versa. I was partially able to do this by adding a second gateway to my test pc so that it has both AAA.AAA.3.3 and AAA.AAA.3.1. Not sure if this is the best way to this. We do want the traffic traversing the firewalls when crossing vlans as we want to inspect the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the static routes setup&lt;BR /&gt;Firepower-1 - NAT Rules after&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcook0001_2-1676577642909.png" style="width: 786px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176649iFA99624649660076/image-dimensions/786x167?v=v2" width="786" height="167" role="button" title="gcook0001_2-1676577642909.png" alt="gcook0001_2-1676577642909.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Firepower-3 - Nat Rules after&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcook0001_3-1676577697982.png" style="width: 738px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176650i5C9D9EBE7CE8259E/image-dimensions/738x166?v=v2" width="738" height="166" role="button" title="gcook0001_3-1676577697982.png" alt="gcook0001_3-1676577697982.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input OFFICE-SSMIC icmp 172.29.3.100 0 0 172.30.0.30&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8400 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 21900 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 172.30.0.30 using egress ifc OFFICE-MGMT(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268459009&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268459009: ACCESS POLICY: Office-Policy - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268459009: L7 RULE: test&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 46500 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 4200 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 9900 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 17553, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 16800 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 39014 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;service: ICMP(3501), client: (0), payload: (0), misc: (0)&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3662104 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 0, Rule ID 268459009&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 4 -&amp;gt; 20, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268459009 - Allow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OFFICE-SSMIC(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OFFICE-MGMT(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 3837018 ns&lt;BR /&gt;Drop-reason: (inspect-icmp-seq-num-not-matched) ICMP Inspect seq num not matched, Drop-location: frame 0x0000556c7084ee08 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Feb 2023 20:30:00 GMT</pubDate>
    <dc:creator>gcook0001</dc:creator>
    <dc:date>2023-02-16T20:30:00Z</dc:date>
    <item>
      <title>Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4776961#M1097868</link>
      <description>&lt;P&gt;I am in the process of adding a third firewall to our network. We have two FTD 1140 in HA mode in the data center. The new firewall is a FTDv but will be replaced with a 1120 when it becomes available. Currently our office is connected to our data center using a VPLS. This is not going to change but the goal is to provide internet access directly from the office. The issue that I am running into is inter-vlan routing. Before adding the third firewall it wasn't a problem. Traffic between vlans would traverse the firewall and we use ACLs to control access. Now with the new firewall if I set the default gateway to be the FTDv I can access anything on the same vlan but I can't cross vlans. I know this is a routing issue and I am wondering what the best way to handle this would be.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 17:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4776961#M1097868</guid>
      <dc:creator>gcook0001</dc:creator>
      <dc:date>2023-02-16T17:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777001#M1097870</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/308988"&gt;@gcook0001&lt;/a&gt; can you provide a diagram, as your topology is not clear.&lt;/P&gt;
&lt;P&gt;Is routing setup correctly on connected devices to route through the FTD?&lt;/P&gt;
&lt;P&gt;And does the FTD have all the correct routes?&lt;/P&gt;
&lt;P&gt;Do you have Access Control rules to permit the traffic?&lt;/P&gt;
&lt;P&gt;Do you have NAT setup, which could unintentially translate traffic?&lt;/P&gt;
&lt;P&gt;Can you run packet-tracer from the CLI to simulate the traffic flow and provide the output for review.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 19:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777001#M1097870</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-16T19:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777041#M1097871</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; Here is what I am looking at&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcook0001_1-1676575974489.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176647i081CB570DBE3E0E7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gcook0001_1-1676575974489.png" alt="gcook0001_1-1676575974489.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal is to have the PC access the internet via Firepower-3, the server via Firepower-1. I need to have the PC be&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;able to reach the server, and vice versa. I was partially able to do this by adding a second gateway to my test pc so that it has both AAA.AAA.3.3 and AAA.AAA.3.1. Not sure if this is the best way to this. We do want the traffic traversing the firewalls when crossing vlans as we want to inspect the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the static routes setup&lt;BR /&gt;Firepower-1 - NAT Rules after&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcook0001_2-1676577642909.png" style="width: 786px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176649iFA99624649660076/image-dimensions/786x167?v=v2" width="786" height="167" role="button" title="gcook0001_2-1676577642909.png" alt="gcook0001_2-1676577642909.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Firepower-3 - Nat Rules after&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcook0001_3-1676577697982.png" style="width: 738px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176650i5C9D9EBE7CE8259E/image-dimensions/738x166?v=v2" width="738" height="166" role="button" title="gcook0001_3-1676577697982.png" alt="gcook0001_3-1676577697982.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input OFFICE-SSMIC icmp 172.29.3.100 0 0 172.30.0.30&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8400 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 21900 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 172.30.0.30 using egress ifc OFFICE-MGMT(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip any any rule-id 268459009&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268459009: ACCESS POLICY: Office-Policy - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268459009: L7 RULE: test&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7050 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 46500 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 4200 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 9900 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 17553, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 16800 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 39014 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;service: ICMP(3501), client: (0), payload: (0), misc: (0)&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3662104 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 0, Rule ID 268459009&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 4 -&amp;gt; 20, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268459009 - Allow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OFFICE-SSMIC(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OFFICE-MGMT(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 3837018 ns&lt;BR /&gt;Drop-reason: (inspect-icmp-seq-num-not-matched) ICMP Inspect seq num not matched, Drop-location: frame 0x0000556c7084ee08 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 20:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777041#M1097871</guid>
      <dc:creator>gcook0001</dc:creator>
      <dc:date>2023-02-16T20:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777044#M1097872</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/308988"&gt;@gcook0001&lt;/a&gt; you could plug the VPLS directly into Firepower 3 on another dedicated internet.&lt;/P&gt;
&lt;P&gt;Create sub-interfaces for each of the VLANs, use the Firepower SVI IP for the VLAN as the default gateway for the PCs on those VLANs. That way all traffic between VLANs is routed to the firewall and subsequently routed to another VLAN (if ACP) permits, the Internet or access the servers.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 20:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777044#M1097872</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-16T20:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777056#M1097874</link>
      <description>&lt;P&gt;I just thought of something. In the given diagram when the PC pings the Server since they are on different vlans the traffic goes to firepower-3, then it tries to send the traffic back to the switch. I believe this would have the same affect as a hairpin vpn connection.&lt;/P&gt;&lt;P&gt;So if connect the VPLS to the firewall instead it would eliminate that issue. I may have to do it at both ends for the same reason.&lt;/P&gt;&lt;P&gt;Please correct me if I am wrong on this.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 21:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777056#M1097874</guid>
      <dc:creator>gcook0001</dc:creator>
      <dc:date>2023-02-16T21:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777061#M1097875</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/308988"&gt;@gcook0001&lt;/a&gt; yes, it sounds like that what you've configured - traffic from the PC is sent up to Firepower3 (as it's the default gateway) then back down to the switch. I imagine the return traffic does not traverse Firepower3&lt;/P&gt;
&lt;P&gt;So use the suggestion above, route the traffic in the different VLANs and the VPLS connection between separate FTD interfaces (physical or sub-interfaces), with FTD doing the routing between the VLANs and over the VPLS. Return traffic would have to take the same path.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 21:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4777061#M1097875</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-16T21:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4780819#M1098103</link>
      <description>&lt;P&gt;Yeah. Unfortunately that was not the issue. Still trying to figure this out.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 18:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4780819#M1098103</guid>
      <dc:creator>gcook0001</dc:creator>
      <dc:date>2023-02-22T18:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4788266#M1098414</link>
      <description>&lt;H3&gt;I found the following information on setting up NAT for multiple devices. What I am trying to figure out is how does a device on the internal network select which firewall to use.&amp;nbsp;&lt;/H3&gt;&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;&lt;H3&gt;Customizing NAT Rules for Multiple Devices&lt;/H3&gt;&lt;P class=""&gt;Because the NAT policy is shared, you can assign a given policy to more than one device. However, you can configure at most one auto NAT rule for a given object. Thus, if you want to configure different translations for an object based on the specific device doing the translation, you need to carefully configure the interface objects (security zones or interface groups) and define network object overrides for the translated address.&lt;/P&gt;&lt;P class=""&gt;The interface objects determine on which devices a rule gets configured. The network object overrides determine what IP addresses are used by a given device for that object.&lt;/P&gt;&lt;P class=""&gt;Consider the following scenario:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;FTD-A and FTD-B have inside networks 192.168.1.0/24 attached to the interface named “inside.”&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;On FTD-A, you want to translate all 192.168.1.0/24 addresses to a NAT pool in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;10.100&lt;/SPAN&gt;.10.10 -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;10.100&lt;/SPAN&gt;.10.200 range when going to the “outside” interface.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;On FTD-B, you want to translate all 192.168.1.0/24 addresses to a NAT pool in the 10.200.10.10 - 10.200.10.200 range when going to the “outside” interface.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class=""&gt;To accomplish the above, you would do the following. Although this example rule is for dynamic auto NAT, you can generalize the technique for any type of NAT rule.&lt;/P&gt;&lt;H4&gt;Procedure&lt;/H4&gt;&lt;HR /&gt;&lt;DIV class=""&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Step&amp;nbsp;1&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Create the security zones for the inside and outside interfaces.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;Choose&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Objects&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Object Management&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Interface Objects&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from the table of contents and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Add&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Security Zone&lt;/SPAN&gt;&lt;/SPAN&gt;. (You can use interface groups instead of zones.)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Configure the inside zone properties.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Name&lt;/SPAN&gt;—Enter a name, for example,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;inside-zone&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Type&lt;/SPAN&gt;—Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Routed&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for routed-mode devices,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Switched&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for transparent mode.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Selected Interfaces&lt;/SPAN&gt;—Add the FTD-A/inside and FTD-B/inside interfaces to the selected list.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Save&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Add&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Security Zone&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and define the outside zone properties.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Name&lt;/SPAN&gt;—Enter a name, for example,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;outside-zone&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Interface Type&lt;/SPAN&gt;—Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Routed&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for routed-mode devices,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Switched&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for transparent mode.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Selected Interfaces&lt;/SPAN&gt;—Add the FTD-A/outside and FTD-B/outside interfaces to the selected list.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Save&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Step&amp;nbsp;2&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Create the network object for the original inside network on the Object Management page.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Network&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from the table of contents and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Add Network&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Add Object&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Configure the inside network properties.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Name&lt;/SPAN&gt;—Enter a name, for example,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;inside-network&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Network&lt;/SPAN&gt;—Enter the network address, for example,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;192.168.1.0/24&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Save&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Step&amp;nbsp;3&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Create the network object for the translated NAT pool and define overrides.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Add Network&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Add Object&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Configure the NAT pool properties for FTD-A.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Name&lt;/SPAN&gt;—Enter a name, for example,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;NAT-pool&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Network&lt;/SPAN&gt;—Enter the range of addresses to include in the pool for FTD-A, for example,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;10.100&lt;/SPAN&gt;.10.10-&lt;SPAN class=""&gt;10.100&lt;/SPAN&gt;.10.200&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Allow Overrides&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Overrides&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;heading to open the list of object overrides.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Add&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to open the Add Object Override dialog box.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Select FTD-B and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Add&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;it to the Selected Devices list.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Override&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and change&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Network&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;10.200.10.10-10.200.10.200&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Add&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to add the override to the device.&lt;/P&gt;&lt;P class=""&gt;By defining an override for FTD-B, whenever the system configures this object on FTD-B, it will use the override value instead of the value defined in the original object.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Save&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Step&amp;nbsp;4&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Configure the NAT rule.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Devices&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;NAT&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and create or edit an&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;FTD&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;NAT policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Add Rule&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Configure the following properties:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;NAT Rule&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;= Auto NAT Rule.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Type&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;= Dynamic.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;On&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Interface Objects&lt;/SPAN&gt;, configure the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Source Interface Objects&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;= inside-zone.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Destination Interface Objects&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;= outside-zone.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV class=""&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;The interface objects control on which devices the rule is configured. Because in this example the zones contain interfaces for FTD-A and FTD-B only, even if the NAT policy were assigned to additional devices, the rule would be deployed to those 2 devices only.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;On&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Translation&lt;/SPAN&gt;, configure the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Original Source&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;= inside-network object.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Translated Source&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Address&lt;/SPAN&gt;&lt;/SPAN&gt;= NAT-pool object.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Save&lt;/SPAN&gt;.&lt;/P&gt;&lt;P class=""&gt;You now have a single rule that will be interpreted differently for FTD-A and FTD-B, providing unique translations for the inside networks protected by each firewall.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 06 Mar 2023 21:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4788266#M1098414</guid>
      <dc:creator>gcook0001</dc:creator>
      <dc:date>2023-03-06T21:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: Adding third firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4790701#M1098545</link>
      <description>&lt;P&gt;So I was finally able to find a solution that works. I had two issues. The first is in ESXI the port groups need to have the VLAN set to 0.&lt;/P&gt;&lt;P&gt;The second thing is in the FMC when creating the interfaces for the third firewall since the subnets span all the firewalls you need to use the same security zones on all the firewalls. I was using a seperate security zone on the third firewall since if I made a change it would ask me to deploy the change to all the firewalls. I wasn't sure if that would cause an issue - it doesn't.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 20:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-third-firewall/m-p/4790701#M1098545</guid>
      <dc:creator>gcook0001</dc:creator>
      <dc:date>2023-03-09T20:58:28Z</dc:date>
    </item>
  </channel>
</rss>

