<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FPR-2110 Trunk port and allow routing via firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819167#M1099732</link>
    <description>&lt;P&gt;I think&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; give perfect answer for this Q&lt;/P&gt;</description>
    <pubDate>Fri, 21 Apr 2023 10:06:04 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-04-21T10:06:04Z</dc:date>
    <item>
      <title>Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818257#M1099679</link>
      <description>&lt;P&gt;Hi, Can we configure the trunk port on&amp;nbsp;Cisco FPR-2110 to communicate with Cisco 9300 series switches? I want to use&amp;nbsp;Cisco FPR-2110 to allow routing between vlans after trunk port configuration.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 06:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818257#M1099679</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-20T06:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818354#M1099680</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1109333"&gt;@Mit_har&lt;/a&gt; yes, you need to configure sub-interfaces on the FTD for each VLAN trunked from the switch.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/interfaces-settings-ifcs-firewall.html#id_86348" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/interfaces-settings-ifcs-firewall.html#id_86348&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You then must configure Access Control rules to permit traffic between the interface zones.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 07:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818354#M1099680</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-20T07:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818410#M1099682</link>
      <description>&lt;P&gt;the 9300 must not config without any SVI and ip routing must disable&amp;nbsp;&lt;BR /&gt;the FRP must config with trunk and subinterface for each vlan&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this will make FPR inter-vlan and inspect all traffic between VLAN&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 09:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818410#M1099682</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-20T09:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818441#M1099683</link>
      <description>&lt;P&gt;Hi, Thanks for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Not sure whether I understood the sentence correctly "the 9300 must not config without any SVI". This means that we have to configure the 9300 with SVI for each vlan and default gateway for each vlan will be via sub interfaces&amp;nbsp;on FPR.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 09:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818441#M1099683</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-20T09:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818443#M1099684</link>
      <description>&lt;P&gt;Yes if you config 9300 with SVI then the intervlan done in SW not in FPR and FPR will never see the traffic between VLAN.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 09:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818443#M1099684</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-20T09:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818451#M1099685</link>
      <description>&lt;P&gt;Hi, We will not do intervlan in 9300 switch. All routing will take place via firewall over the sub interfaces in each vlan. We will using HSRP to have redundancy at 9300 switches, I think in that case we have configure the SVI and standby IP for&amp;nbsp;each vlan in the switch. Please correct me if I am wrong or better design for this network with HSRP at core switch and routing through firewall.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="inhamit_0-1681984675624.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182463iD07094DB0938E03C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="inhamit_0-1681984675624.png" alt="inhamit_0-1681984675624.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 10:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818451#M1099685</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-20T10:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818454#M1099686</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1109333"&gt;@Mit_har&lt;/a&gt; Another option, you could place the VLANs in different VRFs on the 9300s, with a default route for each VRF via the FTD. Therefore intervlan traffic would be routed by the FTD, whilst still maintaining SVIs on the 9300s.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 10:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818454#M1099686</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-20T10:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818464#M1099688</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="inhamit_0-1681984675624 2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182464i256A1616A0F5BDF9/image-size/large?v=v2&amp;amp;px=999" role="button" title="inhamit_0-1681984675624 2.png" alt="inhamit_0-1681984675624 2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="inhamit_0-1681984675624 desing 1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182465iDAA18EA2A803DAEA/image-size/large?v=v2&amp;amp;px=999" role="button" title="inhamit_0-1681984675624 desing 1.png" alt="inhamit_0-1681984675624 desing 1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 10:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818464#M1099688</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-20T10:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818988#M1099725</link>
      <description>&lt;P&gt;Thanks. As per solution 2, we dont need HSRP and SVI at the switch side. Redundancy in the network will be achieved from the firewall HA configuration. We got one more requirement from client to add dedicated firewall for ISP connection. In that case, How traffic will work to have Internet connection to end devices? Please suggest.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="inhamit_0-1682047353766.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182522i333DC0A39BA04EE9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="inhamit_0-1682047353766.png" alt="inhamit_0-1682047353766.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 03:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4818988#M1099725</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-21T03:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819100#M1099727</link>
      <description>&lt;P&gt;HI, When we config sub interfaces on firewall, routing between all vlans works by default. What config I should do so I can restrict the traffic between few vlans or IP address?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 08:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819100#M1099727</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-21T08:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819103#M1099728</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1109333"&gt;@Mit_har&lt;/a&gt; you would need to configure Access Control rules to permit/deny the traffic between the VLAN interfaces. If you do not know what traffic to restrict, permit the traffic and review the logs regularly then granularly modify the rules to become more restrictive.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 08:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819103#M1099728</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-21T08:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819167#M1099732</link>
      <description>&lt;P&gt;I think&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; give perfect answer for this Q&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 10:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819167#M1099732</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-21T10:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819172#M1099733</link>
      <description>&lt;P&gt;I will check and see the best design with new requirement&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 10:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819172#M1099733</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-21T10:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819178#M1099734</link>
      <description>&lt;P&gt;I would go for this design if possible:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cisco_support_forum_01.jpg" style="width: 787px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182547i9885E03B06E94E4C/image-size/large?v=v2&amp;amp;px=999" role="button" title="cisco_support_forum_01.jpg" alt="cisco_support_forum_01.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;- No SVIs on the core switches would be needed as you want to use the core firewalls as the default gateway for the internal VLANs. Having the SVIs on the core switches in itself wouldn't be an issue for the inter-VLAN routing unless the endpoints use those SVIs IP addresses as their default gateway.&lt;/P&gt;
&lt;P&gt;- No HSRP is needed on the switches as you won't use them as the default gateway.&lt;/P&gt;
&lt;P&gt;- I wouldn't connect the ISP firewall to the internal switches, even if that will be in a dedicated VLAN, but still not recommended from the security perspective.&lt;/P&gt;
&lt;P&gt;- The ISP firewall traffic should pass through the core firewalls for inspection.&lt;/P&gt;
&lt;P&gt;- The core firewalls will have subinterfaces as mentioned by Rob where you will apply the security policies for enforcement.&lt;/P&gt;
&lt;P&gt;- Interfaces monitor should be enabled to trigger the HA failover in case a link should fail.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 10:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819178#M1099734</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-04-21T10:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819184#M1099735</link>
      <description>&lt;P&gt;I prefer this Desing, the FW HA with transparent mode only do inspection of traffic and Core (agg) do routing. (Solution1)&lt;BR /&gt;since there is no meaning of Core SW (with L3 capability) in your network and with additional FW for internet.&amp;nbsp;&lt;BR /&gt;then connect the both Core SW to FW (internet)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (639).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182551i22CB11C440170FC2/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (639).png" alt="Screenshot (639).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 10:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819184#M1099735</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-21T10:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819192#M1099737</link>
      <description>&lt;P&gt;Thanks for your reply. I am listing the steps to make this network work:&lt;/P&gt;&lt;P&gt;1) No SVI or HSRP on the core switches A and B.&lt;/P&gt;&lt;P&gt;2) Default gateway will be on firewall with HA using sub interfaces and Inter vlan traffic will be restricted using&amp;nbsp; Access control list.&lt;/P&gt;&lt;P&gt;Pending is: Client wanted t connect the ISP firewall direct to the core switches. Can you please suggest what configuration I should do to make the internet work to device via core switch?&lt;/P&gt;&lt;P&gt;Client wanted to connect the ISP firewall to core switch. Can you please suggest, what&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 10:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819192#M1099737</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-21T10:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819200#M1099738</link>
      <description>&lt;P&gt;Thanks for your recommendations. But as per the client requirement, network should work this way:&lt;/P&gt;&lt;P&gt;1) Routing between internal Vlan's (with few restriction on routing between vlans) should happen via dedicated Internal Firewall. Internal Firewall will be in HA mode and will be connected to core switch.&lt;/P&gt;&lt;P&gt;2) ISP firewall with HA should connect directly to core switch for internet access. Can you please suggest, what configuration I should do to have internet on devices via core switch?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 10:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819200#M1099738</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-21T10:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819206#M1099739</link>
      <description>&lt;P&gt;in Core you config new VLANx, this VLANx have subinterface (or connect to interface) in internal FW and interface in FW(internet)&amp;nbsp;&lt;BR /&gt;NOW traffic&amp;nbsp;&lt;BR /&gt;Client-&amp;gt;Access SW-&amp;gt;Core-&amp;gt;internal FW HA -VLANx-&amp;gt;Core-&amp;gt;FW(internet)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;in&amp;nbsp; FW HA internal there is default route toward the FW (internet)&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 11:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819206#M1099739</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-21T11:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819250#M1099744</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cisco_support_forum_02.jpg" style="width: 730px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182555iA2A5D1FFCF30D072/image-size/large?v=v2&amp;amp;px=999" role="button" title="cisco_support_forum_02.jpg" alt="cisco_support_forum_02.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Keep in mind please that connecting the external edge firewalls to the core switch is not recommended even if those connections will be placed into a separate VLAN, but still. I would personally try to convence the customer not to do so.&lt;/P&gt;
&lt;P&gt;If there is no other option, then as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;explained you would need to create a new VLAN and connect the ISP firewall to that VLAN, however, you also need to create a subinterface on the internal firewalls in that same VLAN and then allow it on the trunk ports between the internal firewalls and the core switches, then finally you configure the default route to the internet on the internal firewalls pointing to the external ones.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 12:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819250#M1099744</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-04-21T12:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-2110 Trunk port and allow routing via firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819284#M1099746</link>
      <description>&lt;P&gt;Thanks for the architecture diagram. It is not clear to me. Just have a quick question here that we dont have stacking between the core switch 1 and 2. We only have fiber connection between them. I think this will not make any problem nor will create any loop in the network. Redundancy in the network to access switches will be taken via firewall HA. Do you have any other opinion on this?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 13:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-2110-trunk-port-and-allow-routing-via-firewall/m-p/4819284#M1099746</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-21T13:54:41Z</dc:date>
    </item>
  </channel>
</rss>

