<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migrating DMZ from ASA to FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4925005#M1104308</link>
    <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;DMZ are different interfaces on the firewall, sorry, the grey lines were bit confusing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Production servers and DMZ servers are all VMs within the same vCentre, and connected via the core.&lt;/P&gt;&lt;P&gt;(Physically, we have Nexus switches (L2) between the core switch and the UCS chassis/hosts .)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 18 Sep 2023 13:16:02 GMT</pubDate>
    <dc:creator>atsukane</dc:creator>
    <dc:date>2023-09-18T13:16:02Z</dc:date>
    <item>
      <title>Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918588#M1104042</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I've been tasked with migrating DMZ from a legacy ASA to a FMC managed FTD.&lt;/P&gt;&lt;P&gt;Currently there's a transit LAN to route DMZ destined traffic to the ASA.&lt;/P&gt;&lt;P&gt;We have a 20G (2x10g) port-channel between the core switch and the FTD and all zones listed below are mapped to&amp;nbsp; sub-interfaces.&lt;/P&gt;&lt;P&gt;My plan is to migrate both DMZ and route via the FTD INSIDE, but unsure whether this is a good idea as it's&amp;nbsp; routing dirty traffic with everything else.&lt;/P&gt;&lt;P&gt;Initially, I thought that each zone are protected from one another unless traffic is explicitly allowed, so this is fine but more I think about it became more unsure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestion is very much appreciated.&lt;/P&gt;&lt;P&gt;Before&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atsukane_0-1693988082147.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/196350iA65FEBE1A403D1FA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="atsukane_0-1693988082147.png" alt="atsukane_0-1693988082147.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atsukane_1-1693988109423.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/196351i92813E5BEDF7B7C4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="atsukane_1-1693988109423.png" alt="atsukane_1-1693988109423.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 08:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918588#M1104042</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2023-09-06T08:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918707#M1104048</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97213"&gt;@atsukane&lt;/a&gt; I would keep the dirty (DMZ) traffic away from the trusted (inside) networks.&lt;/P&gt;
&lt;P&gt;You could place each Zone/DMZ etc with it's own VRF to maintain the segmentation, and route to the FTD and if permitted acess the other Zones/DMZ networks.&lt;/P&gt;
&lt;P&gt;Or you could just move the DMZs from the core on to a separate interface of the the FTD.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 09:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918707#M1104048</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-06T09:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918819#M1104049</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have not dealt with VRF in the past, so I had some reading. It's an interesting concept and seems pretty straight forward to configure on FMC.&lt;/P&gt;&lt;P&gt;I'll play around with it and also try separate interfaces on FTD option as well.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 10:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918819#M1104049</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2023-09-06T10:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918865#M1104050</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97213"&gt;@atsukane&lt;/a&gt; VRF will be required on the switches the Zones/DMZs are connected to, this ensures segmentation. The only way these Zones/DMZs can communicate with each other is routing traffic to the FTD.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 10:35:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918865#M1104050</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-06T10:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918892#M1104054</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Ah, ok that makes more sense actually, thank you.&lt;/P&gt;&lt;P&gt;Still trying to get head around how to get this done so I may come back with more questions.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 12:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4918892#M1104054</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2023-09-06T12:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4924991#M1104304</link>
      <description>&lt;P&gt;I've been busy with other works and just revisiting this and updated the diagram to depict interfaces/zones better than the originally posted.&lt;/P&gt;&lt;P&gt;Internet switch is there to split the single fibre presentations to a pair of FTDs and just passing vlans.&lt;/P&gt;&lt;P&gt;We are fully virtualised, aside from some physical load-balancers, and are all connected to the core switch, so the FTD is the core router for the firewalled off vlans.&lt;/P&gt;&lt;P&gt;Using a dummy interface and a zone on the FTD, accessing the DMZ resource over the internet was no problem, but having trouble with internal access.&lt;/P&gt;&lt;P&gt;Just want to make sure the below diagram, the part circled in red, is correct and possible or am I getting this all wrong?&lt;/P&gt;&lt;P&gt;The lazy side of me is telling me to just add the DMZ interface as sub-interface of the inside port-channel as that would be a simple solution &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atsukane_4-1695041166183.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/197544i89D375977DEA1E06/image-size/medium?v=v2&amp;amp;px=400" role="button" title="atsukane_4-1695041166183.png" alt="atsukane_4-1695041166183.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 12:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4924991#M1104304</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2023-09-18T12:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4924993#M1104305</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97213"&gt;@atsukane&lt;/a&gt; is the DMZ physically connected to the core switch (that's what it looks like)....but there is also a grey line connecting directly to the firewall?&lt;/P&gt;
&lt;P&gt;I personally preferring having DMZ servers connected to different switching hardware and physically connected to a different firewall interface. If the DMZ is directly connected to the core switch, then as long as they are different vrf then traffic must be routed up to the FTD and cannot access the LAN directly (unless the ACP permits it).&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 12:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4924993#M1104305</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-18T12:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4925005#M1104308</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;DMZ are different interfaces on the firewall, sorry, the grey lines were bit confusing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Production servers and DMZ servers are all VMs within the same vCentre, and connected via the core.&lt;/P&gt;&lt;P&gt;(Physically, we have Nexus switches (L2) between the core switch and the UCS chassis/hosts .)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 13:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4925005#M1104308</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2023-09-18T13:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4925109#M1104318</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97213"&gt;@atsukane&lt;/a&gt; so if you are having problems with internal access from the new DMZ, are there Access Control Polices to explictly permit the traffic? Is routing setup correctly via the correct interfaces?&lt;/P&gt;
&lt;P&gt;Run packet-tracer from the CLI to simulate the traffic flow and provide the output if necessary.&lt;/P&gt;
&lt;P&gt;Any NAT rules that may unintentially translate the traffic between the DMZ and internal networks?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 16:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4925109#M1104318</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-18T16:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating DMZ from ASA to FTD</title>
      <link>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4927049#M1104452</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;I have now connected the DMZ portchannel directly to Nexus switches and it's working as expected.&lt;/P&gt;&lt;P&gt;Thanks again for your assistance.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 08:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrating-dmz-from-asa-to-ftd/m-p/4927049#M1104452</guid>
      <dc:creator>atsukane</dc:creator>
      <dc:date>2023-09-21T08:51:44Z</dc:date>
    </item>
  </channel>
</rss>

