<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pre-Sales Engineer Question: FTD/Firepower Family (IRB Limitations in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4970201#M1106437</link>
    <description>&lt;P&gt;Okay; no advanced integrated bridging/switching function for now.&lt;/P&gt;&lt;P&gt;Until then, we can consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FTDv/NGFWvGuest on&amp;nbsp;&lt;SPAN&gt;Cisco UCS-E module within a ASR4K&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Externally virtualized (FTDv/NGFWv virtual on something compact UCS Hyperflex 2-node, etc.)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;(&lt;EM&gt;Maybe in future?&lt;/EM&gt;) FTD can run as Guest on Catalyst&amp;nbsp;9000 as IOS-XE/IOX Virtual Hosted APP&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Clustering&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for clue'ing me into Clustering feature on FirePower 4000+ (I recently learned that Fortinet also supports&amp;nbsp;&lt;/SPAN&gt;"Virtual Clustering" as well for distributing the CPU load of asymmetric VDOM computational load, probably based on Cisco)&lt;/P&gt;</description>
    <pubDate>Sat, 02 Dec 2023 10:09:34 GMT</pubDate>
    <dc:creator>BrianSekleckiGE</dc:creator>
    <dc:date>2023-12-02T10:09:34Z</dc:date>
    <item>
      <title>Pre-Sales Engineer Question: FTD/Firepower Family (IRB Limitations)</title>
      <link>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4968215#M1106362</link>
      <description>&lt;P&gt;Sales engineer question&lt;/P&gt;&lt;P&gt;Assumptions: Active/Active (or Active/Standby)&lt;/P&gt;&lt;P&gt;Assumptions: Multi-Instance-capable&lt;/P&gt;&lt;P&gt;Assumptions: Routed Mode&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If running an active/active (or active-standby) FTD/Firepower cluster, dual-chassis, and implementing Bridge Domains and VLANs, can a Dot1Q Trunk be passed directly between the two chassis (effectively creating a chassis-spanning software-switch that obviates the need for an an external switch)?&lt;/LI&gt;&lt;LI&gt;If so/yes, what are the limitations (E.g., does the FTD bridge domain run an STP instance? Is LACP Supported?)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The question derives from a requirement where there is exists space constraints and consolidating the Firewalling and Switching/Bridging function (with very low density port requirements) into one 1U device is &lt;EM&gt;highly desired.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The historical Cisco precedent here would be a Router with a standalone/independently managed Cisco Catalyst switch-module, but I haven't seen any:&lt;/P&gt;&lt;P&gt;* Firepower/FTD with a Catalyst (or other family) switch module except for the FTD1010 ("L2 Switch")&lt;/P&gt;&lt;P&gt;* Catalyst (or other family) with a Firepower/FTD module&lt;/P&gt;&lt;P&gt;* There do, however, seem to be quite a few options for virtualizing the Firepower/FTD, especially onto a Cisco UCS-E module (Modules which I've seen as a ASR4K / ISR module, but not as a Catalyst module)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 12:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4968215#M1106362</guid>
      <dc:creator>BrianSekleckiGE</dc:creator>
      <dc:date>2023-11-29T12:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pre-Sales Engineer Question: FTD/Firepower Family (IRB Limitations</title>
      <link>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4968224#M1106363</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I'm exploring the possibility of creating a chassis-spanning software-switch between active/active FTD/Firepower cluster chassis using a Dot1Q Trunk&lt;A href="https://topfollowapkdownload.in/" target="_self"&gt;.&lt;/A&gt; Wondering about limitations—does FTD's bridge domain run STP, and is LACP supported?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 15:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4968224#M1106363</guid>
      <dc:creator>Isabella54</dc:creator>
      <dc:date>2024-02-15T15:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Pre-Sales Engineer Question: FTD/Firepower Family (IRB Limitations</title>
      <link>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4969850#M1106420</link>
      <description>&lt;P&gt;Neither FP1010 hardware switch, nor ASA/FTD transparent mode software run STP. In both cases STP BPDUs pass through the device by default.&lt;/P&gt;&lt;P&gt;In case of ASA A/S failover (aka FTD HA) one unit is active and the other one is standby and doesn't forward traffic. FP1010 hardware switch is an exception to this rule. The switchports on it belong to the switch and hence are not controlled by firewall software, which means that switchports on standby can forward traffic. This in turn means that STP loop will be formed if FP1010 switchports and failover are used together and external switch STP needs to take care of it. If you don't have external switch and just want to interconnect two FP1010 switchports with a dot1q trunk, to create a bigger/redundant switch, the STP loop is unavoidable.&lt;/P&gt;&lt;P&gt;Also, as a side note, in case of a software switch (transparent mode firewall) it's usually recommended to block BPDUs on the firewall with ethertype ACLs to prevent external switch ports from going through STP learning phase right after the firewall switchover, which delays network convergence.&lt;/P&gt;&lt;P&gt;Clustering is another technology. The cluster can run in transparent or routed firewall mode and appears to the outside world as a single device. FP1k doesn't support clustering, only higher models do. In case of a cluster, spanned port-channel is formed on a few firewall chassis. This spanned port-channel runs cLACP which is a cluster LACP. The other side thinks that it talks to a single device, so STP isn't needed here.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 14:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4969850#M1106420</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-12-01T14:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: Pre-Sales Engineer Question: FTD/Firepower Family (IRB Limitations</title>
      <link>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4970201#M1106437</link>
      <description>&lt;P&gt;Okay; no advanced integrated bridging/switching function for now.&lt;/P&gt;&lt;P&gt;Until then, we can consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FTDv/NGFWvGuest on&amp;nbsp;&lt;SPAN&gt;Cisco UCS-E module within a ASR4K&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Externally virtualized (FTDv/NGFWv virtual on something compact UCS Hyperflex 2-node, etc.)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;(&lt;EM&gt;Maybe in future?&lt;/EM&gt;) FTD can run as Guest on Catalyst&amp;nbsp;9000 as IOS-XE/IOX Virtual Hosted APP&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Clustering&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for clue'ing me into Clustering feature on FirePower 4000+ (I recently learned that Fortinet also supports&amp;nbsp;&lt;/SPAN&gt;"Virtual Clustering" as well for distributing the CPU load of asymmetric VDOM computational load, probably based on Cisco)&lt;/P&gt;</description>
      <pubDate>Sat, 02 Dec 2023 10:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pre-sales-engineer-question-ftd-firepower-family-irb-limitations/m-p/4970201#M1106437</guid>
      <dc:creator>BrianSekleckiGE</dc:creator>
      <dc:date>2023-12-02T10:09:34Z</dc:date>
    </item>
  </channel>
</rss>

