<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4996972#M1107951</link>
    <description>&lt;P&gt;You bring up very valid points. I'm finding out the frustrations of migrating users to IKEv2 from SSL as user profiles are not updating correctly as some users haven't connected to the VPN in quite some time. I learned the hardware that if you rename the XML profile, it does not rid of the existing profile. Yet, it just adds it to the list. I ran into an issue early on where even with a correctly configured IKEv2 profile, AnyConnect still wanted to latch on the SSL profile. I digress, though. In the end, if this doesn't all work I may just move users back to SSL and go back to the drawing board.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, I would assume that if I have two public A records for both ISP interfaces, and the user resolves to just one, then I'd imagine the users VPN traffic would traverse that interface and that interface only for inbound/outbound. Load-balancing in this case wouldn't be a necessity per say, but it would be nice to have redundancy should ISP1 fail. But yes, I knew that from documentation that when configuring an ECMP zone, you configure two static routes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For your last concern, yes. We do use this FTD for NAT/PAT so it would be a new NAT pool that's created. We have a load-balancer that's in front of our FTD that load-balances our traffic based on HTTP/HTTPS and I've come across a handful of instances where the destination does not like user's sessions switching addresses. I've noticed this is more common in the finance world. Our accounting department had several issues where they would just get kicked out and this is why. So, policies had to be created to say if destination is to X, take this circuit, else, fallback to Y circuit. My goal would have been to re-create these rules using Policy Based Routing, but I also realized that you could use applications for your rules, but not DNS. Maybe I'm just not looking in the right place, but I see just destination IP and application when using PBR.&lt;/P&gt;&lt;P&gt;It's a tough situation overall. Sure, I can throw this in a lab using EVE-NG but even then, without actually having traffic flowing through it's tough to figure out if the changes you make are even working as intended. We are in healthcare, so budgets in general are pretty strict to begin with.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm still working with my Cisco SE that's assigned to us and with TAC on coming up with the right solution. Perhaps this is the time for a possible re-design.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jan 2024 17:31:18 GMT</pubDate>
    <dc:creator>emasters</dc:creator>
    <dc:date>2024-01-15T17:31:18Z</dc:date>
    <item>
      <title>ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994448#M1107813</link>
      <description>&lt;P&gt;For some context, we have dual Firepower 2140s in HA managed by FMCv. Both FTD and FMCv are on 7.2.5.1 as of last week at the start of 2024.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently utilize our FTDs as external firewalls and head-ends for both site-to-site VPNs and Remote Access VPNs. Our RA VPN users are currently utilizing IPsec. We have dual 1Gbps internet connections on a load-balancer that sits in front of the FTDs while the FTDs themselves have just a single outside connection that feeds into the LAN of the load-balancer. We also have a new 10Gbps connection as of the last month that we'd like to start utilizing. The cost of using 10Gbps on our load-balancer is going to be costly as it's about $70k worth in licensing. This started the research of seeing if the FTDs were capable of load-balancihng outbound traffic and that's where I came across ECMP and Policy Based Routing. As of 7.2, the FMC natively supports the configuration of both without the need of FlexConfig. Neat.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Naturally, I started reading documentation on the requirements. For the most part, I met all the requirements execpt for two as noted by the documentation &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/routing-ecmp.html" target="_blank" rel="noopener"&gt;here.&lt;/A&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Following interfaces cannot be associated with an ECMP zone -&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Interfaces in RA VPN configuration with SSL enabled&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Threat defense does not support ECMP with NAT in IPsec sessions—a standard IPsec virtual private network (VPN) tunnel does not work with NAT points in the delivery path of IPsec packets.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;My first question/concern with the first point is are they referring to having SSL on the interface itself, or having SSL enabled in the RA VPN Group Policy? In other words, SSL enabled within the Access Interface configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="emasters_0-1704987578166.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207062iFE70FC2BFAEEC9B9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="emasters_0-1704987578166.png" alt="emasters_0-1704987578166.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Or.....the Group Policy&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="emasters_1-1704987621797.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207063i56705AC439412919/image-size/medium?v=v2&amp;amp;px=400" role="button" title="emasters_1-1704987621797.png" alt="emasters_1-1704987621797.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;If it's referring to having SSL enabled on the actual interface itself and need to turn that off, then I suppose I'll need to come up with a gameplan regarding our VPN users as, If I recall, all RA VPN sessions utilize SSL initially.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The second point I may just need clarification on it in general so I'm not misunderstanding the underlying concept.&lt;/P&gt;&lt;P&gt;The end goal here would be to have both ISPs terminating on the FTD with the ability to load-balance outbound internet traffic utilizing ECMP and PBR to avoid paying the licensing for the load-balancers. However, it seems that the VPNs may be my stopping point if I do not have an alternative solution.&lt;/P&gt;&lt;P&gt;I do have an active case with TAC opened about this, but figured I'd ask the question to the community and see if anyone has ever utilized ECMP/PBR with the FTD and some feedback.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 15:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994448#M1107813</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-11T15:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994470#M1107819</link>
      <description>&lt;P&gt;check below&lt;BR /&gt;MHM&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 00:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994470#M1107819</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-12T00:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994489#M1107824</link>
      <description>&lt;P&gt;Care to elaborate on the first statement? ECMP is work but not for VPN. Not sure if I am following you.&lt;/P&gt;&lt;P&gt;Regarding your second statement, if I follow you, I think that's what I'm trying to achieve.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="emasters_0-1704990217298.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207068iE4E6E8C6C25A39FC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="emasters_0-1704990217298.png" alt="emasters_0-1704990217298.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Would ISP1 and ISP2 not be considered "different next-hop?" Apologies if I'm not fully understanding what you're telling me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 16:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994489#M1107824</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-11T16:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994538#M1107829</link>
      <description>&lt;P&gt;So far as I remember, the system won't allow you enable webvpn on the interface configured as a member of ECMP traffic-zone. On ASA this corresponds to:&lt;/P&gt;&lt;PRE&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;/PRE&gt;&lt;P&gt;You can test if this limitation still applies or ask TAC.&lt;/P&gt;&lt;P&gt;2nd limitation you mentioned is unclear. They probably mean that NAT-T is not supported on interfaces configured as members of ECMP traffic-zones. This is probably wrong. Typically, when you see such a note in the documentation written in bad English, it is added by Cisco TAC and doc team take no responsibility for it. There should probably be an internal doc bug which asked to add this note. TAC will be able to find it, if it exists, and shed some light.&lt;/P&gt;&lt;P&gt;So, if you use IKEv2 AnyConnect and not standards-based built-in IKEv2 client, ECMP becomes problematic, because AnyConnect uses SSL for profile and software updates. You can try to use PBR with path monitoring for load-balancing, although I'm not quite sure how to configure routing: in documentation they use "Send To: Egress Interface", but who provides next-hop IP address in this case? In CLI PBR with Path Monitoring corresponds to "set adaptive-interface {rtt | jitter | lost | mos} outside1 outside2", so it looks like we need static routes, but without ECMP traffic-zones it is not possible to add two equal-admin-distance static default routes via different interfaces... I'm puzzled.&lt;/P&gt;&lt;P&gt;Let us know what you learn from TAC please.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 17:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994538#M1107829</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-11T17:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994544#M1107830</link>
      <description>&lt;P&gt;Would ISP1 and ISP2 not be considered "different next-hop?" correct and it work&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-routing.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-routing.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for VPN are we talk about S2S or RA ?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 17:55:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994544#M1107830</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-11T17:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994564#M1107833</link>
      <description>&lt;P&gt;It would be both Remote Access and Site to Site VPNs. Not many compared to others I'm sure, but something to consider.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="emasters_0-1704997629436.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207083i1F67FF4E74631A1E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="emasters_0-1704997629436.png" alt="emasters_0-1704997629436.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In theory, I would also add another interface to the RA VPN configuration as well for redundancy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 18:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994564#M1107833</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-11T18:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994579#M1107839</link>
      <description>&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 19:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994579#M1107839</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-11T19:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994585#M1107841</link>
      <description>&lt;P&gt;This was from the documentation that was in my original post, which I do understand the concepts of it and what it accomplishes. Honestly, I think it would be a pretty easy solution to implement if I were not doing any VPNs of any kind on my 2140s. I like the idea of having dedicated firewalls for VPNs and another set for external access. Just need clarification on the "interfaces used for site-to-site VPN or remote access VPN connection" before I consider planning for a maintenance window to figure things out the hard way if I were to miss something.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 19:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994585#M1107841</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-11T19:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994587#M1107842</link>
      <description>&lt;P&gt;later we discuss connect FW and use it as VPN&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 00:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994587#M1107842</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-12T00:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994592#M1107844</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;, don't confuse people with incorrect statements. The VPN-related limitations have been lifted in FTD 7.1 and ASA 9.17:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/routing-ecmp.html#id_121522" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/routing-ecmp.html#id_121522&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Only SSL limitation remains.&lt;/P&gt;&lt;P&gt;Of course, all of this needs to be tested carefully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 19:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994592#M1107844</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-11T19:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994715#M1107848</link>
      <description>&lt;P&gt;So we Agree that in your case you need to use ECMP Zone&amp;nbsp; since you use two or more interface (in your case OUT1 and OUT2).&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="emasters_0-1704990217298.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207105iB7ECBACAF7F05B80/image-size/large?v=v2&amp;amp;px=999" role="button" title="emasters_0-1704990217298.png" alt="emasters_0-1704990217298.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;for VPN we have two cases&amp;nbsp;&lt;BR /&gt;1- VPN interface&amp;nbsp;&lt;BR /&gt;2- routing issue with VPN&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;VPN types and point to consider&amp;nbsp;&lt;BR /&gt;1- VPN S2S (not VTI)&lt;BR /&gt;according to last ver. 7.4 you can use ECMP Zone interface config as S2S VPN&amp;nbsp;&lt;BR /&gt;so we will use two interface with one destination&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/security-vpn/216709-configure-failover-for-ipsec-site-to-sit.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/security-vpn/216709-configure-failover-for-ipsec-site-to-sit.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;here how FTD handle traffic, if you check the link above we use two ISP and config two default route with two different metric&amp;nbsp;&lt;BR /&gt;BUT in ECMP all route have same metric, here the trick according to Cisco the FTD route the traffic according to&amp;nbsp;&lt;BR /&gt;1- conn&lt;BR /&gt;2- RIB&lt;BR /&gt;so the traffic always will use one of interface and keep other as backup.&lt;BR /&gt;NOTE:-we must consider in this design that the VPN S2S Peer accept the traffic from two FTD VPN s2s IP&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;2- s VTI&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this more easy, we can config one tunnel and make it use two FTD OUT interface, since it route-based it can use both route with same metric to send traffic to Peer&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;3- RA SSL this according to last ver. 7.4 not support to use ECMP zone interface, so it totally not work&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4- RA IKEv2&amp;nbsp; same as point 1 VPN S2S (not VTI)&lt;BR /&gt;&lt;BR /&gt;NOW&amp;nbsp;&lt;BR /&gt;this Firepower is work for ECMP (without PBR) and support RA IKEv2 still the issue of SSL VPN&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this depend on you now, you can add new FW connect it to DMZ of FPR2K and use it as VPN SSL RA server or you can try use RA IKEv2, but to be honest RA SSL VPN&amp;nbsp; is more simple and powerful and easy in install in user PC, I see alot of issue using RA IKEv2.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;THIS NOT RECOMMEND IT ONLY IDEA I SHARE WITH YOU&amp;nbsp;&lt;BR /&gt;goodluck friend&amp;nbsp;&lt;BR /&gt;MHM&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 01:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994715#M1107848</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-12T01:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994716#M1107849</link>
      <description>&lt;P&gt;if you have something to add please share otherwise let us work, we share idea here.&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 01:02:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4994716#M1107849</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-12T01:02:34Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4996902#M1107949</link>
      <description>&lt;P&gt;So far, not much of a response from TAC aside from the following:&lt;/P&gt;&lt;P&gt;"I hope this message finds you well. I did research and found that if we want to apply ECMP on an interface that has RAVPN configured, we will need to use ikev2 instead of SSL for the VPN. This is running version 7.1 or latest, on older version this is not possible. I confirmed this on our internal database and with my team."&lt;/P&gt;&lt;P&gt;Nothing new here. Just telling us what we already know per Cisco's documentation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 15:40:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4996902#M1107949</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-15T15:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4996964#M1107950</link>
      <description>&lt;P&gt;Thank you for the update. In my opinion this is a roadblock for the entire idea of configuring load-balancing for outbound traffic and AnyConnect RA VPN on the same box. It is possible to use only IKEv2 in AnyConnect, but this is very inconvenient as the client and profiles can no longer be auto-updated.&lt;/P&gt;&lt;P&gt;Also, I figured out that "PBR with path monitoring" won't work without ECMP. The problem is that this form of PBR uses "set interface" CLI instead of "set IP next-hop". PBR sets interface and after interface is determined FTD makes routing lookup to find valid next-hop on the chosen interface. This basically means that two default routes need to be configured which again requires ECMP (traffic-zones). So, the AnyConnect problem stays the same.&lt;/P&gt;&lt;P&gt;Finally, I have another concern. Do you use NAT/PAT on this ASA for outbound traffic? If you add 10G interface, will the PAT pool stay the same or there will be a new pool? What will happen in this case if ECMP is configured? In case of two different pools connections will be distributed randomly and NATed to different IP addresses, even if sender IP (user) is the same. User sessions may be rejected by Web sites which expect to see all connections for the same user coming from the same IP address. In case of a single pool and identical NAT configuration on both egress interfaces, same user should theoretically always be allocated same IP address from the round-robin PAT pool, but this needs to be carefully tested too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 17:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4996964#M1107950</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-15T17:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4996972#M1107951</link>
      <description>&lt;P&gt;You bring up very valid points. I'm finding out the frustrations of migrating users to IKEv2 from SSL as user profiles are not updating correctly as some users haven't connected to the VPN in quite some time. I learned the hardware that if you rename the XML profile, it does not rid of the existing profile. Yet, it just adds it to the list. I ran into an issue early on where even with a correctly configured IKEv2 profile, AnyConnect still wanted to latch on the SSL profile. I digress, though. In the end, if this doesn't all work I may just move users back to SSL and go back to the drawing board.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, I would assume that if I have two public A records for both ISP interfaces, and the user resolves to just one, then I'd imagine the users VPN traffic would traverse that interface and that interface only for inbound/outbound. Load-balancing in this case wouldn't be a necessity per say, but it would be nice to have redundancy should ISP1 fail. But yes, I knew that from documentation that when configuring an ECMP zone, you configure two static routes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For your last concern, yes. We do use this FTD for NAT/PAT so it would be a new NAT pool that's created. We have a load-balancer that's in front of our FTD that load-balances our traffic based on HTTP/HTTPS and I've come across a handful of instances where the destination does not like user's sessions switching addresses. I've noticed this is more common in the finance world. Our accounting department had several issues where they would just get kicked out and this is why. So, policies had to be created to say if destination is to X, take this circuit, else, fallback to Y circuit. My goal would have been to re-create these rules using Policy Based Routing, but I also realized that you could use applications for your rules, but not DNS. Maybe I'm just not looking in the right place, but I see just destination IP and application when using PBR.&lt;/P&gt;&lt;P&gt;It's a tough situation overall. Sure, I can throw this in a lab using EVE-NG but even then, without actually having traffic flowing through it's tough to figure out if the changes you make are even working as intended. We are in healthcare, so budgets in general are pretty strict to begin with.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm still working with my Cisco SE that's assigned to us and with TAC on coming up with the right solution. Perhaps this is the time for a possible re-design.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 17:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4996972#M1107951</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-15T17:31:18Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4997034#M1107952</link>
      <description>&lt;P&gt;&lt;EM&gt;Also, I would assume that if I have two public A records for both ISP interfaces, and the user resolves to just one, then I'd imagine the users VPN traffic would traverse that interface and that interface only for inbound/outbound. Load-balancing in this case wouldn't be a necessity per say, but it would be nice to have redundancy should ISP1 fail.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Correct. Inbound VPN traffic will create connection on, say, outside2 interface of the firewall and reverse traffic will always take the same interface outside2. But if outside2 fails (doesn't matter if interface itself fails or connectivity is lost), AnyConnect will go into the "reconnecting" state until the user disconnects manually.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;but I also realized that you could use applications for your rules, but not DNS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;No, not really. An "application" in this context is a "DNS domain name" or "domain + subnet/protocol/port" combination. This is also called network-service group or NSG. This article explains the concept very well: &lt;A href="https://secure.cisco.com/secure-firewall/docs/policy-based-routing-with-path-monitoring" target="_blank"&gt;https://secure.cisco.com/secure-firewall/docs/policy-based-routing-with-path-monitoring&lt;/A&gt;. So, this can be used to route certain "domain" traffic forcefully to specific outside interface.&lt;/P&gt;&lt;P&gt;It appears to me that at the current level of FTD software development it would be easier to use something like&lt;/P&gt;&lt;P&gt;route outside1 0.0.0.0 128.0.0.0 x.x.x.x&lt;BR /&gt;route outside2 128.0.0.0 128.0.0.0 y.y.y.y&lt;/P&gt;&lt;P&gt;avoiding all complications with ECMP, NAT, PBR, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 20:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4997034#M1107952</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-15T20:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4997698#M1107995</link>
      <description>&lt;P&gt;Quick update regarding my case with TAC:&lt;/P&gt;&lt;P&gt;"Hi team,&lt;BR /&gt;Regarding you questions, when configuring the RAVPN you can select the protocols that you are going to use for the tunnel and the interface under the tab "Advanced interfaces". On that tab we should disable the ssl protocol and only enable the ipsec protocol so you can use ECMP on the same interface where the VPN is being formed. Another change we need to perform to use ipsec is select the ipsec protocol on the xml profile as is shown on the screenshot."&lt;/P&gt;&lt;P&gt;The screenshot TAC attached. This is something I already have set for my users.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="07_02_59.jpg" style="width: 510px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207460i3FEBFD7E0986808B/image-dimensions/510x375?v=v2" width="510" height="375" role="button" title="07_02_59.jpg" alt="07_02_59.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Which would mean this would involve disabling SSL at the interface level under Access Interfaces, which is what I was afraid of.&lt;/P&gt;&lt;P&gt;I think at this point I'm thinking this is a lost cause without this being a completely horrible experience for our end users.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 15:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4997698#M1107995</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-16T15:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4997742#M1107998</link>
      <description>&lt;P&gt;I confuse here&amp;nbsp;&lt;BR /&gt;you allow IKEv2 and SSL(+DTLS) in outside but that not meaning you use IKEv2 anyconnect.&amp;nbsp;&lt;BR /&gt;if you decide to go with ECMP then SSL completely not work if you permit or not in outside.&amp;nbsp;&lt;BR /&gt;and sure client will not happy using ikev2 instead of ssl&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 16:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/4997742#M1107998</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-16T16:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/5003970#M1108321</link>
      <description>&lt;P&gt;So, had my chat with some folks from Cisco that specialize in security. Disabling SSL for Remote Access VPN would seem to do more harm than good. It would ruin the experience and it was advised not to move forward with ECMP/PBR. However, we tossed around the idea of having a pair of firewalls that were dedicated for VPN and VPN only. This would include both Site to Site and Remote Access and would eliminate a few of the caveats regarding ECMP/PBR and would allow us to move forward. This should be able to hold us over until we're in a position to setup BGP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can follow up once we've moved forward and leave some feedback. That's where things stand at the moment.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 21:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/5003970#M1108321</guid>
      <dc:creator>emasters</dc:creator>
      <dc:date>2024-01-23T21:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP and PBR with dual FTD 2140s managed by FMCv on 7.2.5.1</title>
      <link>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/5016769#M1109062</link>
      <description>&lt;P&gt;Ok&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/349980"&gt;@emasters&lt;/a&gt; , this is a move in the right direction.&lt;/P&gt;&lt;P&gt;As a side note, I've just accidentally found an answer to your second question about documentation saying&lt;EM&gt; "Threat defense does not support ECMP with NAT in IPsec sessions — a standard IPsec virtual private network (VPN) tunnel does not work with NAT points in the delivery path of IPsec packets".&lt;/EM&gt; This is yet another software caveat:&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;CSCwf43850&lt;/SPAN&gt; ECMP + NAT for ipsec sessions support request for Firepower&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt; Incoming IPSEC packets dropped with Drop-reason: (bad-ipsec-prot) IPSEC not AH or ESP. &lt;STRONG&gt;Conditions:&lt;/STRONG&gt; Equal-Cost Multi-Path (ECMP) over VPN and NAT Traversal (NAT-T, ESP UDP encapsulation). &lt;STRONG&gt;Workaround:&lt;/STRONG&gt; Do not use NAT-T by avoiding NAT in the path. If not possible to avoid NAT-T do not use ECMP. &lt;STRONG&gt;Further Problem Description:&lt;/STRONG&gt; This is a day one issue - the features combination never worked.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;This bug was fixed in 9.18.4.8 and 9.20.2.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 12 Feb 2024 17:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ecmp-and-pbr-with-dual-ftd-2140s-managed-by-fmcv-on-7-2-5-1/m-p/5016769#M1109062</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-12T17:01:43Z</dc:date>
    </item>
  </channel>
</rss>

