<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Failover VIP and some basic Qs on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002886#M1108272</link>
    <description>&lt;P&gt;Hi Ramakrishnan, as already mentioned by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;, there is no concept of floating IP address when you configure HA on the ASA/FTDs. The HA concept on the ASA/FTDs is different than what you would do with HSRP and I think Juniper devices.&lt;/P&gt;
&lt;P&gt;With HA on the ASA/FTDs when the active device goes down, its interfaces IP addresses and their MAC addresses will be moved to the secondary device which will become the primary. From the network endpoints perspective nothing would change because the secondary device will now have the same IP addresses and same MAC addresses, so no ARP updates are required.&lt;/P&gt;
&lt;P&gt;Regarding managing the FTD in case the FMC is down, that is a bit tricky. Because even if you can access the FTD via SSH, you won't be able to configure the FTD with anything but using the little set of commands available. For example, say you want to remove an access list entry, changing an IP, add a security rule, etc, many of those tasks won't be possible, and the only way to configure or interact with them would be through the FMC.&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jan 2024 22:29:02 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-01-22T22:29:02Z</dc:date>
    <item>
      <title>FTD Failover VIP and some basic Qs on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002818#M1108263</link>
      <description>&lt;P&gt;Dear Folks,&amp;nbsp;&lt;/P&gt;&lt;P&gt;After quite long time I am seeking some help from Cisco community &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I have few Qs on FTD &amp;amp; FMC&lt;/P&gt;&lt;P&gt;1. In Cisco, there is two types of HA[except Cluster] A/A and A/S in both cases there is no concept of VIP/floating IPs? Instead We suppose to configure IP address on each A and P device with an IP, that IP address get exchange during FO? Is that correct?&lt;/P&gt;&lt;P&gt;2. If we managing FTD from FMC, in the even of FMC failure how do we manage FTD, FTD will be accessible through SSH/FTDM?&amp;nbsp; IN general If I remember correctly FTD will not allow SSH by default?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ram&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 19:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002818#M1108263</guid>
      <dc:creator>Ramakrishnan V</dc:creator>
      <dc:date>2024-01-22T19:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Failover VIP and some basic Qs on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002822#M1108264</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/290774"&gt;@Ramakrishnan V&lt;/a&gt; correct, there is no VIP - each FTD has it's own IP address and the IP address is swapped on failover. So the primary IP address is still the same regardless of which FTD is active.&lt;/P&gt;
&lt;P&gt;An FTD managed by the FMC is manageable via SSH, but you still need to deploy policies via FMC.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 19:50:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002822#M1108264</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-22T19:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Failover VIP and some basic Qs on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002833#M1108267</link>
      <description>&lt;P&gt;&lt;A href="https://rayka-co.com/lesson/cisco-ftd-high-availability/" target="_blank"&gt;https://rayka-co.com/lesson/cisco-ftd-high-availability/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;we use management interface to register FTD to FMC&amp;nbsp;&lt;BR /&gt;and there is no VIP, the host will use the active IP as GW.&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 20:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002833#M1108267</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-22T20:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Failover VIP and some basic Qs on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002886#M1108272</link>
      <description>&lt;P&gt;Hi Ramakrishnan, as already mentioned by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;, there is no concept of floating IP address when you configure HA on the ASA/FTDs. The HA concept on the ASA/FTDs is different than what you would do with HSRP and I think Juniper devices.&lt;/P&gt;
&lt;P&gt;With HA on the ASA/FTDs when the active device goes down, its interfaces IP addresses and their MAC addresses will be moved to the secondary device which will become the primary. From the network endpoints perspective nothing would change because the secondary device will now have the same IP addresses and same MAC addresses, so no ARP updates are required.&lt;/P&gt;
&lt;P&gt;Regarding managing the FTD in case the FMC is down, that is a bit tricky. Because even if you can access the FTD via SSH, you won't be able to configure the FTD with anything but using the little set of commands available. For example, say you want to remove an access list entry, changing an IP, add a security rule, etc, many of those tasks won't be possible, and the only way to configure or interact with them would be through the FMC.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 22:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5002886#M1108272</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-01-22T22:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Failover VIP and some basic Qs on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5003021#M1108280</link>
      <description>&lt;P&gt;Thank you so very much&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 05:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-failover-vip-and-some-basic-qs-on-ftd/m-p/5003021#M1108280</guid>
      <dc:creator>Ramakrishnan V</dc:creator>
      <dc:date>2024-01-23T05:10:42Z</dc:date>
    </item>
  </channel>
</rss>

