<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HA on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003301#M1108290</link>
    <description>&lt;P&gt;SDWAN router need to have static route to active FW IP&amp;nbsp;&lt;BR /&gt;the FW IP is swap when fail over and hence always the SDWAN point to active FW&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jan 2024 10:00:15 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-01-23T10:00:15Z</dc:date>
    <item>
      <title>HA on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003295#M1108287</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a greenfield project in which we are implementing FTD.&lt;/P&gt;&lt;P&gt;Let’s assume I have configured&lt;/P&gt;&lt;P&gt;Active : 192.168.75.10&lt;/P&gt;&lt;P&gt;standby : 192.168.75.11&lt;/P&gt;&lt;P&gt;FTD will connect to the SDWAN cedge devices (HA).&lt;/P&gt;&lt;P&gt;connectivity is as below:&lt;/P&gt;&lt;P&gt;SDWAN edge router (HA)—&amp;gt; FTD —&amp;gt; Core Switch —&amp;gt; internal servers&lt;/P&gt;&lt;P&gt;We will configure static route on firewall to reach SDWAN device.&lt;/P&gt;&lt;P&gt;And reverse traffic will reach to primary firewall which is 192.168.75.10&lt;/P&gt;&lt;P&gt;Now my question is during failover when standby firewall will be active. how the reverse traffic will reach to secondary firewall (192.168.75.12)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 09:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003295#M1108287</guid>
      <dc:creator>KayaaKashyap</dc:creator>
      <dc:date>2024-01-23T09:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: HA on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003298#M1108289</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1643055"&gt;@KayaaKashyap&lt;/a&gt; both FTD's (Active/Standby) inside and outside interfaces need to be plugged into a switch and in the same VLAN. Upon failover of the Active (Primary) firewall, the Standby (Secondary) firewall will become active and the firewalls will swap IP addresses. So 192.168.75.10 will be the Active IP address regardless of whether the which firewall is passing traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 09:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003298#M1108289</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-23T09:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: HA on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003301#M1108290</link>
      <description>&lt;P&gt;SDWAN router need to have static route to active FW IP&amp;nbsp;&lt;BR /&gt;the FW IP is swap when fail over and hence always the SDWAN point to active FW&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 10:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003301#M1108290</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-23T10:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: HA on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003302#M1108291</link>
      <description>&lt;P&gt;NOTE:- if you run IGP only the active participate in igp, the standby dont have any role.&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 10:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003302#M1108291</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-23T10:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: HA on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003335#M1108293</link>
      <description>&lt;P&gt;This is helpful. Many thanks.&lt;/P&gt;&lt;P&gt;So we can say Primary IP of firewall works as VIP in FTD HA, right?&lt;/P&gt;&lt;P&gt;Please share if you have supportive document?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 10:39:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003335#M1108293</guid>
      <dc:creator>KayaaKashyap</dc:creator>
      <dc:date>2024-01-23T10:39:29Z</dc:date>
    </item>
    <item>
      <title>Re: HA on FTD</title>
      <link>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003347#M1108295</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1643055"&gt;@KayaaKashyap&lt;/a&gt; yes, the primary unit IP address can be consider as VIP that will always be available regardless of which unit is active.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1706006787414.png" style="width: 684px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/208287i714698515EB0B7ED/image-dimensions/684x76?v=v2" width="684" height="76" role="button" title="RobIngram_0-1706006787414.png" alt="RobIngram_0-1706006787414.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/high-availability.html#ID-2107-000000a8" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/high-availability.html#ID-2107-000000a8&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 10:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-on-ftd/m-p/5003347#M1108295</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-23T10:47:54Z</dc:date>
    </item>
  </channel>
</rss>

