<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BGP between two remote FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052166#M1110471</link>
    <description>&lt;P&gt;What are your software versions at both ends?&lt;/P&gt;</description>
    <pubDate>Thu, 28 Mar 2024 14:41:10 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2024-03-28T14:41:10Z</dc:date>
    <item>
      <title>BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051168#M1110425</link>
      <description>&lt;P&gt;I have two Firepowers in two remote offices and i have two ISPs in each office, i had configured vti ipsec vpn between two offices but they are working with static routes, can i configure dynamic routing protocols for failover vpn? I tried to configure BGP but neighbours idle, what can you advice?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 06:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051168#M1110425</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-03-27T06:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051172#M1110427</link>
      <description>&lt;P&gt;Share the config of vti and bgp of ftd&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 06:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051172#M1110427</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-27T06:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051238#M1110430</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657874"&gt;@sherali mamatkarimov&lt;/a&gt; have you configured &lt;SPAN&gt;&lt;STRONG&gt;Send Virtual Tunnel Interface IP to the peers &lt;/STRONG&gt;and &lt;STRONG&gt;Allow incoming IKEv2 routes from the peers &lt;/STRONG&gt;under the VPN endpoint?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 08:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051238#M1110430</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-27T08:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051787#M1110461</link>
      <description>&lt;P&gt;I haven't this option&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="111.png" style="width: 450px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214072i29DC6DFD22821DA4/image-size/large?v=v2&amp;amp;px=999" role="button" title="111.png" alt="111.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 03:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051787#M1110461</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-03-28T03:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051797#M1110462</link>
      <description>&lt;P&gt;Site A FMC configuration&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="111.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214075i200BED22FAB88A70/image-size/medium?v=v2&amp;amp;px=400" role="button" title="111.png" alt="111.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="112.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214076i1A0A49C3902D5B03/image-size/medium?v=v2&amp;amp;px=400" role="button" title="112.png" alt="112.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="113.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214074iF55EB1BA346C657E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="113.png" alt="113.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="114.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214073iFABEBD698F171AFB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="114.png" alt="114.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site B FDM configuration&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="222.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214078i6785B74351303CFE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="222.png" alt="222.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="223.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214079i70A869F939E30ECD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="223.png" alt="223.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="224.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214077i84AEBE9A56223FC3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="224.png" alt="224.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 03:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5051797#M1110462</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-03-28T03:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052166#M1110471</link>
      <description>&lt;P&gt;What are your software versions at both ends?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 14:41:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052166#M1110471</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-03-28T14:41:10Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052349#M1110486</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now each FW have dual ISP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-config two VTI each one have it interface&lt;/P&gt;
&lt;P&gt;- config two static route one for each VTI tunnel destination&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-config bgp with two neighbors' one for each vti&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 20:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052349#M1110486</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-28T20:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052537#M1110495</link>
      <description>&lt;P&gt;i have configured two vti and static routes everything works fine except BGP, i can ping each side with static route but i want dynamic update routes by BGP, in my case BPG neighbours are idle configuration i shared you, what can i do to up neighbours? Do i need to open 179 port from WAN?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 06:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052537#M1110495</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-03-29T06:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052558#M1110496</link>
      <description>&lt;P&gt;Can I see&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show run router &amp;lt;- from firepower cli&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 07:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052558#M1110496</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-29T07:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052563#M1110497</link>
      <description>&lt;P&gt;Sure&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;&amp;gt; show route&lt;/P&gt;&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;SI - Static InterVRF, BI - BGP InterVRF&lt;BR /&gt;Gateway of last resort is x.x.x.x to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via y.y.y.x, Link-to-ISP1&lt;BR /&gt;C 10.20.82.0 255.255.255.252 is directly connected, vti_10.20.82.1&lt;BR /&gt;L 10.20.82.1 255.255.255.255 is directly connected, vti_10.20.82.1&lt;BR /&gt;C 10.20.82.4 255.255.255.252 is directly connected, vti_10.20.82.5&lt;BR /&gt;L 10.20.82.5 255.255.255.255 is directly connected, vti_10.20.82.5&lt;BR /&gt;C 10.20.82.12 255.255.255.252 is directly connected, vti_10.20.82.13&lt;BR /&gt;L 10.20.82.13 255.255.255.255 is directly connected, vti_10.20.82.13&lt;BR /&gt;C 10.20.82.16 255.255.255.252 is directly connected, vti_10.20.82.17&lt;BR /&gt;L 10.20.82.17 255.255.255.255 is directly connected, vti_10.20.82.17&lt;BR /&gt;S 10.57.0.0 255.255.0.0 [1/0] via 10.20.82.2, vti_10.20.82.1&lt;BR /&gt;C 10.56.0.0 255.255.254.0 is directly connected, Network_Management&lt;BR /&gt;L 10.56.0.1 255.255.255.255 is directly connected, Network_Management&lt;BR /&gt;C 10.56.10.0 255.255.254.0 is directly connected, Server_Management&lt;BR /&gt;L 10.56.10.1 255.255.255.255 is directly connected, Server_Management&lt;BR /&gt;C 10.56.12.0 255.255.255.0 is directly connected, Shared_Server&lt;BR /&gt;L 10.56.12.1 255.255.255.255 is directly connected, Shared_Server&lt;BR /&gt;C 10.56.14.0 255.255.254.0 is directly connected, WLAN_Management&lt;BR /&gt;L 10.56.14.1 255.255.255.255 is directly connected, WLAN_Management&lt;BR /&gt;C 10.56.16.0 255.255.254.0 is directly connected, Production_3&lt;BR /&gt;L 10.56.16.1 255.255.255.255 is directly connected, Production_3&lt;BR /&gt;C 10.56.18.0 255.255.255.128 is directly connected, PRODUCTION_1&lt;BR /&gt;L 10.56.18.1 255.255.255.255 is directly connected, PRODUCTION_1&lt;BR /&gt;C 10.56.18.128 255.255.255.128 is directly connected, PRODUCTION_2&lt;BR /&gt;L 10.56.18.129 255.255.255.255 is directly connected, PRODUCTION_2&lt;BR /&gt;C 10.56.19.0 255.255.255.0 is directly connected, PRODUCTION_Server&lt;BR /&gt;L 10.56.19.1 255.255.255.255 is directly connected, PRODUCTION_Server&lt;BR /&gt;C 10.56.20.0 255.255.254.0 is directly connected, 4_PRODUCTION&lt;BR /&gt;L 10.56.20.1 255.255.255.255 is directly connected, 4_PRODUCTION&lt;BR /&gt;C 10.56.22.0 255.255.254.0 is directly connected, Wi-Fi_Leaders&lt;BR /&gt;L 10.56.22.1 255.255.255.255 is directly connected, Wi-Fi_Leaders&lt;BR /&gt;C 10.56.24.0 255.255.248.0 is directly connected, Wi-Fi_Employee&lt;BR /&gt;L 10.56.24.1 255.255.255.255 is directly connected, Wi-Fi_Employee&lt;BR /&gt;C 10.56.32.0 255.255.248.0 is directly connected, Wi-Fi_Guest&lt;BR /&gt;L 10.56.32.1 255.255.255.255 is directly connected, Wi-Fi_Guest&lt;BR /&gt;C 10.56.40.0 255.255.248.0 is directly connected, Maintenance_Device&lt;BR /&gt;L 10.56.40.1 255.255.255.255 is directly connected, Maintenance_Device&lt;BR /&gt;C 10.56.48.0 255.255.248.0 is directly connected, VoIP&lt;BR /&gt;L 10.56.48.1 255.255.255.255 is directly connected, VoIP&lt;BR /&gt;C 10.56.56.0 255.255.252.0 is directly connected, End_Device&lt;BR /&gt;L 10.56.56.1 255.255.255.255 is directly connected, End_Device&lt;BR /&gt;C 10.56.64.0 255.255.240.0 is directly connected, End_User&lt;BR /&gt;L 10.56.64.1 255.255.255.255 is directly connected, End_User&lt;BR /&gt;V 10.56.80.10 255.255.255.255&lt;BR /&gt;connected by VPN (advertised), Link-to-ISP1&lt;BR /&gt;C 10.56.86.0 255.255.254.0 is directly connected, Camera&lt;BR /&gt;L 10.56.86.1 255.255.255.255 is directly connected, Camera&lt;BR /&gt;S 10.58.0.0 255.255.0.0 [1/0] via 10.20.82.14, vti_10.20.82.13&lt;BR /&gt;C y.y.y.0 255.255.255.0 is directly connected, Link-to-ISP2&lt;BR /&gt;L y.y.y.y 255.255.255.255 is directly connected, Link-to-ISP2&lt;BR /&gt;V 192.168.70.6 255.255.255.255&lt;BR /&gt;connected by VPN (advertised), Link-to-ISP1&lt;BR /&gt;C x.x.x.y 255.255.255.240&lt;BR /&gt;is directly connected, Link-to-ISP1&lt;BR /&gt;L x.x.x.x 255.255.255.255&lt;BR /&gt;is directly connected, Link-to-ISP1&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 07:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052563#M1110497</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-03-29T07:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052678#M1110499</link>
      <description>&lt;P&gt;The neighbor command you have configured should be the VTI interface IP of the remote side, verify that this is correct on both ends.&lt;/P&gt;
&lt;P&gt;Is BGP flapping or just never being established?&lt;/P&gt;
&lt;P&gt;Are you using BGP authentication? if yes, have you verified that the passwords match on both sides?&lt;/P&gt;
&lt;P&gt;Are you redistributing connected and / or static?&amp;nbsp; If yes, remember to configure route maps to exclude the public IP (VTI source IP) from being learned over BGP as this will cause problems.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 09:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052678#M1110499</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-03-29T09:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052713#M1110503</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp; написал (-а):&lt;BR /&gt;&lt;P&gt;The neighbor command you have configured should be the VTI interface IP of the remote side, verify that this is correct on both ends.&lt;/P&gt;&lt;P&gt;Is BGP flapping or just never being established?&lt;/P&gt;&lt;P&gt;Are you using BGP authentication? if yes, have you verified that the passwords match on both sides?&lt;/P&gt;&lt;P&gt;Are you redistributing connected and / or static?&amp;nbsp; If yes, remember to configure route maps to exclude the public IP (VTI source IP) from being learned over BGP as this will cause problems.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I need BGP to failover VTI interfaces, to send traffic from secondary VTI if main VTI down. I configured BGP neighbours with WAN IP and it is never estabilished, i don't use&amp;nbsp;&lt;SPAN&gt;authentication&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 10:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052713#M1110503</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-03-29T10:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052718#M1110504</link>
      <description>&lt;P&gt;&lt;SPAN&gt;VTI IP need to use in bgp 10.20.82.14' 10.20.82.13'&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The WAN IP need to add as static for both ISP' i.e.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;WAN IP for VTI1 have it static route&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;WAN IP of VTI2 have it static route&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please I need to see&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Show run router&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;not show route&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 11:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052718#M1110504</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-29T11:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052723#M1110506</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; написал (-а):&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;LI-SPOILER&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;VTI IP need to use in bgp 10.20.82.14' 10.20.82.13'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The WAN IP need to add as static for both ISP' i.e.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WAN IP for VTI1 have it static route&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WAN IP of VTI2 have it static route&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please I need to see&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Show run router&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;not show route&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt; show running-config router&lt;BR /&gt;router bgp 4XXXXXXX8&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp router-id vrf auto-assign&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor a.a.a.a remote-as 4XXXXXXX9&lt;BR /&gt;neighbor a.a.a.a transport path-mtu-discovery disable&lt;BR /&gt;neighbor a.a.a.a activate&lt;BR /&gt;network 10.56.0.0 mask 255.255.0.0&lt;BR /&gt;no auto-summary&lt;BR /&gt;no synchronization&lt;BR /&gt;exit-address-family&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;SPAN&gt;The WAN IP need to add as static for both ISP' i.e.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WAN IP for VTI1 have it static route&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WAN IP of VTI2 have it static route&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you give example for this please i dont understand?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 11:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052723#M1110506</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-03-29T11:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052826#M1110518</link>
      <description>&lt;P&gt;You need to use the VTI interface IP in the neighbor command, not the WAN IP.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 14:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052826#M1110518</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-03-29T14:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052868#M1110523</link>
      <description>&lt;P&gt;this is topology and not you need for your requirement&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (253).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214227i2E0D88CEA0F99528/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (253).png" alt="Screenshot (253).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 16:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5052868#M1110523</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-29T16:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5055434#M1110602</link>
      <description>&lt;P&gt;Sorry for my stupid question but i cant understand why we need&amp;nbsp;static route toward WAN IP1 using interface WAN IP2&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 07:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5055434#M1110602</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-04-03T07:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5055436#M1110603</link>
      <description>&lt;P&gt;&lt;SPAN&gt;static route toward &lt;STRONG&gt;WAN IP1&lt;/STRONG&gt;&amp;nbsp;(&lt;STRONG&gt;FTD2)&lt;/STRONG&gt;&amp;nbsp;using interface &lt;STRONG&gt;WAN IP1 (FTD1)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;This what I meaning&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;MHM&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 07:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5055436#M1110603</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-03T07:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: BGP between two remote FTD</title>
      <link>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5055443#M1110604</link>
      <description>&lt;P&gt;Have you changed from using the WAN interface IP to the VTI IP in the BGP neighbor command?&lt;/P&gt;
&lt;P&gt;You would also need to preempt BGP AS on the backup VTI on both sides so that only one link (Primary link) is used.&amp;nbsp; if the primary link fails this configuration will now automatically failover to the secondary VTI.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 07:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bgp-between-two-remote-ftd/m-p/5055443#M1110604</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-03T07:54:04Z</dc:date>
    </item>
  </channel>
</rss>

