<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2 FTD Interfaces in the same FMC security zone in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141528#M1114103</link>
    <description>&lt;P&gt;Yes, I have 6 FTDs where I have standardized the interface names and zones so that all my remote office firewall configurations can be streamlined.&amp;nbsp; So, for example, all my LAN interfaces are a member of INT-ZONE-A and all my Outside interfaces are a member of OUT-ZONE-A.&amp;nbsp; I have also done the same with VTIs.&amp;nbsp; I like doing things this way as it makes management&amp;nbsp; and setup of interface rules much easier and efficient.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jul 2024 16:14:17 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2024-07-08T16:14:17Z</dc:date>
    <item>
      <title>2 FTD Interfaces in the same FMC security zone</title>
      <link>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141469#M1114092</link>
      <description>&lt;P&gt;I have a FTD HA-Pair configured in FMC and it's inernal and external Interface is assigned to a Internal-Security Zone and an External-Security zone. So far so good. Now I added another FTD HA-pair (branch office) to the FMC and asking myself if it is possible to add its Interfaces to the same Security Zones, so that I don't need to add "duplicate" zones. Question is, can I add Interfaces from different HA-pairs to the same Security Zone or is it better to have every FTD-pair use it's own logic and Security Zones.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 14:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141469#M1114092</guid>
      <dc:creator>Rene Mueller</dc:creator>
      <dc:date>2024-07-08T14:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: 2 FTD Interfaces in the same FMC security zone</title>
      <link>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141474#M1114093</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/290603"&gt;@Rene Mueller&lt;/a&gt; yes you can configure the interfaces of another FTD with the same security zone.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 14:42:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141474#M1114093</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-07-08T14:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: 2 FTD Interfaces in the same FMC security zone</title>
      <link>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141503#M1114098</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 09:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141503#M1114098</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-10T09:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: 2 FTD Interfaces in the same FMC security zone</title>
      <link>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141528#M1114103</link>
      <description>&lt;P&gt;Yes, I have 6 FTDs where I have standardized the interface names and zones so that all my remote office firewall configurations can be streamlined.&amp;nbsp; So, for example, all my LAN interfaces are a member of INT-ZONE-A and all my Outside interfaces are a member of OUT-ZONE-A.&amp;nbsp; I have also done the same with VTIs.&amp;nbsp; I like doing things this way as it makes management&amp;nbsp; and setup of interface rules much easier and efficient.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 16:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-ftd-interfaces-in-the-same-fmc-security-zone/m-p/5141528#M1114103</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-07-08T16:14:17Z</dc:date>
    </item>
  </channel>
</rss>

