<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Same IP range for FTD Mgmt and data interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/same-ip-range-for-ftd-mgmt-and-data-interface/m-p/5256215#M1119299</link>
    <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;, the management ports should be configured on a separate subnet, and even better in a proper out-of-band network, but I also understand that sometimes we need to adapt to certain requirements. If you have to have the management interfaces of your FTDs in the same segment as one of the data interfaces then at the very least you should configure the "Secure Shell" restriction in the FMC platform settings applied to that FTD. This will at least restrict the SSH accesses to that firewall allowing only the defined IP addresses/subnet. If you are managing that firewall via FDM then you would need to do the same from the "Management Access" tab.&lt;/P&gt;</description>
    <pubDate>Mon, 03 Feb 2025 17:57:54 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2025-02-03T17:57:54Z</dc:date>
    <item>
      <title>Same IP range for FTD Mgmt and data interface</title>
      <link>https://community.cisco.com/t5/network-security/same-ip-range-for-ftd-mgmt-and-data-interface/m-p/5255944#M1119279</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Does anyone foresee any issues in configuring the same range of IP addresses on the management interface and one of the data interfaces?&lt;/P&gt;&lt;P&gt;We have a complex setup here, and we believe this could ease it up a bit.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Dodzi&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2025 04:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-ip-range-for-ftd-mgmt-and-data-interface/m-p/5255944#M1119279</guid>
      <dc:creator>Dodzi</dc:creator>
      <dc:date>2025-02-03T04:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Same IP range for FTD Mgmt and data interface</title>
      <link>https://community.cisco.com/t5/network-security/same-ip-range-for-ftd-mgmt-and-data-interface/m-p/5256022#M1119283</link>
      <description>&lt;P&gt;The management interface is typically used for administrative tasks and should ideally be isolated from user or data traffic for security reasons. Sharing an IP range with a data interface may expose the management interface to unintended risks unless strict access control policies are implemented. A very similar question has already asked here in this community &lt;A href="https://community.cisco.com/t5/network-security/management-vs-data-interface-for-ftd-management/td-p/5009523" target="_self"&gt;Here is the link&lt;/A&gt; and &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222145-configure-manager-access-on-ftd-from-man.html" target="_self"&gt;This one too&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Instead of using the same IP range, consider using a separate subnet for the management interface while leveraging a data interface for FMC communication if needed.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2025 09:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-ip-range-for-ftd-mgmt-and-data-interface/m-p/5256022#M1119283</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-02-03T09:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Same IP range for FTD Mgmt and data interface</title>
      <link>https://community.cisco.com/t5/network-security/same-ip-range-for-ftd-mgmt-and-data-interface/m-p/5256215#M1119299</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;, the management ports should be configured on a separate subnet, and even better in a proper out-of-band network, but I also understand that sometimes we need to adapt to certain requirements. If you have to have the management interfaces of your FTDs in the same segment as one of the data interfaces then at the very least you should configure the "Secure Shell" restriction in the FMC platform settings applied to that FTD. This will at least restrict the SSH accesses to that firewall allowing only the defined IP addresses/subnet. If you are managing that firewall via FDM then you would need to do the same from the "Management Access" tab.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2025 17:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-ip-range-for-ftd-mgmt-and-data-interface/m-p/5256215#M1119299</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-02-03T17:57:54Z</dc:date>
    </item>
  </channel>
</rss>

