<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD 1120 multiple interfaces on single Security Zone in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5274599#M1120254</link>
    <description>&lt;P&gt;can you not create a seprate zone. as combine zone can fix the traffic and could lead of security risk plus its not good practice to combine the different interfaces in single zone.&lt;/P&gt;&lt;P&gt;Note: In my experience with FMC managed FTD deivces I have came across security zone issue where it complain about static rotue therefore be mindful of that.&lt;/P&gt;</description>
    <pubDate>Mon, 24 Mar 2025 15:47:13 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2025-03-24T15:47:13Z</dc:date>
    <item>
      <title>FTD 1120 multiple interfaces on single Security Zone</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5274592#M1120253</link>
      <description>&lt;P&gt;We are spinning up a new set of core switches and changing the internal IP Address scheme at the same time. I was wondering if it was possible to have multiple internal interfaces in a single security zone. The goal is to complete the new switch configuration and test connectivity to the outside world and our multiple VPN sites. I could not find any document that said I could or could not but the FDM will let me combine them.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 15:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5274592#M1120253</guid>
      <dc:creator>FLTRU16</dc:creator>
      <dc:date>2025-03-24T15:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1120 multiple interfaces on single Security Zone</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5274599#M1120254</link>
      <description>&lt;P&gt;can you not create a seprate zone. as combine zone can fix the traffic and could lead of security risk plus its not good practice to combine the different interfaces in single zone.&lt;/P&gt;&lt;P&gt;Note: In my experience with FMC managed FTD deivces I have came across security zone issue where it complain about static rotue therefore be mindful of that.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 15:47:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5274599#M1120254</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-03-24T15:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1120 multiple interfaces on single Security Zone</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5274654#M1120258</link>
      <description>&lt;P&gt;I could do that, just seams a little counter productive. I don't see an option to combine zones, could you expand on this? I previously came from the Silver Peak SD-WAN side so I am out of practice when it comes to Cisco.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 18:13:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5274654#M1120258</guid>
      <dc:creator>FLTRU16</dc:creator>
      <dc:date>2025-03-24T18:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1120 multiple interfaces on single Security Zone</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5275803#M1120306</link>
      <description>&lt;P&gt;I have created a second internal zone but there is no traffic. I only have Meraki Switches connected into the new internal zone interface and now my switches are showing offline. There is a route configured for any-ipv4 to outside. I'm not sure what I am missing from this config.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 14:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5275803#M1120306</guid>
      <dc:creator>FLTRU16</dc:creator>
      <dc:date>2025-03-27T14:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1120 multiple interfaces on single Security Zone</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5275894#M1120314</link>
      <description>&lt;P&gt;Here is a screenshot of what I am trying to accomplish. Port 1/2 and 1/3 both go to the inside network&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FLTRU16_0-1743105233849.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242481iD97F200CA284C6A7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="FLTRU16_0-1743105233849.png" alt="FLTRU16_0-1743105233849.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 19:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5275894#M1120314</guid>
      <dc:creator>FLTRU16</dc:creator>
      <dc:date>2025-03-27T19:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1120 multiple interfaces on single Security Zone</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5276222#M1120325</link>
      <description>&lt;P&gt;Found the solution. You can bridge multiple physical port to the inside-zone.&lt;/P&gt;&lt;P class=""&gt;Configure the Bridge Group:&lt;BR /&gt;Step 1: Navigate to the FTD device configuration interface.&lt;BR /&gt;Step 2: Go to the Network section and select Interfaces.&lt;BR /&gt;Step 3: Click on Bridge Groups and create a new bridge group if one does not already exist.&lt;BR /&gt;Step 4: Add the two ports you want to include in the bridge group. Ensure that each member interface meets the following requirements:&lt;BR /&gt;The interface must have a name.&lt;BR /&gt;The interface cannot have any IPv4 or IPv6 addresses defined for it, either static or served through DHCP.&lt;BR /&gt;Step 5: Configure the bridge group interface (BVI) with an IP address for the inside network. For example, you can set the BVI1 inside network to 192.168.1.1/24.&lt;BR /&gt;Assign the Bridge Group to the Inside Network:&lt;BR /&gt;Step 6: Ensure that the bridge group interface (BVI) is assigned to the inside security zone.&lt;BR /&gt;Step 7: Configure any necessary security policies and access control lists (ACLs) to allow traffic between the inside network and other networks.&lt;BR /&gt;Verify the Configuration:&lt;BR /&gt;Step 8: Verify that the bridge group is correctly configured by checking the interface status and ensuring that devices connected to the two ports can communicate with each other and with the outside network.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 19:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1120-multiple-interfaces-on-single-security-zone/m-p/5276222#M1120325</guid>
      <dc:creator>FLTRU16</dc:creator>
      <dc:date>2025-03-28T19:31:26Z</dc:date>
    </item>
  </channel>
</rss>

