<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 1120 transparent mode interface best practises? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5275734#M1120302</link>
    <description>&lt;P&gt;Separated: 2 x 1 Gb/s port-channel for ISPs inside and another 2 x 1 Gb/s for outside, both with VLAN subinterfaces&lt;/P&gt;&lt;P&gt;This configuration provides the best balance of throughput and failover resiliencyHere's why:&lt;/P&gt;&lt;P&gt;Separate bridge groups for each ISP allow for isolated traffic flows and easier management of different IP ranges and routing.Using port-channels increases bandwidth and provides link redundancy.VLAN subinterfaces allow for logical separation of traffic within each port-channel, accommodating multiple ISPs and inside/outside interfaces.&lt;/P&gt;&lt;P&gt;regarding your specific setup with Nexus C9348GC switches using vPC.&lt;/P&gt;&lt;P&gt;Yes, a 4 x 1 Gb/s port-channel across two Nexus C9348GC switches with vPC will work as expected using VLAN trunking and separate VLANs for outside and inside. This configuration is supported and provides high availability and load balancing.Your example configuration for the Nexus switches is correct and follows best practice/s.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;interface Ethernet1/17
  description ftd-ips1 gi1
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  channel-group 17 mode active
  no shutdown
  
interface Ethernet1/18
  description ftd-zh-ips1 gi2
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  channel-group 17 mode active
  no shutdown

interface port-channel17
  description ftd-zh-ips1 
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  vpc 17&lt;/LI-CODE&gt;&lt;P&gt;The above configuration sets up a trunk port-channel with edge port and root guard features, which is appropriate/helpful for connecting to firewalls which you can take into account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Mar 2025 12:32:47 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2025-03-27T12:32:47Z</dc:date>
    <item>
      <title>Firepower 1120 transparent mode interface best practises?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5260117#M1119537</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a pair of Firepower 1120 running FTD in transparent mode and active/standby HA. They should do IPS and threat protection for internet links with two separate ISP connections and different IP ranges and routing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Separate bridge groups for each ISP.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd-transparent-2isp.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/239834iB019A7660A886B69/image-size/large?v=v2&amp;amp;px=999" role="button" title="ftd-transparent-2isp.jpg" alt="ftd-transparent-2isp.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Uplink switches are 2 x Nexus&amp;nbsp;C9348GC switches with vPC.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd-nexus-uplink.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/239835i895A0C9B64055D06/image-size/large?v=v2&amp;amp;px=999" role="button" title="ftd-nexus-uplink.jpg" alt="ftd-nexus-uplink.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;What's the best practise for interface assignments in such a setup for throughput and failover resiliency? The FTD admin guide is not very clear about this and the Youtube tutorials were all with virtual FTDs.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Combined: 4 x 1 Gb/s port-channel with VLAN subinterfaces for both ISPs inside and outside&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Separated: 2 x 1 Gb/s port-channel for ISPs inside and another 2 x 1 Gb/s for outside, both with VLAN subinterfaces&lt;/LI&gt;&lt;LI&gt;No port-channel and no VLAN subinterfaces at all, hardwired 1:1 connections&lt;/LI&gt;&lt;LI&gt;It doesn't matter&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Bernd&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 10:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5260117#M1119537</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-02-13T10:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1120 transparent mode interface best practises?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5275303#M1120291</link>
      <description>&lt;P&gt;Will a 4 x 1 Gb/s port-channel across two&lt;SPAN&gt;&amp;nbsp;Nexus&amp;nbsp;C9348GC switches with vPC work as expected using VLAN trunking and separate VLANs for outside and inside? Each Nexus switch as two ISP routers (active/standby) connected. All the tutorials I have found on the internet use simple configurations like one VLAN per physical interface. Or are there some undocumented easter eggs to be expected?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Example configuration:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;interface Ethernet1/17
  description ftd-ips1 gi1
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  channel-group 17 mode active
  no shutdown
  
interface Ethernet1/18
  description ftd-zh-ips1 gi2
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  channel-group 17 mode active
  no shutdown

interface port-channel17
  description ftd-zh-ips1 
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  vpc 17&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 12:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5275303#M1120291</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-03-26T12:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1120 transparent mode interface best practises?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5275734#M1120302</link>
      <description>&lt;P&gt;Separated: 2 x 1 Gb/s port-channel for ISPs inside and another 2 x 1 Gb/s for outside, both with VLAN subinterfaces&lt;/P&gt;&lt;P&gt;This configuration provides the best balance of throughput and failover resiliencyHere's why:&lt;/P&gt;&lt;P&gt;Separate bridge groups for each ISP allow for isolated traffic flows and easier management of different IP ranges and routing.Using port-channels increases bandwidth and provides link redundancy.VLAN subinterfaces allow for logical separation of traffic within each port-channel, accommodating multiple ISPs and inside/outside interfaces.&lt;/P&gt;&lt;P&gt;regarding your specific setup with Nexus C9348GC switches using vPC.&lt;/P&gt;&lt;P&gt;Yes, a 4 x 1 Gb/s port-channel across two Nexus C9348GC switches with vPC will work as expected using VLAN trunking and separate VLANs for outside and inside. This configuration is supported and provides high availability and load balancing.Your example configuration for the Nexus switches is correct and follows best practice/s.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;interface Ethernet1/17
  description ftd-ips1 gi1
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  channel-group 17 mode active
  no shutdown
  
interface Ethernet1/18
  description ftd-zh-ips1 gi2
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  channel-group 17 mode active
  no shutdown

interface port-channel17
  description ftd-zh-ips1 
  switchport mode trunk
  spanning-tree port type edge trunk
  spanning-tree guard root
  mtu 9216
  vpc 17&lt;/LI-CODE&gt;&lt;P&gt;The above configuration sets up a trunk port-channel with edge port and root guard features, which is appropriate/helpful for connecting to firewalls which you can take into account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 12:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5275734#M1120302</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-03-27T12:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1120 transparent mode interface best practises?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5275737#M1120303</link>
      <description>&lt;P&gt;The best practice for interface assignments in a Firepower 1120 FTD setup with multiple ISPs is to use separated port-channels 2 x 1 Gb/s for ISPs inside and another 2 x 1 Gb/s for outside, both with VLAN subinterfaces. This configuration optimizes throughput and failover resiliency by segregating traffic, enhancing security zone management, and providing better control over routing and security policies.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 12:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5275737#M1120303</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-03-27T12:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1120 transparent mode interface best practises?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5277760#M1120434</link>
      <description>&lt;P&gt;Hm. When I enable the bridge interfaces then BPDUGuard sets it to errDisable. Firepower1120 has a 4 x 1 Gb/s port-channel and four VLAN subinterfaces. Pone pair VLAN-in/VLAN-out for each bridge group and ISP network range.&lt;/P&gt;&lt;P&gt;Spanning-tree interface options on Nexus switch:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nexus-1(config-if)# spanning-tree ?
  bpdufilter     Don't send or receive BPDUs on this interface
  bpduguard      Don't accept BPDUs on this interface
  cost           Change an interface's spanning tree port path cost
  guard          Change an interface's spanning tree guard mode
  link-type      Specify a link type for spanning tree tree protocol use
  mst            Multiple spanning tree
  port           Spanning tree port options
  port-priority  Change an interface's spanning tree port priority
  vlan           VLAN Switch Spanning Trees&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;Disable guard root ???&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nexus-1(config-if)# spanning-tree guard ?
  loop  Set guard mode to loop guard on interface
  none  Set guard mode to none
  root  Set guard mode to root guard on interface&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;Use bpdufilter ???&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nexus-1(config-if)# spanning-tree bpdufilter
disable   enable&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;Disable bpduguard ???&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nexus-1(config-if)# spanning-tree bpduguard ?
  disable  Disable BPDU Guard for this interface
  enable   Enable BPDU Guard for this interface&lt;/LI-CODE&gt;&lt;P&gt;I'm a bit reluctant to play around with interface settings on production switch, although the transparent firewall is new and disconnected. Didn't find a best practises guide.&lt;/P&gt;&lt;P&gt;CheatGPT recommends to remove "spanning-tree guard root", but that's just a language model juggling words together that have thi highest probability and it has been so many times wrong in other situations and topics. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 07:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5277760#M1120434</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-04-03T07:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1120 transparent mode interface best practises?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5277788#M1120435</link>
      <description>&lt;P&gt;Interface configuration on Firepower.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firepower-interfaces.jpg" style="width: 949px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242829iC2B8AC7BCA1D0C1D/image-size/large?v=v2&amp;amp;px=999" role="button" title="firepower-interfaces.jpg" alt="firepower-interfaces.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Cheat GPT answers:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cheat-gpt-1.jpg" style="width: 767px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242830i73D065B2E108D2DE/image-size/large?v=v2&amp;amp;px=999" role="button" title="cheat-gpt-1.jpg" alt="cheat-gpt-1.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cheat-gpt-2.jpg" style="width: 751px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242831i90922B2E450E219A/image-size/large?v=v2&amp;amp;px=999" role="button" title="cheat-gpt-2.jpg" alt="cheat-gpt-2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 07:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1120-transparent-mode-interface-best-practises/m-p/5277788#M1120435</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-04-03T07:38:29Z</dc:date>
    </item>
  </channel>
</rss>

