<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Url and application filtering on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5303063#M1121486</link>
    <description>&lt;P&gt;I don't think it will because from the MX perspective it wouldn't be aware of the two ISP links nor their status, the MX would only have a point-to-point link to the active FTD. Why not to move the MXs to the edge and place the FTDs behind them?&lt;/P&gt;</description>
    <pubDate>Thu, 26 Jun 2025 15:21:19 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2025-06-26T15:21:19Z</dc:date>
    <item>
      <title>Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301610#M1121397</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Wants to deployed MX105 at core level and FTD at perimeter level in our network. However i have procure utm licenses for MX appliances, not for FTD.&lt;/P&gt;
&lt;P&gt;1. Can i achieve the url filtering at FTD after it gets filter from MX.&lt;/P&gt;
&lt;P&gt;2. Wants to achieve load balancing using Meraki MX (using as a core FW) where FTD will be perimeter.&lt;/P&gt;
&lt;P&gt;Attached diagram for reference.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Vishal6_0-1750680431797.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/246862iC8FA5ABC06A594A0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Vishal6_0-1750680431797.png" alt="Vishal6_0-1750680431797.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 12:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301610#M1121397</guid>
      <dc:creator>Vishal6</dc:creator>
      <dc:date>2025-06-23T12:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301619#M1121398</link>
      <description>&lt;P&gt;It ok to use ftd url filter after other fw (except it will little slow your traffic if first fw also use url filter)&lt;/P&gt;
&lt;P&gt;For other Q can you more elaborate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 12:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301619#M1121398</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-23T12:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301620#M1121399</link>
      <description>&lt;P&gt;One more query,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As we are not directly connecting Mx to Internet, how warm spare works here ?.&lt;/P&gt;
&lt;P&gt;Would MX capture both isp ip address via FTD&lt;/P&gt;
&lt;P&gt;Will using single private uplink&amp;nbsp; ip address (Link between FTD and MX) able to form warmspare ?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 12:33:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301620#M1121399</guid>
      <dc:creator>Vishal6</dc:creator>
      <dc:date>2025-06-23T12:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301729#M1121410</link>
      <description>&lt;P&gt;Yes it should work, because from the MXs perspective they just need to be connected to Meraki dashboard, it doesn't really matter if they are connected directly to the internet or via another device as in your case. When the primary MX doesn't reach the Meraki dashboard anymore it will be assumed that is down and the secondary MX will become the primary. In your shared diagram there are no links between the switches, I'm assuming the switches will be connected to each other and both firewalls will be connected to each switch. That will provide you full resiliency. Regarding using URL filtering on the MX, as already mentioned, that shouldn't be an issue, you can turn on whichever security features on the MX and do part of the security inspections on them and leave the rest for the FTDs based on the licenses installed.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 16:21:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5301729#M1121410</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-06-23T16:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302237#M1121442</link>
      <description>&lt;P&gt;What if FTD don't have any threat, malware and url filtering license? Still it will process the traffic coming via Mx&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 06:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302237#M1121442</guid>
      <dc:creator>Vishal6</dc:creator>
      <dc:date>2025-06-25T06:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302240#M1121443</link>
      <description>&lt;P&gt;What about sdwan features on MX ?. Will it do load balancing as public IP link directly terminated on FTD and it (FTD) mostly use usp link for redundancy&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 06:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302240#M1121443</guid>
      <dc:creator>Vishal6</dc:creator>
      <dc:date>2025-06-25T06:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302425#M1121458</link>
      <description>&lt;P&gt;I don't think that will work because even if connect each MX to both firewalls, one of the firewalls will be passive, so the MX will have no chance to load balance the traffic accross the two firewalls.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 13:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302425#M1121458</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-06-25T13:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302426#M1121459</link>
      <description>&lt;P&gt;Can't see why not. Traffic routing will still work as normal, and the FTD will process that traffic just fine. The only thing is that the FTD in that case won't be doing any security inspection apart from the normal access lists checks.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 13:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302426#M1121459</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-06-25T13:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302540#M1121464</link>
      <description>&lt;P&gt;Here 2 isp link will be terminated to both FTD, but primary FTD will use one isp at a time still it goes down. Can mx provide sdwan features here ?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 17:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5302540#M1121464</guid>
      <dc:creator>Vishal6</dc:creator>
      <dc:date>2025-06-25T17:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5303063#M1121486</link>
      <description>&lt;P&gt;I don't think it will because from the MX perspective it wouldn't be aware of the two ISP links nor their status, the MX would only have a point-to-point link to the active FTD. Why not to move the MXs to the edge and place the FTDs behind them?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2025 15:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5303063#M1121486</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-06-26T15:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304107#M1121544</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;
&lt;P&gt;Can i configure Warmspare between my Mx as per attached architecture in my very first post.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 17:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304107#M1121544</guid>
      <dc:creator>Vishal6</dc:creator>
      <dc:date>2025-06-30T17:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304294#M1121546</link>
      <description>&lt;P&gt;Hi Vishal. I can't see why not. However, you need to make sure that both MXs are able to receive the VRRP heartbeats sent by each other. In the diagram you shared there is no link between the two switches, if that will stay as is, then you need to connect each MX to both switches, or you need to connect the two switches together. Actually, best practice to provide full reseliency would be to connect each MX to each switch and connect both switches together or having them stacked.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 09:05:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304294#M1121546</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-01T09:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304342#M1121548</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;As per meraki documentation, for warmspare we need individual ip for each meraki mx uplink ip. In my case both meraki mx would have same ip as it directly connected to Ftd (working as active passive setup). PFB link&lt;/P&gt;
&lt;P&gt;&lt;A href="https://documentation.meraki.com/MX/Deployment_Guides/MX_Warm_Spare_-_High_Availability_Pair" target="_blank"&gt;https://documentation.meraki.com/MX/Deployment_Guides/MX_Warm_Spare_-_High_Availability_Pair&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regarding switch, yes it will have interconnected links.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 12:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304342#M1121548</guid>
      <dc:creator>Vishal6</dc:creator>
      <dc:date>2025-07-01T12:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Url and application filtering on FTD</title>
      <link>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304445#M1121559</link>
      <description>&lt;P&gt;To which section in the document are you referring to? wouldn't each of the MXs in your case have its own IP for the connection with the active FTD?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 15:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/url-and-application-filtering-on-ftd/m-p/5304445#M1121559</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-01T15:24:38Z</dc:date>
    </item>
  </channel>
</rss>

