<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304366#M1121550</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I may not have explained myself well and this may have caused some confusion. In the solution we intend to implement, we will have two internet links with the ISP, one main (always active) and another secondary (as a backup in case the main one fails). Since we have a public IP range, we will implement dynamic routing (BGP) to announce the public IP range we have to the ISP and receive the DefaultRoute. As for the use of our public IP range, an IP will be used, and it will always be the same, to terminate the IPSec L2L and SSLVPN remote access tunnels and the remaining IP addressing for NAT.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Tue, 01 Jul 2025 13:24:47 GMT</pubDate>
    <dc:creator>lmgomes</dc:creator>
    <dc:date>2025-07-01T13:24:47Z</dc:date>
    <item>
      <title>Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304015#M1121529</link>
      <description>&lt;P&gt;&lt;FONT size="2"&gt;Dear Team,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;We have an FTD cluster in HA (a/p) managed by an FMC (all on version 7.4.2) and we are redesigning the architecture of the current solution. The new solution is intended to have two internet links (primary/secondary) with dynamic routing (BGP), with the ISP announcing the default route and the FTDs announcing a public network (a diagram is attached). From the aforementioned public network, one IP address will be used for the IPSec L2L and SSL VPN remote access tunnels and the rest for NAT.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Is the use of a Loopback interface supported to terminate IPSec L2L and SSLVPN remote access tunnels?&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;What would be the best approach/configuration to make this solution work?&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Thank you&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 13:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304015#M1121529</guid>
      <dc:creator>lmgomes</dc:creator>
      <dc:date>2025-06-30T13:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304021#M1121532</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1892893"&gt;@lmgomes&lt;/a&gt;&amp;nbsp;you can use the loopback interface for L2L IPSec VPN.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/770/management-center-device-config-77/vpn-s2s.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/770/management-center-device-config-77/vpn-s2s.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;"Choose the tunnel source interface from the &lt;SPAN class="ph uicontrol"&gt;Tunnel Source&lt;/SPAN&gt; drop-down list.&lt;/P&gt;
&lt;SECTION class="itemgroup info"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph"&gt;The VPN tunnel terminates at this interface, a physical or &lt;STRONG&gt;loopback interface&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;/SECTION&gt;
&lt;P&gt;Guide&lt;/P&gt;
&lt;P&gt;&lt;A href="https://secure.cisco.com/secure-firewall/v7.3/docs/loopback-interface" target="_blank"&gt;https://secure.cisco.com/secure-firewall/v7.3/docs/loopback-interface&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://secure.cisco.com/secure-firewall/v7.3/docs/dynamic-virtual-template-interface-dvti" target="_blank"&gt;https://secure.cisco.com/secure-firewall/v7.3/docs/dynamic-virtual-template-interface-dvti&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Although I don't believe you can use a loopback for Remote Access VPN, you'd have to terminate on the outside interface.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 13:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304021#M1121532</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-06-30T13:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304057#M1121539</link>
      <description>&lt;P&gt;Let start&lt;/P&gt;
&lt;P&gt;1- ssl vpn it hard to make one isp for it and other for NAT since in end the ssl vpn access from internet and use randomly public IP so yoh can not' you need to use one ISP for both ssl vpn and NAT&lt;/P&gt;
&lt;P&gt;2- l2l VPN you can different ISP' ehat you need to use two static route&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A- static route for remote peer IP of VPN&lt;/P&gt;
&lt;P&gt;B- static route for remote VPN subnet (remote protect subnet)&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 15:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304057#M1121539</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-30T15:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304359#M1121549</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your reply. Indeed, the loopback interface is a solution for IPSec L2L.&lt;/P&gt;
&lt;P&gt;For SSL VPN remote access, and since we will have two internet links and it is a requirement to use one of the IPs from the public range, I have to find another solution.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304359#M1121549</guid>
      <dc:creator>lmgomes</dc:creator>
      <dc:date>2025-07-01T13:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304366#M1121550</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I may not have explained myself well and this may have caused some confusion. In the solution we intend to implement, we will have two internet links with the ISP, one main (always active) and another secondary (as a backup in case the main one fails). Since we have a public IP range, we will implement dynamic routing (BGP) to announce the public IP range we have to the ISP and receive the DefaultRoute. As for the use of our public IP range, an IP will be used, and it will always be the same, to terminate the IPSec L2L and SSLVPN remote access tunnels and the remaining IP addressing for NAT.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304366#M1121550</guid>
      <dc:creator>lmgomes</dc:creator>
      <dc:date>2025-07-01T13:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304368#M1121551</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1892893"&gt;@lmgomes&lt;/a&gt;&amp;nbsp;we do you need to use one of the IPs from the public range using a loopback? You can still connect to the physical IP address of the FTD, with failover to the other. Or you could use a cloud load balancer to load balance the connections to either FTD outside interface.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304368#M1121551</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-01T13:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304370#M1121552</link>
      <description>&lt;P&gt;If you use FQDN for the RA VPN and your DNS provider allows configuring a primary and a secondary public IPs for the FQDN resolution and monitor their status, then you could go with that solution. Basically what will happen is that when the remote clients try to connect to your VPN they will use the FQDN, and if the primary ISP link is down your DNS provider will remove that IP from the list, so the DNS resolution will fallback to the secondary ISP public IP. Alternatively, you could rely on Secure Client profile where you configure the primary and the backup servers.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304370#M1121552</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-01T13:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD HA Pair + FMC - Two ISP links with BGP - Architecture</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304379#M1121554</link>
      <description>&lt;P&gt;You run cluster not primary/backup HA FTD ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-ha-pair-fmc-two-isp-links-with-bgp-architecture/m-p/5304379#M1121554</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-01T13:48:51Z</dc:date>
    </item>
  </channel>
</rss>

