<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HA Pair on FTDv on subinterfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368230#M1124389</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1750984"&gt;@s_SiD_s&lt;/a&gt;&amp;nbsp;From technical point of view, as long as there is layer 2 connectivity between the two FTD's, the VLAN does not have to be dedicated. Practically speaking, to avoid potential VLAN noise from other hosts, always use a dedicated VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Also, ensure, if there's physical switches in the path, ensure to run RSTP and the ports connected to the FTD's are in STP EDGE mode, otherwise, any STP topology change for the VLAN will result in 30 seconds of communication downtime between FTD's. Obviously, to avoid split brain scenarios, ensure to use Standby IP's for all your layer 3 interfaces.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
    <pubDate>Fri, 06 Feb 2026 15:45:30 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2026-02-06T15:45:30Z</dc:date>
    <item>
      <title>HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367459#M1124356</link>
      <description>&lt;P&gt;Good day team!&lt;BR /&gt;We have 2 servers connected to each other with 2 patch-cords.&lt;BR /&gt;On vCenter admin configured 2 ports&lt;/P&gt;&lt;PRE&gt;Port14-VLAN-1111-1114
VLAN trunk range: 1111-1114
Virtual Machines (4) ----! 3 ASAv Primary and FTDV-1
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Port15-VLAN-1115-1118
VLAN trunk range: 1115-1118
Virtual Machines (4) ----! 3 ASAv- Secondary and FTDv-2&lt;/PRE&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp; ASAv failover works perfect as for example one of them&lt;/P&gt;&lt;PRE&gt;interface GigabitEthernet0/3.1111
 description LAN Failover Interface
 vlan 1111
!
interface GigabitEthernet0/4.1115
 description STATE Failover Interface
 vlan 1115
!
failover interface ip LFO 192.168.1.1 255.255.255.252 standby 192.168.1.2
failover interface ip SFO 192.168.1.5 255.255.255.252 standby 192.168.1.6&lt;/PRE&gt;&lt;P&gt;So I configured the same on both FTDv-s, but when I start to configure HA, these port not shown up in drop down...&lt;/P&gt;&lt;P&gt;more to say, I recieved an alarm that subinterfaces not recieving any packets, so i remove Logicalname from subs, and alarm goes away. But still cannot see neither interfaces no subinterfaces...&lt;BR /&gt;May be FTDv\FMC does not support this kind of config?&lt;BR /&gt;If this kind of config is supported, please help to sort it out, i will be appreciated a lot.&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;attached screenshots shows config&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 12:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367459#M1124356</guid>
      <dc:creator>s_SiD_s</dc:creator>
      <dc:date>2026-02-04T12:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367474#M1124357</link>
      <description>&lt;P&gt;I am not sure sub-interface supported for failover and state link, as per my experience and deployment : (if new version has changed no idea, but happy to hear from other engineers).&lt;/P&gt;
&lt;P&gt;Check the guidelines for the version. Here is the 7.4 code&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/consolidated_ftdv_gsg/threat-defense-virtual-74-gsg/m-ftdv-vmware-gsg.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/consolidated_ftdv_gsg/threat-defense-virtual-74-gsg/m-ftdv-vmware-gsg.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 13:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367474#M1124357</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2026-02-04T13:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367476#M1124358</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1750984"&gt;@s_SiD_s&lt;/a&gt;&amp;nbsp;as per the guides:-&lt;/P&gt;
&lt;H2 id="ariaid-title10" class="title topictitle5"&gt;&lt;STRONG&gt;Interface for the Failover Link&lt;/STRONG&gt;&lt;/H2&gt;
&lt;SECTION class="body conbody"&gt;
&lt;P class="p"&gt;You can use an unused data interface (physical, or EtherChannel) as the failover link; however, you cannot specify an interface that is currently configured with a name.&lt;STRONG&gt;&lt;SPAN class="ph"&gt; You also cannot use a subinterface&lt;/SPAN&gt;&lt;SPAN class="ph"&gt; with the exception of a subinterface defined on the chassis for multi-instance mode&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/high-availability.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/high-availability.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Wed, 04 Feb 2026 13:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367476#M1124358</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-02-04T13:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367478#M1124359</link>
      <description>&lt;P&gt;oh...I think I found the answer... 1 more patch-cord need to be placed between servers... no trunking supported&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/high-availability.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/high-availability.html&lt;/A&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Interface for the Failover Link
You can use an unused data interface (physical, or EtherChannel) as the failover link; however, you cannot specify an interface that is currently configured with a name. You also cannot use a subinterface with the exception of a subinterface defined on the chassis for multi-instance mode. The failover link interface is not configured as a normal networking interface; it exists for failover communication only. This interface can only be used for the failover link (and also for the state link).

The Firewall Threat Defense does not support sharing interfaces between user data and the failover link. You also cannot use separate subinterfaces on the same parent for the failover link and for data (multi-instance chassis subinterfaces only). If you use a chassis subinterface for the failover link, then all subinterfaces on that parent, and the parent itself, are restricted for use as failover links.&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 04 Feb 2026 13:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367478#M1124359</guid>
      <dc:creator>s_SiD_s</dc:creator>
      <dc:date>2026-02-04T13:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367479#M1124360</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;on the chassis -&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;means hardware device, not virtual?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 13:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367479#M1124360</guid>
      <dc:creator>s_SiD_s</dc:creator>
      <dc:date>2026-02-04T13:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367481#M1124361</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1750984"&gt;@s_SiD_s&lt;/a&gt;&amp;nbsp;yes, multi instance which it is referring to is only supported on 3100, 4100, 4200 and 9300 hardware.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 13:50:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367481#M1124361</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-02-04T13:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367486#M1124362</link>
      <description>&lt;P&gt;So, we need to go to DataCenter and install 2 more (or 1 will be enough) patch-cords between servers for FTDv-HA? &amp;gt;_&amp;lt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 14:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367486#M1124362</guid>
      <dc:creator>s_SiD_s</dc:creator>
      <dc:date>2026-02-04T14:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367494#M1124363</link>
      <description>&lt;P&gt;team! what about clustering? if subinterfaces not supported, can I make cluster?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 14:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367494#M1124363</guid>
      <dc:creator>s_SiD_s</dc:creator>
      <dc:date>2026-02-04T14:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367497#M1124364</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1750984"&gt;@s_SiD_s&lt;/a&gt;&amp;nbsp;clustering is supported on virtual FTD in private cloud using Vmware or KVM as per the cisco documents&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/device-ops-cluster-ftdv-private.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/device-ops-cluster-ftdv-private.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1770217278664.png" style="width: 642px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259032i00DE0C5715D70C9C/image-dimensions/642x161?v=v2" width="642" height="161" role="button" title="RobIngram_0-1770217278664.png" alt="RobIngram_0-1770217278664.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 15:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5367497#M1124364</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-02-04T15:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368210#M1124388</link>
      <description>&lt;P&gt;Thank you for link!&lt;BR /&gt;admin went to DC and connected another interfaces on servers to each other.&lt;BR /&gt;Another thing to consider...do we need to create a dummy vlan on vCenter that is not routing and assing it to intertfaces proposed for failover? Right now...there is VM Netwiork pointing nowhere....&lt;BR /&gt;so my HA not working in this case...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 15:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368210#M1124388</guid>
      <dc:creator>s_SiD_s</dc:creator>
      <dc:date>2026-02-06T15:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368230#M1124389</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1750984"&gt;@s_SiD_s&lt;/a&gt;&amp;nbsp;From technical point of view, as long as there is layer 2 connectivity between the two FTD's, the VLAN does not have to be dedicated. Practically speaking, to avoid potential VLAN noise from other hosts, always use a dedicated VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Also, ensure, if there's physical switches in the path, ensure to run RSTP and the ports connected to the FTD's are in STP EDGE mode, otherwise, any STP topology change for the VLAN will result in 30 seconds of communication downtime between FTD's. Obviously, to avoid split brain scenarios, ensure to use Standby IP's for all your layer 3 interfaces.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 15:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368230#M1124389</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2026-02-06T15:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368714#M1124411</link>
      <description>&lt;P&gt;I have done HA after ESXi admin created dummy vlan and assignet to intergface for LAN\STATE&lt;BR /&gt;HA raised smooth and nicely without any errors.&lt;BR /&gt;Now I am seeting up logging to Graloylog and noticed that there is mees up with time)&lt;BR /&gt;for example: admin setting show right time&lt;BR /&gt;logs on Graylog are not...&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;FMC shows right time&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 13:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368714#M1124411</guid>
      <dc:creator>s_SiD_s</dc:creator>
      <dc:date>2026-02-09T13:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: HA Pair on FTDv on subinterfaces</title>
      <link>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368811#M1124423</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1750984"&gt;@s_SiD_s&lt;/a&gt;&amp;nbsp;Not sure I exactly understand the problem. If you're speaking about the 3 hours difference, that because of timezone vs your logging configuration settings.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 19:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-pair-on-ftdv-on-subinterfaces/m-p/5368811#M1124423</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2026-02-09T19:07:48Z</dc:date>
    </item>
  </channel>
</rss>

