<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Replace Firepower 4110 with Firepower 3130 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550091#M1125136</link>
    <description>&lt;P&gt;I am going to replace my existing Firepower 4110 appliance running FTD 7.0.9 let call it with the &lt;BR /&gt;name fp4110, managed by the FMC running 7.4.7, with a new Firepower 3130 appliance, let call it &lt;BR /&gt;fp3130. All existing IP address(es) with the exception of the management IP address of the&lt;BR /&gt;appliance will remain the same on both the fp4110 and fp3130. The fp3110 will be running a newer&lt;BR /&gt;version 7.4.7. I have not worked with Cisco FTD in years, so I am thinking of doing this below:&lt;/P&gt;
&lt;P&gt;a- Rack fp3130 and connect all the cables but the switchport(s) on the switch(es) will be disabled,&lt;BR /&gt;b- Enable the management interface on the fp3130,&lt;BR /&gt;c- Connect the fp3130 to the FMC,&lt;BR /&gt;d- Configure interfaces on the fp3130 with the same IP address(es), and zone(s) as the fp4110, in the FMC,&lt;BR /&gt;f- Configure static routing on the fp3130 exactly the same as the fp4110,&lt;BR /&gt;g- Assign the same access policy of the fp4110 to the fp3130,&lt;BR /&gt;h- Assign the same NAT policy of the fp4110 to the fp3130,&lt;BR /&gt;i- Clone the same platform settings of the fp4110 to the fp3130,&lt;BR /&gt;j- Deploy the access policy, NAT, and platforms settings to both the fp4110 and fp3130,&lt;BR /&gt;k- Confirm both the fp4100 and fp3130 has the same access policy, NAT, and platform settings,&lt;BR /&gt;l- Disable switchport(s) on the switch, with the exception of the management interface, that are connected to the fp4110,&lt;BR /&gt;m- Enable switchport(s) on the switch that are connected to the fp3130,&lt;BR /&gt;n- Clear the arp table on the switch(es),&lt;BR /&gt;o- Validate all interfaces on the fp3130 are up and operational,&lt;BR /&gt;p- Start the validation,&lt;/P&gt;
&lt;P&gt;This will minimize the interruption because this is the Internet firewalls.&amp;nbsp; &amp;nbsp;Comments are welcome.&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;</description>
    <pubDate>Sun, 03 May 2026 23:12:05 GMT</pubDate>
    <dc:creator>adamscottmaster2013</dc:creator>
    <dc:date>2026-05-03T23:12:05Z</dc:date>
    <item>
      <title>Replace Firepower 4110 with Firepower 3130</title>
      <link>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550091#M1125136</link>
      <description>&lt;P&gt;I am going to replace my existing Firepower 4110 appliance running FTD 7.0.9 let call it with the &lt;BR /&gt;name fp4110, managed by the FMC running 7.4.7, with a new Firepower 3130 appliance, let call it &lt;BR /&gt;fp3130. All existing IP address(es) with the exception of the management IP address of the&lt;BR /&gt;appliance will remain the same on both the fp4110 and fp3130. The fp3110 will be running a newer&lt;BR /&gt;version 7.4.7. I have not worked with Cisco FTD in years, so I am thinking of doing this below:&lt;/P&gt;
&lt;P&gt;a- Rack fp3130 and connect all the cables but the switchport(s) on the switch(es) will be disabled,&lt;BR /&gt;b- Enable the management interface on the fp3130,&lt;BR /&gt;c- Connect the fp3130 to the FMC,&lt;BR /&gt;d- Configure interfaces on the fp3130 with the same IP address(es), and zone(s) as the fp4110, in the FMC,&lt;BR /&gt;f- Configure static routing on the fp3130 exactly the same as the fp4110,&lt;BR /&gt;g- Assign the same access policy of the fp4110 to the fp3130,&lt;BR /&gt;h- Assign the same NAT policy of the fp4110 to the fp3130,&lt;BR /&gt;i- Clone the same platform settings of the fp4110 to the fp3130,&lt;BR /&gt;j- Deploy the access policy, NAT, and platforms settings to both the fp4110 and fp3130,&lt;BR /&gt;k- Confirm both the fp4100 and fp3130 has the same access policy, NAT, and platform settings,&lt;BR /&gt;l- Disable switchport(s) on the switch, with the exception of the management interface, that are connected to the fp4110,&lt;BR /&gt;m- Enable switchport(s) on the switch that are connected to the fp3130,&lt;BR /&gt;n- Clear the arp table on the switch(es),&lt;BR /&gt;o- Validate all interfaces on the fp3130 are up and operational,&lt;BR /&gt;p- Start the validation,&lt;/P&gt;
&lt;P&gt;This will minimize the interruption because this is the Internet firewalls.&amp;nbsp; &amp;nbsp;Comments are welcome.&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Sun, 03 May 2026 23:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550091#M1125136</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2026-05-03T23:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Firepower 4110 with Firepower 3130</title>
      <link>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550142#M1125138</link>
      <description>&lt;P&gt;I think you got everything covered here. Just couple things come to mind, if you are using interfaces groups on the 4110 then I think you would need to assign the 3130 interfaces to those groups. The other thing is that if the current 4110 firewalls terminate any remote VPN connections then you might need to generate a new SSL cert and assign it to the 3130 outside interface as well as uploading the Secure Client packages to the 3130s. With regard to clearing the arp table on the switches, I don't think that is necessary as the new 3130s will announce their MAC addresses to the switches when they are inline.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 09:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550142#M1125138</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2026-05-04T09:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Firepower 4110 with Firepower 3130</title>
      <link>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550148#M1125140</link>
      <description>&lt;P&gt;Actually another thing came to mind is that if you have any RADIUS/TACACS servers that are used by the current 4110 firewalls then you might need to create new clients on those servers with the new management IPs of the 3130s. Also, if you have any monitoring tools that are currently pointing to the 4110 management IPs then those need to be updated to point to the new 3130s management IPs.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 09:15:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550148#M1125140</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2026-05-04T09:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Firepower 4110 with Firepower 3130</title>
      <link>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550171#M1125142</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt; - Thank you.&amp;nbsp; We do not use the FP4110 for either SSL or remote VPN connections.&amp;nbsp; We are also not using interfaces group.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 11:16:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550171#M1125142</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2026-05-04T11:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Firepower 4110 with Firepower 3130</title>
      <link>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550172#M1125143</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594" target="_blank"&gt;@Aref Alsouqi&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;- Thank you.&amp;nbsp; We're using neither Radius or TACACS+ servers on the current fp4110.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 11:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550172#M1125143</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2026-05-04T11:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Firepower 4110 with Firepower 3130</title>
      <link>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550187#M1125145</link>
      <description>&lt;P&gt;The much easier and recommended path would be to use the&amp;nbsp;Secure &lt;SPAN class="ph"&gt;Firewall Threat Defense&lt;/SPAN&gt; model migration wizard.&lt;/P&gt;
&lt;P&gt;Also, run version 7.6.5 on FMC and FTD 7.6.4 on the 3130 as those are the current suggested releases. I would upgrade the 4110 first to 7.2.11 so that it can be managed by FMC 7.6.5. (FMC 7.6.x can only manage back to version 7.1.x+)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/migration/threat-defense/b_secure-firewall-threat-defense-model-migration-761.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/migration/threat-defense/b_secure-firewall-threat-defense-model-migration-761.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 12:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-firepower-4110-with-firepower-3130/m-p/5550187#M1125145</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2026-05-04T12:22:00Z</dc:date>
    </item>
  </channel>
</rss>

