<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It's a bit new in the product in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005212#M146479</link>
    <description>&lt;P&gt;It's a bit new in the product cycle to say there's a "best practice".&lt;/P&gt;
&lt;P&gt;Generally I've seen zones used as a container for multiple interfaces of the same security level that it would make sense to use one zone-based policy for multiple interfaces vs. the traditional one interface = one nameif = one ACL / set of NAT rules.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Feb 2017 02:37:09 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-02-23T02:37:09Z</dc:date>
    <item>
      <title>Cisco 4110 FTD AND ASA setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005208#M146475</link>
      <description>&lt;P&gt;Hello All,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm new to Cisco 4110. We are planning to migrate &amp;nbsp;FWSM to 4110 with Firepower on it. My question is do have to install ASA and FTD both in the same 4110box? or FTD itself can handle all the FWSM config (object groups, ACLs,NAT .. etc ) and the firepower as well?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Anthonize&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:56:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005208#M146475</guid>
      <dc:creator>Anthonize Rajaratne</dc:creator>
      <dc:date>2019-03-12T08:56:21Z</dc:date>
    </item>
    <item>
      <title>You install one or the other</title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005209#M146476</link>
      <description>&lt;P&gt;You install one or the other but not both images on a 4110.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASA image will have 100% support of the firewall features.&lt;/P&gt;
&lt;P&gt;FTD will not. Especially if you have multiple contexts.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2017 16:32:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005209#M146476</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-02-15T16:32:00Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin,that's what I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005210#M146477</link>
      <description>&lt;P&gt;Thanks Marvin,that's what I thought too.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2017 20:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005210#M146477</guid>
      <dc:creator>Anthonize Rajaratne</dc:creator>
      <dc:date>2017-02-15T20:27:07Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin, </title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005211#M146478</link>
      <description>&lt;P&gt;Hello Marvin,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What is the best practice(s) when you configuring zones? is it based on the environment functions (data,wireless,video,,etc) or is it based on Interface like ASA?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried look for a good documentation on this but, couldn't find any.&lt;/P&gt;
&lt;P&gt;Thanks in advance. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 01:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005211#M146478</guid>
      <dc:creator>Anthonize Rajaratne</dc:creator>
      <dc:date>2017-02-23T01:24:21Z</dc:date>
    </item>
    <item>
      <title>It's a bit new in the product</title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005212#M146479</link>
      <description>&lt;P&gt;It's a bit new in the product cycle to say there's a "best practice".&lt;/P&gt;
&lt;P&gt;Generally I've seen zones used as a container for multiple interfaces of the same security level that it would make sense to use one zone-based policy for multiple interfaces vs. the traditional one interface = one nameif = one ACL / set of NAT rules.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 02:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005212#M146479</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-02-23T02:37:09Z</dc:date>
    </item>
    <item>
      <title>in my deployment I have used</title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005213#M146480</link>
      <description>&lt;P&gt;in my deployment I have used same name for interface and their associated security zone, of-course I have just one interface in the same security zone.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't see any issue in this approach , rather it is helpful further to configure a new security policies i.e. by seeing the security zone name we can find out this is assigned to which interface&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 07:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3005213#M146480</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-06-20T07:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: in my deployment I have used</title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3321613#M146481</link>
      <description>&lt;P&gt;I have a need to use context in FTD and I'm thinking of using an &lt;STRONG&gt;ASA appliance&lt;/STRONG&gt; + &lt;STRONG&gt;FTD appliance&lt;/STRONG&gt; to meet my demand. Has anyone seen it work?&lt;/P&gt;
&lt;P&gt;I can not use only the ASA because I need an NGFW.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 13:27:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3321613#M146481</guid>
      <dc:creator>FFALVES</dc:creator>
      <dc:date>2018-01-30T13:27:20Z</dc:date>
    </item>
    <item>
      <title>Re: in my deployment I have used</title>
      <link>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3321639#M146482</link>
      <description>&lt;P&gt;Yes - the current recommendation from Cisco for when you absolutely need multiple contexts is to put an ASA multiple context firewall in series with an FTD appliance.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 13:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-4110-ftd-and-asa-setup/m-p/3321639#M146482</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-01-30T13:57:10Z</dc:date>
    </item>
  </channel>
</rss>

