<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO ISR 4000 with FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946297#M15287</link>
    <description>&lt;P&gt;If you put the FTD in front of the router then the FTD would need the WAN IP address, so therefore you would have to change the router configuration. Place the FTD behind the router, such as ISP &amp;lt;&amp;gt; Router &amp;lt;&amp;gt; FTD &amp;lt;&amp;gt; internal network. You'd need to configure NAT on the router to the FTD's outside interface, unless you had additional public IP address range. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively you could implement FTD in transparent mode, link &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Wed, 23 Oct 2019 13:06:06 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-10-23T13:06:06Z</dc:date>
    <item>
      <title>CISCO ISR 4000 with FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946258#M15284</link>
      <description>&lt;P&gt;Hello All.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have Cisco 4321 as NAT and GW device for my server. I need and IDS/IPS for security and i need some suggestion for this, can anyone help me please. I'm thinking about buying&amp;nbsp;ASA5516-FTD-K9 or buying&amp;nbsp;UCS E-Series Server Blade and run UTD on that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:37:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946258#M15284</guid>
      <dc:creator>dpsw120</dc:creator>
      <dc:date>2020-02-21T17:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISR 4000 with FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946269#M15285</link>
      <description>Hi,&lt;BR /&gt;I'd personally run the FTD on a dedicated appliance rather than a module on the router, so you would implement the FTD between the router and your network. Ideally you should look at the new Firepower 1000 series appliances, as the ASA hardware is older and probably EOL sooner rather than later. &lt;BR /&gt;&lt;BR /&gt;How much throughput are you going to put through the appliance? You would need to ensure the 5516-X or whatever hardware you purchase can cope with your requirements.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 23 Oct 2019 12:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946269#M15285</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-10-23T12:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISR 4000 with FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946288#M15286</link>
      <description>&lt;P&gt;I'd personally run the FTD on a dedicated appliance rather than a module on the router, so you would implement the FTD between the router and your network.&lt;BR /&gt;&lt;BR /&gt;Can i implement FTD before Router? I mean in the edge and router still have wan ip because that way i wouldn't have to change configuration on running Router.&amp;nbsp;&lt;SPAN&gt;And it already had nat forwarding to internet and dmpvn configured to office, it will be a mess if i should reconfigure my running Router.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Ideally you should look at the new Firepower 1000 series appliances, as the ASA hardware is older and probably EOL sooner rather than later.&lt;BR /&gt;&lt;BR /&gt;Firepower 1000 and 2000 is not ready product and it take long to deliver to my country.&lt;BR /&gt;&lt;BR /&gt;How much throughput are you going to put through the appliance? You would need to ensure the 5516-X or whatever hardware you purchase can cope with your requirements.&lt;BR /&gt;&lt;BR /&gt;I already check that and ASA5516-X comply with our throughput.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 12:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946288#M15286</guid>
      <dc:creator>dpsw120</dc:creator>
      <dc:date>2019-10-23T12:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISR 4000 with FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946297#M15287</link>
      <description>&lt;P&gt;If you put the FTD in front of the router then the FTD would need the WAN IP address, so therefore you would have to change the router configuration. Place the FTD behind the router, such as ISP &amp;lt;&amp;gt; Router &amp;lt;&amp;gt; FTD &amp;lt;&amp;gt; internal network. You'd need to configure NAT on the router to the FTD's outside interface, unless you had additional public IP address range. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively you could implement FTD in transparent mode, link &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 13:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946297#M15287</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-10-23T13:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISR 4000 with FTD</title>
      <link>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946327#M15288</link>
      <description>&lt;P&gt;If you put the FTD in front of the router then the FTD would need the WAN IP address, so therefore you would have to change the router configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- It would be a mess right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Place the FTD behind the router, such as ISP &amp;lt;&amp;gt; Router &amp;lt;&amp;gt; FTD &amp;lt;&amp;gt; internal network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Is it safe for a router running after ftd?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'd need to configure NAT on the router to the FTD's outside interface, unless you had additional public IP address range.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Yes i have additional public ip address range. this is my topology as right now, can you suggest me something.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Test.JPG" style="width: 489px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/47792i230908A3A45E76A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Test.JPG" alt="Test.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I forgot to add my router run dmvpn for drc and office&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 13:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-isr-4000-with-ftd/m-p/3946327#M15288</guid>
      <dc:creator>dpsw120</dc:creator>
      <dc:date>2019-10-23T13:37:59Z</dc:date>
    </item>
  </channel>
</rss>

