<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 2100 FTD or ASA mode? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946323#M5172</link>
    <description>Do I need to run FTD version same or lower than my FMC code? I am running 6.2.3 on my FMC and all my SFRs are also running 6.2.3 or 6.2.2&lt;BR /&gt;</description>
    <pubDate>Wed, 23 Oct 2019 13:23:12 GMT</pubDate>
    <dc:creator>Steven Williams</dc:creator>
    <dc:date>2019-10-23T13:23:12Z</dc:date>
    <item>
      <title>Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946301#M5170</link>
      <description>&lt;P&gt;I have just received my first set of FP2100s and I am reading some quick start guides and other Cisco documentation and I am trying to understand the FTD mode vs ASA mode and what limitations each has? Also what is the "common" method for deployment. These will be edge firewalls that strictly terminate SSL VPN endpoints and that is it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946301#M5170</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2020-02-21T17:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946316#M5171</link>
      <description>&lt;P&gt;If you purchased 2100, Suggest to Install FTD, since you&amp;nbsp; are not looking old ASA legacy feature and you looking only remote access vpn solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(personally and eventually Cisco will retire ASA code) - for longer support i go with FTD code.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is the good document FTD - remote access setup.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can also see VPN Limitation ASA vs FTD&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/fdm/fptd-fdm-config-guide-640/fptd-fdm-ravpn.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/640/fdm/fptd-fdm-config-guide-640/fptd-fdm-ravpn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Firepower 2100 Series hardware can run either &lt;SPAN class="ph"&gt;FTD&lt;/SPAN&gt; software or ASA software. Switching between FTD and ASA requires you to reimage the device&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 13:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946316#M5171</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-23T13:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946323#M5172</link>
      <description>Do I need to run FTD version same or lower than my FMC code? I am running 6.2.3 on my FMC and all my SFRs are also running 6.2.3 or 6.2.2&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Oct 2019 13:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946323#M5172</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-23T13:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946333#M5173</link>
      <description>&lt;P&gt;If you like a standard in the organization, (if i were you, i maintain all same version, so each to manage), until i go another version if the features not supporting?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 13:32:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946333#M5173</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-23T13:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946334#M5174</link>
      <description>I think it's more of a does the FMC at code 6.2.3 manage a FTD at a higher Code level. Some solutions need to have the management tool higher or same as devices it manages.</description>
      <pubDate>Wed, 23 Oct 2019 13:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946334#M5174</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-23T13:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946354#M5175</link>
      <description>&lt;P&gt;Best Practice, Management needs to be always a high version to manage the device, if the lower version, it can not manage higher version code device, since it was not understood well? make sense?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 13:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946354#M5175</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-23T13:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946363#M5176</link>
      <description>Yes so i should run 2100s at 6.2.3 or update my FMC.</description>
      <pubDate>Wed, 23 Oct 2019 14:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946363#M5176</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-23T14:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946372#M5177</link>
      <description>&lt;P&gt;Last i have worked FMC Stable one 6.4 , i have seen 6.5 released recently.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check the matrix before you upgrade and work with the version you are comfortable ( as long as the feature supports your needs)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 14:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946372#M5177</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-23T14:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946435#M5179</link>
      <description>&lt;P&gt;Correct. The FMC version is always higher than the managed device. The FMC will not let you register a device with a higher version than itself.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 15:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946435#M5179</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2019-10-23T15:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946498#M5181</link>
      <description>&lt;P&gt;I have have a pair of FP2110 devices running FTD v6.2.3.x in HA mode for over a year with no issues.&amp;nbsp; Recently upgraded to 6.4.0.4 and found static PAT to be unsupported (TAC case currently open).&amp;nbsp;&lt;/P&gt;&lt;P&gt;One point you may wish to consider is SSL HW acceleration which is only available on 2100 series from v6.3.&amp;nbsp; It may be worthwhile in your use case as SSL RAVPN headends.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the FMC has been upgraded to v6.4 for a while now and continues to manage v6.2.3.x FTD sensors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Simon&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 16:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946498#M5181</guid>
      <dc:creator>simong</dc:creator>
      <dc:date>2019-10-23T16:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946515#M5182</link>
      <description>Seems to be for SSL decryption as it pertains to HTTPS, I am just going to be terminating about 7,000 SSL Anyconnect Clients.</description>
      <pubDate>Wed, 23 Oct 2019 17:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946515#M5182</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-23T17:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2100 FTD or ASA mode?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946627#M5183</link>
      <description>&lt;P&gt;If you looking 7000+ active session, choose the right model - i have shared other document in the previous post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 19:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2100-ftd-or-asa-mode/m-p/3946627#M5183</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-23T19:54:05Z</dc:date>
    </item>
  </channel>
</rss>

