<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DR Firewall Config Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3752257#M8842</link>
    <description>So you are running FTD's and ASA's in the same traffic line?</description>
    <pubDate>Sun, 25 Nov 2018 00:07:14 GMT</pubDate>
    <dc:creator>Steven Williams</dc:creator>
    <dc:date>2018-11-25T00:07:14Z</dc:date>
    <item>
      <title>DR Firewall Config Help</title>
      <link>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3749556#M8841</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking for the best solution to this problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently we have our main site as ISP-ISR-Firepower-ASA-InternalNetwork, and DR is as ISP-ISR-ASA(to be replaced by firepower)-ASA-InternalNetwork. We replicate the configs for the two primary ASA over to the DR site as changes are made over a macsec point-to-point connection in our management vlan 100. We are using static routes across the board except for the egress of the ISR which has BGP. In order to prevent improper routing we have all the data interfaces disabled on the two (external and internal) DR firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our current DR plan is to call the DR site and tell them to start accept our BGP packets and then someone has to physically go into the DR and console into both DR ASA and enable the interfaces. Obviously this isn't the greatest solution. Here is a diagram for reference:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2018-11-19 15_41_07-Basic-P2P-Diagram.vsdx - Visio Professional.png" style="width: 716px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/24403i32CA9D890A00A1EC/image-size/large?v=v2&amp;amp;px=999" role="button" title="2018-11-19 15_41_07-Basic-P2P-Diagram.vsdx - Visio Professional.png" alt="2018-11-19 15_41_07-Basic-P2P-Diagram.vsdx - Visio Professional.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any solutions appreciated! (the firepowers are going to behave the same way, but they aren't at the DR yet. They connect to the management VM) I will provide any information as needed, thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3749556#M8841</guid>
      <dc:creator>cisnetadmin</dc:creator>
      <dc:date>2020-02-21T16:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: DR Firewall Config Help</title>
      <link>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3752257#M8842</link>
      <description>So you are running FTD's and ASA's in the same traffic line?</description>
      <pubDate>Sun, 25 Nov 2018 00:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3752257#M8842</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2018-11-25T00:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: DR Firewall Config Help</title>
      <link>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3752276#M8853</link>
      <description>&lt;P&gt;I would enable some sort of access from outside to the DR. It can be a VPN service on the ISR for example, from where you should be able to access all management ports on all needed devices. Going to the DC just to enable the interfaces is too extreme, imo.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Nov 2018 02:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3752276#M8853</guid>
      <dc:creator>Cezar Fistik</dc:creator>
      <dc:date>2018-11-25T02:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: DR Firewall Config Help</title>
      <link>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3752759#M8854</link>
      <description>&lt;P&gt;Yes, it will be FTD-&amp;gt;ASA in the DR as well.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 14:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3752759#M8854</guid>
      <dc:creator>cisnetadmin</dc:creator>
      <dc:date>2018-11-26T14:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: DR Firewall Config Help</title>
      <link>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3753109#M8855</link>
      <description>&lt;P&gt;ISP and ISP x 2, are these the same provider?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 21:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dr-firewall-config-help/m-p/3753109#M8855</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-11-26T21:55:13Z</dc:date>
    </item>
  </channel>
</rss>

