<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deploying NGIPS 4110 as IPS-ONLY in HA ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4013978#M921594</link>
    <description>&lt;P&gt;Hi , As my understanding it will support in both routed and Transparent mode ?&lt;/P&gt;&lt;P&gt;What will be the benefits using Routed mode ? or which one should i choose ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using&amp;nbsp; this appliance only for IPS and will configure HA between the devices ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#ngips&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/139532"&gt;@sandeepcciesec&lt;/a&gt;&amp;nbsp; #NGIPS4110&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:50:40 GMT</pubDate>
    <dc:creator>JALALUDDEEN A A</dc:creator>
    <dc:date>2020-02-21T17:50:40Z</dc:date>
    <item>
      <title>Deploying NGIPS 4110 as IPS-ONLY in HA ?</title>
      <link>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4013978#M921594</link>
      <description>&lt;P&gt;Hi , As my understanding it will support in both routed and Transparent mode ?&lt;/P&gt;&lt;P&gt;What will be the benefits using Routed mode ? or which one should i choose ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using&amp;nbsp; this appliance only for IPS and will configure HA between the devices ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#ngips&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/139532"&gt;@sandeepcciesec&lt;/a&gt;&amp;nbsp; #NGIPS4110&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4013978#M921594</guid>
      <dc:creator>JALALUDDEEN A A</dc:creator>
      <dc:date>2020-02-21T17:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying NGIPS 4110 as IPS-ONLY in HA ?</title>
      <link>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014000#M921595</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The firewall mode only affects regular firewall interfaces, and not IPS-only mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For IPS only deployment design most probably you are deploying firewall&amp;nbsp;like a “bump in the wire” . In that case as a best practice i recommend for Transparent mode. As my understanding for IPS only mode there is no addition benefit if you configure in Routed mode.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In both mode you will get&amp;nbsp;Partial LINA-engine and full Snort-engine checks. Please go through the cisco doc for FTD deployments modes &amp;amp; Interface types.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html#ID-2106-00000008" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html#ID-2106-00000008&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepower-threat-defense-int.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepower-threat-defense-int.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hope This Helps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 19:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014000#M921595</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2020-01-18T19:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying NGIPS 4110 as IPS-ONLY in HA ?</title>
      <link>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014007#M921596</link>
      <description>&lt;P&gt;Hi Abheesh Kumar,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we can configure Active Passive HA&amp;nbsp; in Transparent mode right ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We might have needed 4 inline Pair to inspect different networks.(Include DMZ , Inside,DC traffic )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we have 3 inline pair with Bypass mode and 1 inline pair without bypass (Fail-to-wire) in a same NGIPS 4110.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because we have only 6-port Bypass (Fail-to-wire) in Devices&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 19:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014007#M921596</guid>
      <dc:creator>JALALUDDEEN A A</dc:creator>
      <dc:date>2020-01-18T19:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying NGIPS 4110 as IPS-ONLY in HA ?</title>
      <link>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014074#M921597</link>
      <description>&lt;P&gt;You can configure a Firepower 4110 with FTD logical device in transparent mode and High Availability (HA) pair.&lt;/P&gt;
&lt;P&gt;If you use two network modules, one can be &lt;SPAN&gt;FPR4K-NM-8X1G-F or&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;FPR9K-NM-6X10SR-F or&amp;nbsp;FPR9K-NM-6X10LR-F (&lt;/SPAN&gt;fail-to-wire / hardware bypass) and the other one can be&amp;nbsp;&lt;SPAN&gt;FPR4K-NM-8X10G (or use the built-in 1 Gbps copper ports).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;See the configuration guide for more details on inline sets and hardware bypass module operations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/inline_sets_and_passive_interfaces_for_firepower_threat_defense.html#id_19616" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/inline_sets_and_passive_interfaces_for_firepower_threat_defense.html#id_19616&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/inline_sets_and_passive_interfaces_for_firepower_threat_defense.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/inline_sets_and_passive_interfaces_for_firepower_threat_defense.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2020 03:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014074#M921597</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-01-19T03:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying NGIPS 4110 as IPS-ONLY in HA ?</title>
      <link>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014413#M921598</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the&amp;nbsp; response,&lt;/P&gt;&lt;P&gt;can&amp;nbsp; we use&amp;nbsp; both&amp;nbsp;&lt;SPAN&gt;FPR4K-NM-8X1G-F &amp;amp;&amp;nbsp;FPR9K-NM-6X10SR-F module inorder to get total 7(4+3) Pair inline set (Fail to fire right ) and built in 8*10 G for Management and HA connection ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;One more clarification :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If one of the interface is down in Fail-to-wire - Will ngips trigger HA and traffic will go through second NGIPS right ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If&amp;nbsp; one NGIPS is completely&amp;nbsp;down , traffic is still pass through NGIPS with Fail-to-wire with uninspected right ? or will it trigger HA and second NGIPS should take over ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;can you please clarify the HA and fail-to-wire scenario&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 07:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014413#M921598</guid>
      <dc:creator>JALALUDDEEN A A</dc:creator>
      <dc:date>2020-01-20T07:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying NGIPS 4110 as IPS-ONLY in HA ?</title>
      <link>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014576#M921599</link>
      <description>&lt;P&gt;Yes in theory you can use two FTW Netmods as you described and also have the built-in non-FTW interfaces available. It would be a very expensive build though since those netmods are quite expensive. In practice you would probably be oversubscribing the appliance's throughput capability if you have a significant amount of traffic flowing through those multiple interfaces.&lt;/P&gt;
&lt;P&gt;If you have an HA pair or cluster failure of an interface will generally trigger failover to the unit without a failed interface (unless you've excluded the interface from monitoring in the HA setup or done something like set a threshold for the number of interface that must go down before triggering failover).&lt;/P&gt;
&lt;P&gt;If you had only a single appliance with FTW net mods, failure of the device (including complete power failure) will allow traffic to continue to pass through the FTW interface pairs.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 12:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-ngips-4110-as-ips-only-in-ha/m-p/4014576#M921599</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-01-20T12:00:26Z</dc:date>
    </item>
  </channel>
</rss>

