<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/3959212#M922813</link>
    <description>&lt;P&gt;Appliance mode is brand new and more likely to have bugs in the initial release. Personally I'd steer clear of it outside the lab for now.&lt;/P&gt;
&lt;P&gt;You noted the obvious differentiators already. If those are important to our operational environment then test it in the lab and consider adopting sooner rather than later. Otherwise sit back with the existing model and let others blaze the trail ahead of you.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Nov 2019 10:19:45 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-11-15T10:19:45Z</dc:date>
    <item>
      <title>ASA Deployment 2100 Deployment use cases for Appliance vs Platform mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/3958336#M922812</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&amp;nbsp;I've got a pair of&amp;nbsp;FPR-2120 (new to me) sitting on my workbench and started to tinker with FXOS as ASA Deployment&amp;nbsp; before opening up the documentation to&amp;nbsp;formally learn more about it&lt;SPAN&gt;.... (I've been working with the 55xx for a while)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;As a result of the documentation&amp;nbsp;I've come to learn a few new &lt;STRONG&gt;definitions&lt;/STRONG&gt; in version 9.13.....&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp2100/firepower-2100-gsg/asa-appliance.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp2100/firepower-2100-gsg/asa-appliance.html&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;To paraphrase you can now run the units in 2 modes as of&amp;nbsp;9.13!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Platform mode&lt;/STRONG&gt; -&amp;nbsp;gives you the full&amp;nbsp;functionality of FXOS (as version prior).&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Appliance mode(new)&lt;/STRONG&gt; -&amp;nbsp;remove the complexities of&amp;nbsp;initial FXOS setup , and is more like 55xx ASA SW but can access FXOS if needed.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;The documentation doesn't really provide any &lt;STRONG&gt;use-cases for one VS the other&amp;nbsp;&lt;/STRONG&gt;(nor dose CLI books),&amp;nbsp;and was wondering&amp;nbsp;what the community thinks to&amp;nbsp;choose one over the another.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as I've not used this version HW or SW before,so I'm not aware of any&amp;nbsp;particular software limitations/gotcha learn from experience in&amp;nbsp;deploying these..... at the moment, I see in the doc there not support in for&amp;nbsp;&lt;SPAN&gt;Backup&amp;nbsp;nor AAA in Platform mode,......Ouch&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think my &lt;STRONG&gt;use&lt;/STRONG&gt; could go either way as it's for a remote office via internet over IPSEC VPN(managed remotely). where the FXOS&amp;nbsp;management network could sit&amp;nbsp;behind the ASA inside interface off a switch SVI .(effectively routed via ASA to the SVI to reach that network.).&amp;nbsp;&amp;nbsp;at the moment.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for considering my request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/3958336#M922812</guid>
      <dc:creator>NetworkTinker</dc:creator>
      <dc:date>2020-02-21T17:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/3959212#M922813</link>
      <description>&lt;P&gt;Appliance mode is brand new and more likely to have bugs in the initial release. Personally I'd steer clear of it outside the lab for now.&lt;/P&gt;
&lt;P&gt;You noted the obvious differentiators already. If those are important to our operational environment then test it in the lab and consider adopting sooner rather than later. Otherwise sit back with the existing model and let others blaze the trail ahead of you.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 10:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/3959212#M922813</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-11-15T10:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4582742#M1088807</link>
      <description>&lt;P&gt;I came across this thread while researching on differences between appliance and platform modes of 2100 series firewall. Learned it the hard way that the platform mode is more preferred for the ability to manage the device out of band especially in the situation when data interfaces of the ASA firewall can't be reached. My question is if there's any way to dedicate the serial console to the ASA firewall so that upon connecting to it via the terminal server the user ends up on the ASA but leaving the management interface dedicated to SSH connections to FXOS in either of the modes ?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 05:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4582742#M1088807</guid>
      <dc:creator>zheka_pefti</dc:creator>
      <dc:date>2022-03-31T05:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589782#M1089076</link>
      <description>&lt;P&gt;when connected via console run the "connect asa" command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;firepower-2120#&lt;BR /&gt;firepower-2120# connect asa&lt;BR /&gt;Attaching to ASA CLI ... Press 'Ctrl+a then d' to detach.&lt;BR /&gt;Type help or '?' for a list of available commands.&lt;/P&gt;&lt;P&gt;ciscoasa/act/pri&amp;gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 20:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589782#M1089076</guid>
      <dc:creator>EthanIsenberg75263</dc:creator>
      <dc:date>2022-04-10T20:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589804#M1089077</link>
      <description>&lt;P&gt;Thank you, this is not what I asked. I knew about it from the very beginning. My question was about using different physical ports to manage FXOS and ASA&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 23:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589804#M1089077</guid>
      <dc:creator>zheka_pefti</dc:creator>
      <dc:date>2022-04-10T23:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589816#M1089078</link>
      <description>&lt;P&gt;Just re-read your post and now see what you are asking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW - which mode (platform/appliance) did you end up going with?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 00:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589816#M1089078</guid>
      <dc:creator>EthanIsenberg75263</dc:creator>
      <dc:date>2022-04-11T00:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589817#M1089079</link>
      <description>&lt;P&gt;It's in the platform mode. The need to manage both devices (FXOS and ASA) independently comes from strict compliance. The client needs to put controls to everything that can be accessed, and being able to manage both of them in the out of band channel.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 00:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589817#M1089079</guid>
      <dc:creator>zheka_pefti</dc:creator>
      <dc:date>2022-04-11T00:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589858#M1089082</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292617"&gt;@zheka_pefti&lt;/a&gt; as far as I know there is no way to dedicate the physical ports (serial console vs. management) in the way you are asking.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 03:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4589858#M1089082</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-04-11T03:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4655741#M1092079</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;it's already 2022, have you heard/read that ASA in 'appliance mode' still having some bugs?&lt;/P&gt;&lt;P&gt;i'll be deploying FPR 2120 to replace ASA 5500-x and would like to immediately setup and run these devices.&lt;/P&gt;&lt;P&gt;is there an advantage in running 'platform' vs 'appliance' mode other than complete HW control in platform mode?&lt;/P&gt;&lt;P&gt;i don't see myself tinkering the internal HW via FXOS. are all interfaces enabled by default in 'appliance' mode?&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 01:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4655741#M1092079</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-07-23T01:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4656898#M1092123</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326072"&gt;@johnlloyd_13&lt;/a&gt; i haven't seen any issues with appliance mode; but then again I don't know how widely it's deployed. My customers are almost all running FTD these days (or planning to migrate to it).&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 15:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4656898#M1092123</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-07-25T15:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4960023#M1105864</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;my device is in appliance mode. How do I set it for platform mode?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 15:58:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4960023#M1105864</guid>
      <dc:creator>jwalters@data-tronics.com</dc:creator>
      <dc:date>2023-11-15T15:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4960029#M1105865</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/577018"&gt;jwalters@data-tronics.com&lt;/a&gt; you change it from the console as described in this guide:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp2100/firepower-2100-gsg/asa-platform.html#task_jgs_ntw_shb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp2100/firepower-2100-gsg/asa-platform.html#task_jgs_ntw_shb&lt;/A&gt;&lt;BR /&gt;Short version:&lt;/P&gt;
&lt;P&gt;conf t&lt;/P&gt;
&lt;P&gt;no fxos mode appliance&lt;/P&gt;
&lt;P&gt;wr mem&lt;/P&gt;
&lt;P&gt;reload&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 16:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4960029#M1105865</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-11-15T16:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4960276#M1105882</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;why do you want to convert the ASA to platform mode?&lt;/P&gt;&lt;P&gt;usually you'll run the ASA in appliance mode (classic ASA mode) so you don't have to configure anything in the FXOS.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 00:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4960276#M1105882</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2023-11-16T00:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4974809#M1106711</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;I have a customer who run his FPR2100 in platform mode. Now he lost the password to the chassis manager and it looks like we need to reimage it to recover the password. I was wonder if we instead could change to appliance mode? I think we dont need chassis manager access to do this, right?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Will the asa configuration be saved if we change to appliance mode?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What would be the impact of switching appliance mode? Is it only a reload that's required?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;One last question. If you are running in platform mode, can you still upgrade the ASA software from the CLI/ASDM or is chassis manager access required?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2023 12:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4974809#M1106711</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2023-12-09T12:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4975217#M1106722</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/256705"&gt;@Chess Norris&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;"When you change the mode, the configuration is cleared and you need to reload the system. The default configuration is applied upon reload. "&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp2100/firepower-2100-gsg/asa-platform.html#task_jgs_ntw_shb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp2100/firepower-2100-gsg/asa-platform.html#task_jgs_ntw_shb&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In platform mode, you can still upgrade the ASA from the ASA management cli.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 03:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4975217#M1106722</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-12-11T03:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4975287#M1106731</link>
      <description>&lt;P&gt;Thanks Marvin&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;
&lt;DIV class="certifications-wrapper-message"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Dec 2023 06:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4975287#M1106731</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2023-12-11T06:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4976027#M1106786</link>
      <description>&lt;P&gt;Do I need to unregister the ASA from the smart license server before changing the mode from platform to appliance and then re-register with a new token after the change? Or is that not necessary?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 09:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4976027#M1106786</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2023-12-12T09:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4976238#M1106790</link>
      <description>&lt;P&gt;When a configuration is cleared, that would include the mart licensing configuration. You can unregister from the ASA side first or, if that isn't done, just delete that instance from the SCCM portal prior to re-registering with a new token.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 13:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4976238#M1106790</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-12-12T13:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Deployment 2100 Deployment use cases for Appliance vs Platform</title>
      <link>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4976887#M1106841</link>
      <description>&lt;P&gt;Very helpful. Thanks again.&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 08:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-deployment-2100-deployment-use-cases-for-appliance-vs/m-p/4976887#M1106841</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2023-12-13T08:13:25Z</dc:date>
    </item>
  </channel>
</rss>

