<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Initial Config - G0/0 Outside using DHCP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3901221#M940020</link>
    <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;i'm just curious, what are some of the "new" features added in FTD 6.4 (compared to 6.2.3)?&lt;/P&gt;&lt;P&gt;any link you can share?&lt;/P&gt;</description>
    <pubDate>Thu, 01 Aug 2019 06:14:03 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2019-08-01T06:14:03Z</dc:date>
    <item>
      <title>FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899345#M940013</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i'm initially configuring an FTD (on an ASA5515-X) and set the 'outside' g0/0 to get DHCP from ISP.&lt;/P&gt;&lt;P&gt;the FTD g0/0 port is green/active and it correctly gets IP via DHCP (from fiber ONT) when i check via CLI.&lt;/P&gt;&lt;P&gt;but the connection diagram on the device summary shows a 'gray' line or the ISP/WAN/gateway to internet is down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt; show interface GigabitEthernet 0/0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Interface GigabitEthernet0/0 "outside", is up, line protocol is up&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; Hardware is i82574L rev00, BW 1000 Mbps, DLY 10 usec&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow control is unsupported, output flow control is off&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address b0fa.eb97.72cc, MTU 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address 222.164.10.189, subnet mask 255.255.254.0&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 415741 packets input, 27314861 bytes, 0 no buffer&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 396234 broadcasts, 0 runts, 0 giants&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 input errors, 5 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause input, 0 resume input&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 L2 decode drops&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 302 packets output, 121222 bytes, 0 underruns&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause output, 0 resume output&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 22 interface resets&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 late collisions, 0 deferred&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input reset drops, 0 output reset drops&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input queue (blocks free curr/low): hardware (485/456)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; output queue (blocks free curr/low): hardware (511/508)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; Traffic Statistics for "outside":&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 413760 packets input, 19690501 bytes&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 197 packets output, 53516 bytes&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 17863 packets dropped&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute input rate 361 pkts/sec,&amp;nbsp; 17102 bytes/sec&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute output rate 0 pkts/sec,&amp;nbsp; 1 bytes/sec&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute drop rate, 13 pkts/sec&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute input rate 379 pkts/sec,&amp;nbsp; 17956 bytes/sec&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute output rate 0 pkts/sec,&amp;nbsp; 0 bytes/sec&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute drop rate, 14 pkts/sec&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt; show route&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; o - ODR, P - periodic downloaded static route, + - replicated route&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Gateway of last resort is 222.164.10.1 to network 0.0.0.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;S*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 222.164.10.1, outside&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0 255.255.255.0 is directly connected, inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 255.255.255.255 is directly connected, inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 222.164.10.0 255.255.254.0 is directly connected, outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 222.164.10.189 255.255.255.255 is directly connected, outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt; ping 8.8.8.8&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Type escape sequence to abort.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!!!!!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i noticed there's no static default route and when i tried to manually configure a static default route, the ISP/WAN is still gray/down and can't do any updates to cisco cloud (geolocation, SI, etc.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;not sure if there's an option in FTD interface like in ASA to auto obtain an ISP default route:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address dhcp setroute &amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any guidance is highly appreciated. see attached photos.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:21:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899345#M940013</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2020-02-21T17:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899457#M940014</link>
      <description>&lt;P&gt;Does your management interface have Internet connectivity? That will be necessary for the Cisco updates and for the connection to show as fully functional.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 17:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899457#M940014</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-29T17:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899651#M940015</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;my laptop is directly connected to&amp;nbsp;the FTD MGMT port.&lt;/P&gt;&lt;P&gt;will plug the MGMT and PC on a switch and have them routed over the internet.&lt;/P&gt;&lt;P&gt;is there an option or command to force the FTD to get cloud updates via its WAN/outside interface?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 01:29:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899651#M940015</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-07-30T01:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899695#M940016</link>
      <description>&lt;P&gt;The originating source of the cloud updates will always be the FTD appliance's designated management interface. Those requests may be routed through / NATted to the outside interface but they will not be initiated from it.&lt;/P&gt;
&lt;P&gt;For a comprehensive treatment of this subject I recommend the "Cisco Firepower Threat Defense (FTD)" book (Chapter 6) by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/339519"&gt;@Nazmul Rajib&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 03:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899695#M940016</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-30T03:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899707#M940017</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;i already got a copy of that book. will do more FTD labs and reading &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 04:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3899707#M940017</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-07-30T04:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3900625#M940018</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;i had FTD MGMT and inside interface to have internet.&lt;/P&gt;&lt;P&gt;i'm posting right now from a PC behind FTD's inside interface &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;the connectivity to internet, DNS and NTP went green as well. see attached photo.&lt;/P&gt;&lt;P&gt;will do some labs and hopefully i'll be able to share it here in CSC &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 10:52:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3900625#M940018</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-07-31T10:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3900736#M940019</link>
      <description>&lt;P&gt;Cool. With your 5515-X you can run 6.4 and play with a few more features.&amp;nbsp;My home lab physical appliance is a 5506-X so I am limited to 6.2.3.x.&lt;/P&gt;
&lt;P&gt;I was just thinking today that I need to add a locally managed FTDv so that I can run 6.4 and manage with FDM. My current FTDv is managed by my FMC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 14:07:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3900736#M940019</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-31T14:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3901221#M940020</link>
      <description>&lt;P&gt;hi marvin,&lt;/P&gt;&lt;P&gt;i'm just curious, what are some of the "new" features added in FTD 6.4 (compared to 6.2.3)?&lt;/P&gt;&lt;P&gt;any link you can share?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 06:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3901221#M940020</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-08-01T06:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Initial Config - G0/0 Outside using DHCP</title>
      <link>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3901420#M940021</link>
      <description>&lt;P&gt;6.3 FDM adds:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/630/relnotes/firepower-release-notes-630/new_features.html#concept_D3A005FB2B0E45BBBDF5392C4D1DD138" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/630/relnotes/firepower-release-notes-630/new_features.html#concept_D3A005FB2B0E45BBBDF5392C4D1DD138&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;6.4 adds:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/relnotes/firepower-release-notes-640/features.html#id_84381" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/640/relnotes/firepower-release-notes-640/features.html#id_84381&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Some highlights:&lt;/P&gt;
&lt;P&gt;CoA for VPN (via ISE integration)&lt;/P&gt;
&lt;P&gt;FQDN objects in Access Control Policies&lt;/P&gt;
&lt;P&gt;API updated to include a lot more features (API v3)&lt;/P&gt;
&lt;P&gt;Integration with CTR&lt;/P&gt;
&lt;P&gt;CA-issued certificate for FDM&lt;/P&gt;
&lt;P&gt;Faster deployments&lt;/P&gt;
&lt;P&gt;...and much more&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 12:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-initial-config-g0-0-outside-using-dhcp/m-p/3901420#M940021</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-08-01T12:23:50Z</dc:date>
    </item>
  </channel>
</rss>

