I have a customer currently running 6.2.2 FirePower code managed via FMC.
They have 2 separate circuits from the same ISP with different ranges and want Circuit1 connected to Primary and Circuit2 to Secondary so that, should a failover happen, they use the second circuit on the second firewall.
Is this possible?
If so then how might be the best way to implement it in regards to NAT/ACLS/Routes etc?
If not possible then how would be best to workaround so that it will work as a HA pair whilst retaining resiliency?
So you are planning to configure the FTD 2110 on High-availability and you have 2 ISP links.
As per your requirements i don't think so that is possible because your firewalls are on HA.
On HA, even if your firewall switch-over to the second firewall also it will take the Circuit1 IP to route the traffic outside.
Why can't you utilize both the links with the help of PBR. So when one of the link goes down also it will be swithover to the second circuit and you will get a full redundant network. Below is some video links to configure PBR.
Hi experts,I would like any suggestions on this topology. We are is the middle of replacing our old ASA5520 with the new FirePower. Our current firewall terminate our IPsec tunnels and the GRE is terminated on the first inside router's loopback on the sec...
Hi All, A customer wants to authenticate Anyconnect VPN users from an ASA using the client installed certificate and then with AD. i.e. Is this a corporate device?Would we recommend authenticating the cert on the ASA then passing the AD check to ISE ...
Hello Team, we are getting alert in FMC stating policy deployment failed, we are running on 6.2.0 version and not sure which version is stable version to re mediate this issue, in one event i have seen restart will resolve this issue but is it perman...
Threat Hunting 101
In the latest Cisco Cybersecurity report, we explore all there is to know about threat hunting and provide a how-to guide for creating a threat hunting team.
Here are some of th...
What Is Cisco Identity Services Engine?
Cisco Identity Services Engine (ISE) is an all-in-one enterprise policy control product that enables comprehensive secure wired, wireless, and Virtual Private Networking (VPN) access.
Cisco ISE offers...