01-18-2020 10:04 AM - edited 02-21-2020 09:50 AM
Hi , As my understanding it will support in both routed and Transparent mode ?
What will be the benefits using Routed mode ? or which one should i choose ?
We are using this appliance only for IPS and will configure HA between the devices ?
#ngips @sandeepcciesec #NGIPS4110
Solved! Go to Solution.
01-18-2020 07:03 PM
You can configure a Firepower 4110 with FTD logical device in transparent mode and High Availability (HA) pair.
If you use two network modules, one can be FPR4K-NM-8X1G-F or FPR9K-NM-6X10SR-F or FPR9K-NM-6X10LR-F (fail-to-wire / hardware bypass) and the other one can be FPR4K-NM-8X10G (or use the built-in 1 Gbps copper ports).
See the configuration guide for more details on inline sets and hardware bypass module operations.
01-18-2020 11:04 AM - edited 01-18-2020 11:05 AM
Hi,
The firewall mode only affects regular firewall interfaces, and not IPS-only mode.
For IPS only deployment design most probably you are deploying firewall like a “bump in the wire” . In that case as a best practice i recommend for Transparent mode. As my understanding for IPS only mode there is no addition benefit if you configure in Routed mode.
In both mode you will get Partial LINA-engine and full Snort-engine checks. Please go through the cisco doc for FTD deployments modes & Interface types.
Hope This Helps
Abheesh
01-18-2020 11:25 AM
Hi Abheesh Kumar,
Thanks for the response.
So we can configure Active Passive HA in Transparent mode right ?
We might have needed 4 inline Pair to inspect different networks.(Include DMZ , Inside,DC traffic )
Can we have 3 inline pair with Bypass mode and 1 inline pair without bypass (Fail-to-wire) in a same NGIPS 4110.
Because we have only 6-port Bypass (Fail-to-wire) in Devices
01-18-2020 07:03 PM
You can configure a Firepower 4110 with FTD logical device in transparent mode and High Availability (HA) pair.
If you use two network modules, one can be FPR4K-NM-8X1G-F or FPR9K-NM-6X10SR-F or FPR9K-NM-6X10LR-F (fail-to-wire / hardware bypass) and the other one can be FPR4K-NM-8X10G (or use the built-in 1 Gbps copper ports).
See the configuration guide for more details on inline sets and hardware bypass module operations.
01-19-2020 11:30 PM
Hi @Marvin Rhoads ,
Thanks for the response,
can we use both FPR4K-NM-8X1G-F & FPR9K-NM-6X10SR-F module inorder to get total 7(4+3) Pair inline set (Fail to fire right ) and built in 8*10 G for Management and HA connection ?
One more clarification :
If one of the interface is down in Fail-to-wire - Will ngips trigger HA and traffic will go through second NGIPS right ?
If one NGIPS is completely down , traffic is still pass through NGIPS with Fail-to-wire with uninspected right ? or will it trigger HA and second NGIPS should take over ?
can you please clarify the HA and fail-to-wire scenario
01-20-2020 04:00 AM
Yes in theory you can use two FTW Netmods as you described and also have the built-in non-FTW interfaces available. It would be a very expensive build though since those netmods are quite expensive. In practice you would probably be oversubscribing the appliance's throughput capability if you have a significant amount of traffic flowing through those multiple interfaces.
If you have an HA pair or cluster failure of an interface will generally trigger failover to the unit without a failed interface (unless you've excluded the interface from monitoring in the HA setup or done something like set a threshold for the number of interface that must go down before triggering failover).
If you had only a single appliance with FTW net mods, failure of the device (including complete power failure) will allow traffic to continue to pass through the FTW interface pairs.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide