cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
360
Views
0
Helpful
5
Replies

FTD 1120 multiple interfaces on single Security Zone

FLTRU16
Level 1
Level 1

We are spinning up a new set of core switches and changing the internal IP Address scheme at the same time. I was wondering if it was possible to have multiple internal interfaces in a single security zone. The goal is to complete the new switch configuration and test connectivity to the outside world and our multiple VPN sites. I could not find any document that said I could or could not but the FDM will let me combine them. 

 

Thanks in advance.

1 Accepted Solution

Accepted Solutions

FLTRU16
Level 1
Level 1

Found the solution. You can bridge multiple physical port to the inside-zone.

Configure the Bridge Group:
Step 1: Navigate to the FTD device configuration interface.
Step 2: Go to the Network section and select Interfaces.
Step 3: Click on Bridge Groups and create a new bridge group if one does not already exist.
Step 4: Add the two ports you want to include in the bridge group. Ensure that each member interface meets the following requirements:
The interface must have a name.
The interface cannot have any IPv4 or IPv6 addresses defined for it, either static or served through DHCP.
Step 5: Configure the bridge group interface (BVI) with an IP address for the inside network. For example, you can set the BVI1 inside network to 192.168.1.1/24.
Assign the Bridge Group to the Inside Network:
Step 6: Ensure that the bridge group interface (BVI) is assigned to the inside security zone.
Step 7: Configure any necessary security policies and access control lists (ACLs) to allow traffic between the inside network and other networks.
Verify the Configuration:
Step 8: Verify that the bridge group is correctly configured by checking the interface status and ensuring that devices connected to the two ports can communicate with each other and with the outside network.

View solution in original post

5 Replies 5

Sheraz.Salim
VIP Alumni
VIP Alumni

can you not create a seprate zone. as combine zone can fix the traffic and could lead of security risk plus its not good practice to combine the different interfaces in single zone.

Note: In my experience with FMC managed FTD deivces I have came across security zone issue where it complain about static rotue therefore be mindful of that.

please do not forget to rate.

I could do that, just seams a little counter productive. I don't see an option to combine zones, could you expand on this? I previously came from the Silver Peak SD-WAN side so I am out of practice when it comes to Cisco. 

FLTRU16
Level 1
Level 1

I have created a second internal zone but there is no traffic. I only have Meraki Switches connected into the new internal zone interface and now my switches are showing offline. There is a route configured for any-ipv4 to outside. I'm not sure what I am missing from this config. 

FLTRU16
Level 1
Level 1

Here is a screenshot of what I am trying to accomplish. Port 1/2 and 1/3 both go to the inside network

FLTRU16_0-1743105233849.png

 

FLTRU16
Level 1
Level 1

Found the solution. You can bridge multiple physical port to the inside-zone.

Configure the Bridge Group:
Step 1: Navigate to the FTD device configuration interface.
Step 2: Go to the Network section and select Interfaces.
Step 3: Click on Bridge Groups and create a new bridge group if one does not already exist.
Step 4: Add the two ports you want to include in the bridge group. Ensure that each member interface meets the following requirements:
The interface must have a name.
The interface cannot have any IPv4 or IPv6 addresses defined for it, either static or served through DHCP.
Step 5: Configure the bridge group interface (BVI) with an IP address for the inside network. For example, you can set the BVI1 inside network to 192.168.1.1/24.
Assign the Bridge Group to the Inside Network:
Step 6: Ensure that the bridge group interface (BVI) is assigned to the inside security zone.
Step 7: Configure any necessary security policies and access control lists (ACLs) to allow traffic between the inside network and other networks.
Verify the Configuration:
Step 8: Verify that the bridge group is correctly configured by checking the interface status and ensuring that devices connected to the two ports can communicate with each other and with the outside network.

Review Cisco Networking for a $25 gift card