Thanks this video help for ASA4110 installation & clustering ... Awesome
@ashishvlog707 ай бұрын
Hi Nathen Thanks for the video. It helped a lot. I have one specific question regarding the management port 1/1. Where shall we connect the port 1/1, if it is a switch where the mgmt port is to be connected then what would be the configuration of the switch port where the port 1/1 is connected. And do we need to assign separate ip for the mgmt port or it wil take the ip which was provided during the cluster creation. Thank you in adv.
@ashishkgarg63602 жыл бұрын
Thanks Nathan for great Video but can you please explain the traffic flow also like going from Inside zone to Outside side.. how to point the default route towards FW
@DerikCorreia2 ай бұрын
Hello, I am implementing two FPR-4112 in a cluster using the instance idea. Therefore, instance 1 vlan 50 and instance 2 vlan 100 and from each firewall I use two ports 1/8 and 2/8. On the C9500 switch I use stack-wise. However, to make the cluster operational I needed to create port-channels 48 and 49 in trunk. Is that correct? Could you share what configuration you used to configure the switch? In the video I see that there are two port-channels. Is that the idea?
@NeonNotch3 жыл бұрын
To be clear, you'd need 2 separate firepower FXOS appliances for this to work, correct? We couldn't use a single chassis with 2 separate firepower instances to configure HA, correct? I believe I've attempted to do so before but ran into the issue of the firepowers being on the same chassis? Thank you for the video!
@NathanStapp3 жыл бұрын
X I humbly apologize for such a long break, and thus missing a reply to this.... You can run clustering with a SINGLE chassis and multiple FPR. Its called intra-chassis cluster. Covered here for example: www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212698-configure-ftd-clustering-on-fp9300-intr.html
@NeonNotch3 жыл бұрын
@@NathanStapp no worries whatsoever, thank you very much for your help!
@robcarmona44963 жыл бұрын
Thanks a lot for the video.
@mandaarbendale7773 жыл бұрын
what is the purpose for copying the config from FW1 to FW2, because you have configured(fw2-logical device) it manually even after pasting the config.
@NathanStapp3 жыл бұрын
Mandaar, the pupose of copying the Config from FW1 to FW2 is to bootstrap the configuration (save you time so you dont have to type EVERYTHING again). What probably doesn't seem to make sense (but actually does when you think about it) is the fields that you have to populate are fields that are IMPOSSIBLE for the machine to determine for you. Passwords are obfuscated, so those cannot be exported and copied, hostnames are unique so the machine cannot divine what it is supposed to be, chassis # cant be determined because this might be chassis 4, or 5, or 6 up to 16 in the cluster...., IP cannot be determined from an existing ip in config. The rest of the fields that are empty, like search domain is because it is optional, and I did not populate that on the first box :)
@mandaarbendale7773 жыл бұрын
@@NathanStapp ah got it.....much informative, Thank you :) :)
@NavdeepMangal5 жыл бұрын
Hi Nathan Thanks for video. Can I do management with FDM after creating the cluster with FCM ? Thanks
@NathanStapp5 жыл бұрын
Navdeep, No you cannot. Firepower Device Manager (FDM) is only for local management of a firepower device. Local management cannot be used if you are part of a cluster, as the cluster must be managed by the same manager which means a remote manager. In this case Firepower Management Center (FMC). Thanks for the question!
@1Up2U5 жыл бұрын
Just noticed that your Video is titled with FTD 6.3 but your video is demonstrating on version 2.4; will the same steps still apply?
@NathanStapp5 жыл бұрын
Hey there! The 2.4(1.222) that you see above @ 00:01:10 is the FXOS version, (which supports FTD/FMC 6.3). 00:07:15 is where you will find the FTD version is 6.3. However to directly answer your question, YES the instructions above apply to FTD 6.3. Let me know if you have anymore questions!
@smithandro61245 жыл бұрын
Hi nathan how u solve the issue discovery failed due to internal error while registering ftd to fmc iam facing same issue
@NathanStapp5 жыл бұрын
@@smithandro6124 My apologies for such a long time before response. This can be caused by many issues and the simplest way to start troubleshooting this would be to view "sam.log". This will likely give you a plain english reason for the failure.
@bagushandoko15544 жыл бұрын
Hi, nice video. do you have network topology for this video? thanks
@NathanStapp4 жыл бұрын
I don't have one drawn out because this video only focused on the clustering of the firewalls. To be honest, after publication, I realized I probably should have shown the switch ether-channel configuration or linked to another video that prescriptively went into that configuration.
@bagushandoko15544 жыл бұрын
@@NathanStapp in case I have 2 direction data outside and inside. Do I must configure Portchannel 10 for outside and port channel 20 for inside. and when is a NGIPS, is in iline pair comnfigure in FMC?
@HarrySinghgoraya5 жыл бұрын
I have 2 FPR 9300 with single Sm44 Security module and i am running 5 Ftd logical instances on it in HA (Active/Standby) i also have VPN requirements on this FPR. Is it good to use it in cluster or in HA.?
@NathanStapp5 жыл бұрын
Harwinder, I apologize for such a long wait before response. I have a newborn in the house! :) As always the specific model device, code version, and intent are important in any answer, based on what you have told be I give the following information. Anyways, there are two types of VPN's and which one you needs changes the requirements. For Site-2-Site VPN's you can cluster OR HA, however the mechanics should be understood when you do this, I would recommend reading the "Guidelines and limitations" here: www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/firepower_threat_defense_site_to_site_vpns.html. For Remote access VPN's (RAVPN's) only HA is supported, this is documented here under guidelines and limitations: www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/firepower_threat_defense_remote_access_vpns.html#reference_xby_dml_wy. Hope this helps!
@adnanabushagur20154 жыл бұрын
Thanks for video
@NathanStapp4 жыл бұрын
happy to help! Ill be posting more relatively soon!