Cisco: Security - Clustering a Firepower 4100 with FTD 6.3

  Рет қаралды 16,561

Nathan Stapp (CiscoNate)

Nathan Stapp (CiscoNate)

Күн бұрын

Пікірлер: 24
@nayanangshumajumder7504
@nayanangshumajumder7504 3 жыл бұрын
Thanks this video help for ASA4110 installation & clustering ... Awesome
@ashishvlog70
@ashishvlog70 7 ай бұрын
Hi Nathen Thanks for the video. It helped a lot. I have one specific question regarding the management port 1/1. Where shall we connect the port 1/1, if it is a switch where the mgmt port is to be connected then what would be the configuration of the switch port where the port 1/1 is connected. And do we need to assign separate ip for the mgmt port or it wil take the ip which was provided during the cluster creation. Thank you in adv.
@ashishkgarg6360
@ashishkgarg6360 2 жыл бұрын
Thanks Nathan for great Video but can you please explain the traffic flow also like going from Inside zone to Outside side.. how to point the default route towards FW
@DerikCorreia
@DerikCorreia 2 ай бұрын
Hello, I am implementing two FPR-4112 in a cluster using the instance idea. Therefore, instance 1 vlan 50 and instance 2 vlan 100 and from each firewall I use two ports 1/8 and 2/8. On the C9500 switch I use stack-wise. However, to make the cluster operational I needed to create port-channels 48 and 49 in trunk. Is that correct? Could you share what configuration you used to configure the switch? In the video I see that there are two port-channels. Is that the idea?
@NeonNotch
@NeonNotch 3 жыл бұрын
To be clear, you'd need 2 separate firepower FXOS appliances for this to work, correct? We couldn't use a single chassis with 2 separate firepower instances to configure HA, correct? I believe I've attempted to do so before but ran into the issue of the firepowers being on the same chassis? Thank you for the video!
@NathanStapp
@NathanStapp 3 жыл бұрын
X I humbly apologize for such a long break, and thus missing a reply to this.... You can run clustering with a SINGLE chassis and multiple FPR. Its called intra-chassis cluster. Covered here for example: www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212698-configure-ftd-clustering-on-fp9300-intr.html
@NeonNotch
@NeonNotch 3 жыл бұрын
@@NathanStapp no worries whatsoever, thank you very much for your help!
@robcarmona4496
@robcarmona4496 3 жыл бұрын
Thanks a lot for the video.
@mandaarbendale777
@mandaarbendale777 3 жыл бұрын
what is the purpose for copying the config from FW1 to FW2, because you have configured(fw2-logical device) it manually even after pasting the config.
@NathanStapp
@NathanStapp 3 жыл бұрын
Mandaar, the pupose of copying the Config from FW1 to FW2 is to bootstrap the configuration (save you time so you dont have to type EVERYTHING again). What probably doesn't seem to make sense (but actually does when you think about it) is the fields that you have to populate are fields that are IMPOSSIBLE for the machine to determine for you. Passwords are obfuscated, so those cannot be exported and copied, hostnames are unique so the machine cannot divine what it is supposed to be, chassis # cant be determined because this might be chassis 4, or 5, or 6 up to 16 in the cluster...., IP cannot be determined from an existing ip in config. The rest of the fields that are empty, like search domain is because it is optional, and I did not populate that on the first box :)
@mandaarbendale777
@mandaarbendale777 3 жыл бұрын
@@NathanStapp ah got it.....much informative, Thank you :) :)
@NavdeepMangal
@NavdeepMangal 5 жыл бұрын
Hi Nathan Thanks for video. Can I do management with FDM after creating the cluster with FCM ? Thanks
@NathanStapp
@NathanStapp 5 жыл бұрын
Navdeep, No you cannot. Firepower Device Manager (FDM) is only for local management of a firepower device. Local management cannot be used if you are part of a cluster, as the cluster must be managed by the same manager which means a remote manager. In this case Firepower Management Center (FMC). Thanks for the question!
@1Up2U
@1Up2U 5 жыл бұрын
Just noticed that your Video is titled with FTD 6.3 but your video is demonstrating on version 2.4; will the same steps still apply?
@NathanStapp
@NathanStapp 5 жыл бұрын
Hey there! The 2.4(1.222) that you see above @ 00:01:10 is the FXOS version, (which supports FTD/FMC 6.3). 00:07:15 is where you will find the FTD version is 6.3. However to directly answer your question, YES the instructions above apply to FTD 6.3. Let me know if you have anymore questions!
@smithandro6124
@smithandro6124 5 жыл бұрын
Hi nathan how u solve the issue discovery failed due to internal error while registering ftd to fmc iam facing same issue
@NathanStapp
@NathanStapp 5 жыл бұрын
@@smithandro6124 My apologies for such a long time before response. This can be caused by many issues and the simplest way to start troubleshooting this would be to view "sam.log". This will likely give you a plain english reason for the failure.
@bagushandoko1554
@bagushandoko1554 4 жыл бұрын
Hi, nice video. do you have network topology for this video? thanks
@NathanStapp
@NathanStapp 4 жыл бұрын
I don't have one drawn out because this video only focused on the clustering of the firewalls. To be honest, after publication, I realized I probably should have shown the switch ether-channel configuration or linked to another video that prescriptively went into that configuration.
@bagushandoko1554
@bagushandoko1554 4 жыл бұрын
@@NathanStapp in case I have 2 direction data outside and inside. Do I must configure Portchannel 10 for outside and port channel 20 for inside. and when is a NGIPS, is in iline pair comnfigure in FMC?
@HarrySinghgoraya
@HarrySinghgoraya 5 жыл бұрын
I have 2 FPR 9300 with single Sm44 Security module and i am running 5 Ftd logical instances on it in HA (Active/Standby) i also have VPN requirements on this FPR. Is it good to use it in cluster or in HA.?
@NathanStapp
@NathanStapp 5 жыл бұрын
Harwinder, I apologize for such a long wait before response. I have a newborn in the house! :) As always the specific model device, code version, and intent are important in any answer, based on what you have told be I give the following information. Anyways, there are two types of VPN's and which one you needs changes the requirements. For Site-2-Site VPN's you can cluster OR HA, however the mechanics should be understood when you do this, I would recommend reading the "Guidelines and limitations" here: www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/firepower_threat_defense_site_to_site_vpns.html. For Remote access VPN's (RAVPN's) only HA is supported, this is documented here under guidelines and limitations: www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/firepower_threat_defense_remote_access_vpns.html#reference_xby_dml_wy. Hope this helps!
@adnanabushagur2015
@adnanabushagur2015 4 жыл бұрын
Thanks for video
@NathanStapp
@NathanStapp 4 жыл бұрын
happy to help! Ill be posting more relatively soon!
FPR4100: Hitless upgrade of FXOS and ASA, using FXOS cli (2017)
30:58
Cisco Secure Firewall
Рет қаралды 24 М.
IPS (Intrusion Policy) with FMC - Lab || (Hacking Attack included)
16:32
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
Firepower Threat Defense - Common Practice Guide Walkthrough
50:28
Jason Maynard
Рет қаралды 33 М.
Configuring Cisco Firepower Active/Standby Failover
46:02
Network Wizkid
Рет қаралды 10 М.
Friday Firepower Hour   Intrusion and Network Analysis Policies
55:48
The Power of Firepower - Cisco Security
Рет қаралды 7 М.
Firepower Migration Tool: ASA to FTD
8:18
Jason Maynard
Рет қаралды 11 М.
Cisco: Security - Firepower 4100 FXOS & Firmware Update
17:48
Nathan Stapp (CiscoNate)
Рет қаралды 17 М.
Cisco Firepower- Initial Device Setup FTD/FMC/FDM
35:17
BitsPlease
Рет қаралды 53 М.
FMC vs FDM
6:23
Securing Networks with Cisco Firepower Threat Defense
Рет қаралды 21 М.
Cisco Firepower - Introduction, Configuration, and Best Practice | Webinar
1:05:54