collapse

Search


User Info

 
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Recent Posts

Pages: [1] 2 3 ... 10
1
Security / Re: Migrate IPS rules for FMC 6.4 to FMC 7
« Last post by spykas on April 22, 2022, 04:55:07 AM »
Yes , that is the case .

Thank you.
2
Security / Re: Migrate IPS rules for FMC 6.4 to FMC 7
« Last post by MC on April 17, 2022, 08:40:58 PM »
Are you talking about from two different FMC, one running 6.4 to the other running 7.0? If so, not that I know of.
3
Security / Migrate IPS rules for FMC 6.4 to FMC 7
« Last post by spykas on April 08, 2022, 11:39:52 PM »
Hello ,

is it possible to migrate (export ? ) IPS rules from 6.4 to 7.0 and convert them to SNORT 3 ?

Thank you.
4
Security / Re: New user login and expired passwords
« Last post by MC on March 13, 2022, 10:25:14 PM »
What is the exact issue you are having?
5
Security / Re: New user login and expired passwords
« Last post by cerebr0_1 on March 11, 2022, 07:06:39 AM »
Hi MC
please can you tell us how did you fix the issue
6
Routing and Switching / Re: SDA Design on behalf of Christopher L.
« Last post by MC on February 05, 2022, 10:03:33 PM »
If you use switches for border node that can be virtualized, either stackable or stackwise virtual, then do so to minimize the number of BGP connection you will need to fusion device. All the underlay links in the fabric should always be redundant and routed, so no VLAN or STP should exist. You can refer to Cisco recommended design in the SDA CVD below. It covers all the different size deployments.

You are not allowed to view links. Register or Login
7
Routing and Switching / Re: SDA Design on behalf of Christopher L.
« Last post by clemish on February 04, 2022, 06:08:25 AM »
So, for an SDA Small Deployment, a collapsed design (due to limited hardware) whereby configuring BGP and sub-interfaces on the Firewall peering with the Dist/Core switch (SW1) would be the preferred deployment, understood.  Alternatively, in an Enterprise design, I would anticipate the preferred design be to replace the BC1 "router" with a stackable or HA pair of L3 switches port-channeled to the Core/Dist pair/stack of switches (SW1) to ensure high-availability and h/w fault tolerance (replace Loopbacks with SVIs).  In other words, we would inject another HA layer in order to perform BGP peering to separate the VRF/VNs between the new layer and the SW1(Dist/Core) pair of switches (/30 VRF subnets in your design).  Would this be the appropriate design for SDA Medium/Large deployments?
8
Routing and Switching / Re: SDA Design on behalf of Christopher L.
« Last post by Administrator on February 03, 2022, 08:02:37 PM »
 If the network is not big (<25 nodes), you can make the Core/Dist switch a Border/Control Plane and the FW a fusion router. Cisco considers this a small deployment. If you need to scale, you would want to insert a separate Border/Control Plane between the Core/Dist and FW, and make the Core/Dist device a pure underlay. Edge device would never do BGP unless it is Fabric-in-a-Box.
9
Routing and Switching / SDA Design on behalf of Christopher L.
« Last post by Administrator on February 03, 2022, 08:02:27 PM »
 If a customer has Edge(Access) switches, then Core/Distribution switches, then Firewall that egresses to the Internet, which device is the standard topology would be considered the ULAY1 device and BC1 router. For inter-VRF & External Connection communications, we need to configure BGP on what I would assume would be the Core/Distribution switch(SW1) with BC1. Do we need to add a router (BC1) in between their Core Switch (SW1) and their Edge nodes (E1) - I would be concerned about injecting another layer of failure (we would need HA devices). We need to design the network to add BGP Peering (SW1/BC1) and the edge nodes wouldn't be doing that, unless you extend L3 switching down to the edge and put BGP on the E1 nodes? Alternatively, we would need to add another layer to the topology so we can have 2 BGP routing peers to VRF the various VNs. Could you help me understand the best practice for the design?
10
Routing and Switching / Re: SDA border node
« Last post by MC on October 31, 2021, 09:40:53 PM »
Hi Aris, Assuming you have two 9500, you should be able to remove one and add a 9600. Keep in mind the IP for transit /30 VLAN to fusion router may change unless the latest version of DNAC allows you to specify it somehow so be prepared to update config on the fusion device, both interface IP and BGP. Once you get one 9600 running, repeat the same step on the other 9500. The other option is to add the 9600 as stackwise virtual and follow same process. If you find a better approach, please share experience and feedback.
Pages: [1] 2 3 ... 10
SimplePortal 2.3.7 © 2008-2022, SimplePortal