<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic We actually managed this to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998219#M1019025</link>
    <description>&lt;P&gt;We actually managed this to work in the following way.&lt;/P&gt;
&lt;P&gt;We are not changing mgt address of remote host. We actually created security zone called branch_mgt. Assigned interface to it and gave the ip address to that interface (lets call it IP address A). This address is the default gateway for branch FTD management &amp;nbsp;interface (lets call it ip address B).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;During the preconfig we assigned IP addr. B to management interface and set default gateway to ip addr A. This ip addr A was assigned to local switch vlan ABC to provide connectivity to FMC.&lt;/P&gt;
&lt;P&gt;We also ensured that in VPN configuration both Branch Inside network and Branch management network were included in protected network section.&lt;/P&gt;
&lt;P&gt;After we did preconfig we simply connect Branch FTD management interface to interface assigned to branch_mgt security zone&lt;/P&gt;</description>
    <pubDate>Tue, 01 Nov 2016 15:49:03 GMT</pubDate>
    <dc:creator>a.lukoyanov</dc:creator>
    <dc:date>2016-11-01T15:49:03Z</dc:date>
    <item>
      <title>FTD registering to FMC scenario</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998213#M1019009</link>
      <description>&lt;P&gt;Afternoon everyone,&lt;/P&gt;
&lt;P&gt;I have a project, involves one FMC appliance, and I will be joining about 14 5506x's (FTD image) to the server. &amp;nbsp;So the sites that will be getting the 5506x with the FTD image, they just have a basic internet connection, no vpn tunnel, etc. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, with that information, how should i go about registering the 5506x's to the FMC server? &amp;nbsp;I mean, to&amp;nbsp;make any configuration's to the 5506x you have to have it registered to the FMC. &amp;nbsp;But, before i send out the 5506x to the remote site, i need to get the following configuration below configured on the 5506x.&lt;/P&gt;
&lt;P&gt;Basic configuration of 5506x:&lt;/P&gt;
&lt;P&gt;- outside interface dhcp setroute&lt;/P&gt;
&lt;P&gt;- inside interface static IP address&lt;/P&gt;
&lt;P&gt;- PAT&lt;/P&gt;
&lt;P&gt;- no access allowed inbound&lt;/P&gt;
&lt;P&gt;Ideas: &amp;nbsp;pre-register the 5506x, via management interface with it being local on the site where the FMC is located. &amp;nbsp;Make my configurations on the 5506x. &amp;nbsp;Than ship the 5506x out, it gets the dhcp setroute, static inside IP address is configured, PAT, etc. everyone internally has internet. &amp;nbsp;Than someone local on that site, would have to inform me what their public IP address is, i could than ssh to the outside of the 5506x FTD image, delete the configure manager add command (as the previous command would reference a private IP address and of course wouldn't find the FTD at that point due to no VPN tunnel, MPLS, etc.) and than re-configure the configure manager add using the NAT ID to the public IP address that would be nat'd at a different physical location to the FMC. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Following, in the FMC, join the 5506x back using its own outside public IP address and re-deploy policies. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;think that will work? &amp;nbsp;is there a better way to go about this?&lt;/P&gt;
&lt;P&gt;Thanks! - Tony&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998213#M1019009</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2020-02-21T13:55:27Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998214#M1019012</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The approach would be best to pre-register the device and then install it and then re-register the sensor.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Sep 2016 15:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998214#M1019012</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-09-24T15:10:29Z</dc:date>
    </item>
    <item>
      <title>Isnt possible to use the</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998215#M1019015</link>
      <description>&lt;P&gt;Isnt possible to use the local management in 6.1 to do this?&lt;/P&gt;
&lt;P&gt;I dont really know how to do it, i tried to find the commands but as my device is already registered i cannot do it, there is some commands as configure https-access-list in the Threat Defense CLI, maybe you can do something with that GUI, i never used ...&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2016 22:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998215#M1019015</guid>
      <dc:creator>Eduardo Ferreira Fernandez</dc:creator>
      <dc:date>2016-10-10T22:15:49Z</dc:date>
    </item>
    <item>
      <title>I think the best approach</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998216#M1019018</link>
      <description>&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;I think the best approach would be to register your sensors using the Public IP of your FMC. Just setup a network segment for registering the devices and simulate your end-scenario this way.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;When the ASAs are being deployed at the new site they will automatically try to connect to your FMC&amp;nbsp;and you can re-register the devices on the FMC side without touching all firewalls and changing the manager ip.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just use FQDNs to register your devices on FMC. When the devices get shipped to the remote sites just change the DNS entries and you are done.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;p.s. make sure FTD can use the DNS Servers you add with "configure network" at the remote site.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2016 05:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998216#M1019018</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-10-11T05:35:42Z</dc:date>
    </item>
    <item>
      <title>Hello Tony,</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998217#M1019020</link>
      <description>&lt;P&gt;Hello Tony,&lt;/P&gt;
&lt;P&gt;Did&amp;nbsp;you manage to solve the problem?&lt;/P&gt;
&lt;P&gt;I'm working on the same project right now and have the following idea:&lt;/P&gt;
&lt;P&gt;1) register FTD with FMC locally. FQDN is used to register device.&lt;/P&gt;
&lt;P&gt;2) pre-configure the FTD including:&lt;/P&gt;
&lt;P&gt;- MGT interface has Inside interface as a default gateway&lt;/P&gt;
&lt;P&gt;- PAT translation MGT_IP:TCP8305 -&amp;gt; Outside_Interface_IP:TCP 8305.&lt;/P&gt;
&lt;P&gt;- Access Policy to allow connection from outside to Mgt interface&lt;/P&gt;
&lt;P&gt;3) re-register FTD with &amp;nbsp;FMC using&lt;/P&gt;
&lt;P&gt;- "configure manager add DONTRESOLVE natidstring keystring" on FTD&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- change DNS settings so that FQDN is resolved as Outside Interface IP address, so FMC can connect to remote FTD&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 07:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998217#M1019020</guid>
      <dc:creator>a.lukoyanov</dc:creator>
      <dc:date>2016-10-18T07:36:22Z</dc:date>
    </item>
    <item>
      <title>So, I have been working</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998218#M1019022</link>
      <description>&lt;P&gt;So, I have been working through my project and came across an interesting problem. &amp;nbsp;If a site does not have a backup vpn solution, you are forced to register the FTD device through its own access control policy, nat, route, etc., using the NAT ID feature. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem is, if you registered it at a local site with a different IP address (management IP address on FTD), than ship it out. &amp;nbsp;The site receives the devices and plugs everything, everything flows through FTD just fine. &amp;nbsp;But, now you need to change the management IP address (to reflect remote site network) to get it registered back to FMC. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem is, I change the management IP address on FTD and FMC and couldn't get it re-registered. &amp;nbsp;So, reaching out to TAC, they said i would have to delete the previous registration and re-register it due to how FMC holds registrations. &amp;nbsp;They said it will not be a problem because FMC will pull the policy that is currently on FTD device and use that. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;So we did that. &amp;nbsp;HOWEVER, the FMC did pull the policy, but it when it re-applies (this is all automatic and you can't change this), it deletes the configuration&amp;nbsp;while it is re-appling the same one it pulled from it. &amp;nbsp;But, once FMC gets to the NAT and routes being deleted, FMC can't finish re-deploying the policy because it broke itself and there is no connection possible back to FMC as it deleted its own NAT and routes. &amp;nbsp;We confirmed this by going in the back end way to the actual ASA code, NAT and route's were gone. &amp;nbsp;We did this twice. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Therefore, TAC stated this is a oversight on this type of design and I will have to use a VPN. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ahh!!!! &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2016 15:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998218#M1019022</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2016-11-01T15:27:46Z</dc:date>
    </item>
    <item>
      <title>We actually managed this to</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998219#M1019025</link>
      <description>&lt;P&gt;We actually managed this to work in the following way.&lt;/P&gt;
&lt;P&gt;We are not changing mgt address of remote host. We actually created security zone called branch_mgt. Assigned interface to it and gave the ip address to that interface (lets call it IP address A). This address is the default gateway for branch FTD management &amp;nbsp;interface (lets call it ip address B).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;During the preconfig we assigned IP addr. B to management interface and set default gateway to ip addr A. This ip addr A was assigned to local switch vlan ABC to provide connectivity to FMC.&lt;/P&gt;
&lt;P&gt;We also ensured that in VPN configuration both Branch Inside network and Branch management network were included in protected network section.&lt;/P&gt;
&lt;P&gt;After we did preconfig we simply connect Branch FTD management interface to interface assigned to branch_mgt security zone&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2016 15:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998219#M1019025</guid>
      <dc:creator>a.lukoyanov</dc:creator>
      <dc:date>2016-11-01T15:49:03Z</dc:date>
    </item>
    <item>
      <title>Yeah i can see that working,</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998220#M1019026</link>
      <description>&lt;P&gt;Yeah i can see that working, that makes sense. &amp;nbsp;As long as the management IP address doesn't change when you are using the FTD device as the path to connect to FMC I don't foresee this being a problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It still makes me nervous with registering a FTD management interface to FMC while using the FTD as its path. &amp;nbsp;I mean, would if the IP addresses need to change or&amp;nbsp;someone screws up a route or NAT or something. &amp;nbsp;There is NO way to locally change it back on the FTD device to get it re-registered. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I feel cisco should give us SOME local configuration options on FTD, but there are none. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks - Tony&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2016 15:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998220#M1019026</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2016-11-01T15:58:45Z</dc:date>
    </item>
    <item>
      <title>At the moment, we need to</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998221#M1019028</link>
      <description>&lt;P style="margin: 0cm 0cm 7.5pt 0cm;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;At the moment, we need to have some cheap equipment on branch site which can provide us connectivity to branch FTD management interface. That can be any VPN capable device.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0cm 0cm 7.5pt 0cm;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;We also need to make some cabling instructions for local staff.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt 0cm;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;So when we lost connection to branch FTD we can ask locals to connect FTD to the small VPN device so we can configure branch FTD&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2016 16:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998221#M1019028</guid>
      <dc:creator>a.lukoyanov</dc:creator>
      <dc:date>2016-11-01T16:16:40Z</dc:date>
    </item>
    <item>
      <title>Hi Tony,</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998222#M1019030</link>
      <description>&lt;P&gt;Hi Tony,&lt;/P&gt;
&lt;P&gt;I have tested the scenario you described and do not agree with TAC. I have got it working just fine without re-registering the device since that would cause the chicken-egg issue you have described.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Initially it did not work and FMC did not connect to sensor again but after changing the Host configuration at Device Management &amp;gt; [Sensor Name] &amp;gt; Devices &amp;gt; Management and restarting sftunnel processes via pmtool on CLI it re-connected just fine. (v. 6.1.0 build 330)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will test this again and report back in more detail tommorow.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2016 22:58:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998222#M1019030</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-11-01T22:58:32Z</dc:date>
    </item>
    <item>
      <title>Really that is interesting,</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998223#M1019033</link>
      <description>&lt;P&gt;Really that is interesting, if I could get more information on this, that would good to know. &amp;nbsp;Also, how did you restart the 'sftunnel' process? &amp;nbsp;Or i think i found it:&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;admin@FireSIGHT:~$ &lt;STRONG&gt;sudo pmtool restartbyid sftunnel&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Some more features that I got working last night on FTD, worked without issue. &amp;nbsp;I did have to get into the actual ASA cli on the FTD, do some show commands to verify what I was pushing to it was actually being configured. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;- ospf&lt;/P&gt;
&lt;P&gt;- about 12 sub-interfaces (customer wanted router on a stick)&lt;/P&gt;
&lt;P&gt;- dhcprelay on each inside interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2016 13:31:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998223#M1019033</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2016-11-02T13:31:20Z</dc:date>
    </item>
    <item>
      <title>After another test I have</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998224#M1019036</link>
      <description>&lt;P&gt;After another test I have found that a restart of the sftunnel process is not neccessary, I just had to give FMC some time to reconnect to the sensor.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is how I tested the change of IP:&lt;/P&gt;
&lt;P&gt;1. Register sensor with FQDN sensor.example.com&lt;/P&gt;
&lt;P&gt;2. Configure FTD data interfaces (mgmt [10.0.0.1] and outside [1.1.1.1]) and configure PAT for TCP/8305 from outside to sensor management IP 10.0.0.100&lt;/P&gt;
&lt;P&gt;3. Relocate sensor and change management ip address to 10.0.0.100. Set default-gateway to FTD data interface mgmt [10.0.0.1].&lt;/P&gt;
&lt;P&gt;4. Change DNS A record for sensor.example.com to outside [1.1.1.1]&lt;/P&gt;
&lt;P&gt;5. Wait for&amp;nbsp;~10min&lt;/P&gt;
&lt;P&gt;6. Verify sftunnel connect via netstat -a and deploy configuration again to verify connectivity is working correctly between sensor and fmc.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if you have any questions.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2016 18:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998224#M1019036</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-11-02T18:49:42Z</dc:date>
    </item>
    <item>
      <title>We also could translate both</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998225#M1019040</link>
      <description>&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;We also could translate both source and destination addresses to solve the connectivity problem between FMC and sensor. This translation should be made on FMC and Sensor sites.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;They will connect to each over using IP addresses as if they are not separated by NAT devices.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;On FMC site:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;FMC_Local -&amp;gt; Sensor_Local:8305 should be translated to FMC_Global -&amp;gt; Sensor_Global:8305&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;On Sensor site:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial',sans-serif;"&gt;Sensor_Local:8305 -&amp;gt; FMC_Local should be translated to Sensor_Global:8305 -&amp;gt; FMC_Global&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 11:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998225#M1019040</guid>
      <dc:creator>a.lukoyanov</dc:creator>
      <dc:date>2016-11-16T11:28:21Z</dc:date>
    </item>
    <item>
      <title>Sorry it took me so long to</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998226#M1019042</link>
      <description>&lt;P&gt;Sorry it took me so long to get back to this. &amp;nbsp;But Lukoyanov is exactly right. &amp;nbsp;After going through some scenario's, this is what cisco stated is supported:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. either mpls or vpn connection to the management interface, these routes CANNOT be via the FTD device&lt;/P&gt;
&lt;P&gt;2. put a public IP address on the management interface and connect it directly to the internet. &amp;nbsp;of course at that point you need to have two public ip addresses for the site&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 13:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998226#M1019042</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2017-02-23T13:29:35Z</dc:date>
    </item>
    <item>
      <title>Just wanted to let you know</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998227#M1019045</link>
      <description>&lt;P&gt;Just wanted to let you know why they dont support anything else at the moment. You could NAT the management address for a connection to FMC but if for whatever reason you would have to re-register your FTD device to FMC it would remove the static routes and nat configuration during the registration process, which will leave you with a device that cant receive configuration from the FMC because it deleted the required network configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I talked with an engineering lead about this in december and they are working on a solution, but at the moment we can only work around this issue with the methods you posted.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 13:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998227#M1019045</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2017-02-23T13:36:20Z</dc:date>
    </item>
    <item>
      <title>Yeah that is exactly what i</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998228#M1019051</link>
      <description>&lt;P&gt;Yeah that is exactly what i found in my testing. &amp;nbsp;Was very confusing with what was happening but i could confirm it all by going into the back end of the FTD and getting into the ASA cli and doing some show commands.&lt;/P&gt;
&lt;P&gt;Sure enough, nats, etc, the device was breaking itself so it couldn't finish. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 13:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/2998228#M1019051</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2017-02-23T13:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: Hello Tony,</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3208339#M1019052</link>
      <description>I did it without this  step below &lt;BR /&gt;- PAT translation MGT_IP:TCP8305 -&amp;gt; Outside_Interface_IP:TCP 8305.</description>
      <pubDate>Tue, 31 Oct 2017 18:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3208339#M1019052</guid>
      <dc:creator>antonkolev</dc:creator>
      <dc:date>2017-10-31T18:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Just wanted to let you know</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3354350#M1019053</link>
      <description>&lt;P&gt;As of a year later (March 2018) and Version 6.2.3 (at least, the beta as of a month ago), there was still no good solution. You need either an extra network or a separate NAT device (which could be a cheap Linksys or equivalent, or could be NAT functions on your Internet router if you have a spare port.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's possible to configure the FTD using DHCP for the management port, if you're careful enough, so that you can set it up with the FMC at HQ, then ship it out and plug it all back in, but you still have to use the FTD to provide the NAT for the management port, so if that ever gets messed up (say, because you deployed a bad configuration) you don't have a way to fix it remotely.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Mar 2018 06:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3354350#M1019053</guid>
      <dc:creator>bstewart</dc:creator>
      <dc:date>2018-03-24T06:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Just wanted to let you know</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3391372#M1019054</link>
      <description>&lt;P&gt;I hope Cisco is watching this thread.&amp;nbsp; I've struggled with this problem in a lab environment and arrived more or less at the same solutions mentioned above.&amp;nbsp; I've burned too much time trying to figure something out that should be straightforward.&amp;nbsp; Furthermore, I do not find these "solutions" acceptable.&amp;nbsp; Its quite baffling that this is still an issue.&amp;nbsp; Very disappointing.&lt;/P&gt;</description>
      <pubDate>Wed, 30 May 2018 15:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3391372#M1019054</guid>
      <dc:creator>ramos1</dc:creator>
      <dc:date>2018-05-30T15:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Just wanted to let you know</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3692612#M1019055</link>
      <description>&lt;P&gt;What if you change the flash to ASA instead of FTD and then you can use the ASA to do a site to site VPN. You can assign the SFR module an IP address on the inside network and use that IP to connect to your FMC. Your FMC would be on the other end of the VPN tunnel and it would use the inside IP of the SFR module to manage&amp;nbsp; it.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/200321-Management-of-SFR-Module-Over-VPN-Tunnel.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/200321-Management-of-SFR-Module-Over-VPN-Tunnel.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH Edgar&lt;/P&gt;</description>
      <pubDate>Wed, 22 Aug 2018 02:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registering-to-fmc-scenario/m-p/3692612#M1019055</guid>
      <dc:creator>Edgar Almonte</dc:creator>
      <dc:date>2018-08-22T02:17:03Z</dc:date>
    </item>
  </channel>
</rss>

