<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5506 with FTD - Remote Access IPsec? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777548#M1028703</link>
    <description>&lt;P&gt;I am considering re-flashing my ASA5506 from ASA to FTD. I am reading that there is a license required for Remote Access VPN operation, but all documents mention SSL (or "Anyconnect"). Right now using the "traditional" ASA OS, my ASA has no problem running an IKE-based IPsec Remote Access VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does an ASA with FTD support Remote Access VPN via IPsec? If I upgrade to FTD, will I have to purchase a new license just to use this feature I'm already using? The documentation doesn't mention it, but I would find it exceptionally hard to believe it's not available.....&lt;/P&gt;
&lt;H2 class="board-title"&gt;&lt;A class="lia-link-navigation lia-message-unread" href="https://community.cisco.com/t5/firepower/bd-p/discussions-firepower" target="_blank"&gt;FirePOWER&lt;/A&gt;&lt;/H2&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:39:03 GMT</pubDate>
    <dc:creator>train_wreck</dc:creator>
    <dc:date>2020-02-21T16:39:03Z</dc:date>
    <item>
      <title>ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777548#M1028703</link>
      <description>&lt;P&gt;I am considering re-flashing my ASA5506 from ASA to FTD. I am reading that there is a license required for Remote Access VPN operation, but all documents mention SSL (or "Anyconnect"). Right now using the "traditional" ASA OS, my ASA has no problem running an IKE-based IPsec Remote Access VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does an ASA with FTD support Remote Access VPN via IPsec? If I upgrade to FTD, will I have to purchase a new license just to use this feature I'm already using? The documentation doesn't mention it, but I would find it exceptionally hard to believe it's not available.....&lt;/P&gt;
&lt;H2 class="board-title"&gt;&lt;A class="lia-link-navigation lia-message-unread" href="https://community.cisco.com/t5/firepower/bd-p/discussions-firepower" target="_blank"&gt;FirePOWER&lt;/A&gt;&lt;/H2&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777548#M1028703</guid>
      <dc:creator>train_wreck</dc:creator>
      <dc:date>2020-02-21T16:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777552#M1028704</link>
      <description>Hi,&lt;BR /&gt;What is the current license in ASA.&lt;BR /&gt;FTD supports remote access VPN not the traditional client VPN.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Abheesh</description>
      <pubDate>Fri, 11 Jan 2019 08:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777552#M1028704</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-01-11T08:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777553#M1028705</link>
      <description>&lt;P&gt;&lt;EM&gt;The Running Activation Key feature: 2 security contexts exceed the limit on the platform, reduced to 0 security contexts.&lt;BR /&gt;&lt;BR /&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Maximum VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Encryption-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Encryption-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Carrier&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 12&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total TLS Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Cluster&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;&lt;BR /&gt;This platform has a Base license.&lt;BR /&gt;&lt;BR /&gt;The flash permanent activation key is the SAME as the running permanent key.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do you mean when you say "FTD supports remote access VPN not the traditional client VPN."..... this is unclear.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 09:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777553#M1028705</guid>
      <dc:creator>train_wreck</dc:creator>
      <dc:date>2019-01-11T09:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777578#M1028706</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Your current license cannot be used in FTD. By default you can use 2 anyconnect license&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As FTD required Smart license you need to register FTD with cisco smart license portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 09:45:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777578#M1028706</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-01-11T09:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777579#M1028707</link>
      <description>&lt;P&gt;*sigh* I'm not trying to use AnyConnect, I'm trying to use IPsec.....&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 09:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777579#M1028707</guid>
      <dc:creator>train_wreck</dc:creator>
      <dc:date>2019-01-11T09:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777583#M1028708</link>
      <description>IPsec is the protocol you are using. For connecting you should use anyconnect or site to site VPN.&lt;BR /&gt;Are you using site to site VPN</description>
      <pubDate>Fri, 11 Jan 2019 09:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777583#M1028708</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-01-11T09:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777586#M1028709</link>
      <description>&lt;P&gt;No, I am using the built-in IPsec client that comes with many devices/OSes (Android, iOS, OSX, Linux, etc) to connect Remote-Access style to my ASA. I would specifically like to avoid using AnyConnect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I'm understanding you correctly, you are saying that FTD will not support me using those built-in clients to connect to a Remote Access VPN - AnyConnect is the only option?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 09:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3777586#M1028709</guid>
      <dc:creator>train_wreck</dc:creator>
      <dc:date>2019-01-11T09:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5506 with FTD - Remote Access IPsec?</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3779394#M1028710</link>
      <description>&lt;P style="text-align: left;"&gt;You can use IPSec IKEv2 in FTD, but not IPSec IKEv1.&amp;nbsp; More information here:&lt;/P&gt;
&lt;P style="text-align: left;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: left;"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/firepower_threat_defense_remote_access_vpns.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/firepower_threat_defense_remote_access_vpns.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jan 2019 17:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-with-ftd-remote-access-ipsec/m-p/3779394#M1028710</guid>
      <dc:creator>Dan Eyster</dc:creator>
      <dc:date>2019-01-14T17:34:42Z</dc:date>
    </item>
  </channel>
</rss>

