<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuring site to site VPN from FTD to Azure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3348721#M1031332</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am familiar with ASA but not with FTD. I have setup a policy-based (IKEv1) tunnel with Azure but now I want to set up a Route-Based tunnel with Azure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By mistake or luck, I ordered an ASA-5506-FTD-K9 firewall. I wondered if somebody has managed to create a S2S tunnel between this device and Azure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, regular tunnels are policy based and easy to configure. Route based, require a custom config on the Azure side. It requires to enable Traffic Selectors:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-pscommand"&gt;Set-AzureRmVirtualNetworkGatewayConnection&lt;/SPAN&gt;&lt;SPAN class="hljs-parameter"&gt; -VirtualNetworkGatewayConnection&lt;/SPAN&gt; &lt;SPAN class="hljs-variable"&gt;$connection6&lt;/SPAN&gt;&lt;SPAN class="hljs-parameter"&gt; -UsePolicyBasedTrafficSelectors&lt;/SPAN&gt; &lt;SPAN class="hljs-literal"&gt;$True&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;I am using the ASA configuration as guidance from the URL:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-3rdparty-device-config-cisco-asa" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-3rdparty-device-config-cisco-asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;But I am wondering if you have managed to make this work for your company. Any help could be appreciated.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:30:56 GMT</pubDate>
    <dc:creator>raulgomez101</dc:creator>
    <dc:date>2020-02-21T15:30:56Z</dc:date>
    <item>
      <title>Configuring site to site VPN from FTD to Azure</title>
      <link>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3348721#M1031332</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am familiar with ASA but not with FTD. I have setup a policy-based (IKEv1) tunnel with Azure but now I want to set up a Route-Based tunnel with Azure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By mistake or luck, I ordered an ASA-5506-FTD-K9 firewall. I wondered if somebody has managed to create a S2S tunnel between this device and Azure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, regular tunnels are policy based and easy to configure. Route based, require a custom config on the Azure side. It requires to enable Traffic Selectors:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-pscommand"&gt;Set-AzureRmVirtualNetworkGatewayConnection&lt;/SPAN&gt;&lt;SPAN class="hljs-parameter"&gt; -VirtualNetworkGatewayConnection&lt;/SPAN&gt; &lt;SPAN class="hljs-variable"&gt;$connection6&lt;/SPAN&gt;&lt;SPAN class="hljs-parameter"&gt; -UsePolicyBasedTrafficSelectors&lt;/SPAN&gt; &lt;SPAN class="hljs-literal"&gt;$True&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;I am using the ASA configuration as guidance from the URL:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-3rdparty-device-config-cisco-asa" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-3rdparty-device-config-cisco-asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;But I am wondering if you have managed to make this work for your company. Any help could be appreciated.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="hljs-literal"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3348721#M1031332</guid>
      <dc:creator>raulgomez101</dc:creator>
      <dc:date>2020-02-21T15:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring site to site VPN from FTD to Azure</title>
      <link>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3348914#M1031333</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;On your asa and/or FTD it's standard L2L vpn not route base based on documentation.&lt;BR /&gt;I never did with azure but lot of vpn with AWS. They're working good. With azure is the same.&lt;BR /&gt;&lt;BR /&gt;The configuration on FMC is straight. With FDM (local ftd management), it's straight but did only once. All my customers are taking FMC (cheap for 2 FTD) because you have limitations with FDM.&lt;BR /&gt;&lt;BR /&gt;You have a wizard that you can follow and you'll be able to create your ikev2 policies during wizard.&lt;BR /&gt;Or you can create it manually going to object management and create your ikev2 policies.</description>
      <pubDate>Thu, 15 Mar 2018 04:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3348914#M1031333</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-15T04:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring site to site VPN from FTD to Azure</title>
      <link>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3350004#M1031334</link>
      <description>&lt;P&gt;Thank you Francesco. I opened a TAC Case and the Engineer told me the trick is in the Azure part. If I set the TrafficSelectors option I could use policy-based configurations with a route-based gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will do a couple of test and I will update this discussion with my results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for replying.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;R&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 16:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3350004#M1031334</guid>
      <dc:creator>raulgomez101</dc:creator>
      <dc:date>2018-03-16T16:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring site to site VPN from FTD to Azure</title>
      <link>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3350346#M1031335</link>
      <description>Ok thanks</description>
      <pubDate>Sun, 18 Mar 2018 04:06:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3350346#M1031335</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-18T04:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring site to site VPN from FTD to Azure</title>
      <link>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3382030#M1031336</link>
      <description>&lt;P&gt;Just wanted to provide an update.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Similar to Francesco, I created a IKEv1 tunnel to one of my branch offices but not directly to Azure. I think it will be possible. I don't see why not. The only caveats is that you need to customize your local gateway in Azure with powershell scripts.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To customize the local gateway, you need to use the&amp;nbsp;UsePolicyBasedTrafficSelectors $True.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FMC was out of the question for me because the Firewall is located in the branch office, and it's not a good idea to manage your Firewall using the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I find this FTD firewalls lacking of several features. I hit a bug and couldn't even manage the Firewall using the inside interface via the VPN Tunnel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But yes, it is possible to create an IKEv2 Tunnel to Azure using the FTD and customizing the Azure gateway via powershell.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RG&lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 18:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3382030#M1031336</guid>
      <dc:creator>raulgomez101</dc:creator>
      <dc:date>2018-05-11T18:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring site to site VPN from FTD to Azure</title>
      <link>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3382077#M1031338</link>
      <description>Thanks for the update.&lt;BR /&gt;</description>
      <pubDate>Fri, 11 May 2018 20:31:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-site-to-site-vpn-from-ftd-to-azure/m-p/3382077#M1031338</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-11T20:31:32Z</dc:date>
    </item>
  </channel>
</rss>

