<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FPR-1010 - IPspoof in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4040858#M1067387</link>
    <description>&lt;P&gt;Im in the process of replacing 5505 and 5506 with FPR-1010. (code: 6.5.0.4).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When running IPsec between two subnets for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FPR-2130 subnet 10.0.0.0/23 &amp;lt;-------&amp;gt; 10.199.24.0/24 (FPR-1010 has IP .1 (BV1) and .2 (MNGT).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot access the unit itself (.1.2), all other IPs in the subnet is reachable. The error is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Deny IP spoof from (10.0.0.x) to 10.199.24.1 on the interface outside&lt;/PRE&gt;&lt;P&gt;Can anyone help me get around this ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Mar 2020 13:01:36 GMT</pubDate>
    <dc:creator>Jon Are Endrerud</dc:creator>
    <dc:date>2020-03-05T13:01:36Z</dc:date>
    <item>
      <title>FPR-1010 - IPspoof</title>
      <link>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4040858#M1067387</link>
      <description>&lt;P&gt;Im in the process of replacing 5505 and 5506 with FPR-1010. (code: 6.5.0.4).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When running IPsec between two subnets for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FPR-2130 subnet 10.0.0.0/23 &amp;lt;-------&amp;gt; 10.199.24.0/24 (FPR-1010 has IP .1 (BV1) and .2 (MNGT).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot access the unit itself (.1.2), all other IPs in the subnet is reachable. The error is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Deny IP spoof from (10.0.0.x) to 10.199.24.1 on the interface outside&lt;/PRE&gt;&lt;P&gt;Can anyone help me get around this ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 13:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4040858#M1067387</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2020-03-05T13:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: FPR-1010 - IPspoof</title>
      <link>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4040924#M1067393</link>
      <description>Is the 1010 in transparent mode?</description>
      <pubDate>Thu, 05 Mar 2020 14:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4040924#M1067393</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-05T14:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: FPR-1010 - IPspoof</title>
      <link>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4041707#M1067466</link>
      <description>&lt;P&gt;No routed mode.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 13:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4041707#M1067466</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2020-03-06T13:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: FPR-1010 - IPspoof</title>
      <link>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4042133#M1067496</link>
      <description>&lt;P class="lia-align-justify"&gt;Ah - so you are trying to reach the Firepower inside and management addresses from the remote end of the site-site VPN? That's generally not possible since the traffic needs to come from one of the inside networks. Otherwise the Firepower would be sending it's own replies through itself - which is roughly what the log message is telling you.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2020 10:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4042133#M1067496</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-07T10:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: FPR-1010 - IPspoof</title>
      <link>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4043274#M1067594</link>
      <description>&lt;P&gt;Used the MNGT gateway with defined gateway unique gw instead of data interface gateway. This gives access to SSH and HTTPS.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 12:07:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr-1010-ipspoof/m-p/4043274#M1067594</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2020-03-10T12:07:20Z</dc:date>
    </item>
  </channel>
</rss>

