<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Route Internet Through VPN - FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4108398#M1071372</link>
    <description>&lt;P&gt;Assuming the "normally routed" subnets also need to transit the VPN to reach the remote site, you would require Policy-based routing (PBR). Normal routing is based on the destination address. You need to add the source address in the criteria.&lt;/P&gt;
&lt;P&gt;Here's a decent guide that steps you through how to do it:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.slideshare.net/redouanemeddane/policybased-routing-using-flexconfig-firepower-threat-defense" target="_blank"&gt;https://www.slideshare.net/redouanemeddane/policybased-routing-using-flexconfig-firepower-threat-defense&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;(The Cisco configuration guide is a bit weak in this area.)&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jun 2020 01:37:39 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-06-24T01:37:39Z</dc:date>
    <item>
      <title>Route Internet Through VPN - FTD</title>
      <link>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4108396#M1071371</link>
      <description>&lt;P&gt;What needs to happen to route all internet traffic through a site to site tunnel with the exception of a couple of subnets that should route normally? This is utilizing the Firepower 4100 platform.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 01:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4108396#M1071371</guid>
      <dc:creator>Scott_22</dc:creator>
      <dc:date>2020-06-24T01:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Route Internet Through VPN - FTD</title>
      <link>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4108398#M1071372</link>
      <description>&lt;P&gt;Assuming the "normally routed" subnets also need to transit the VPN to reach the remote site, you would require Policy-based routing (PBR). Normal routing is based on the destination address. You need to add the source address in the criteria.&lt;/P&gt;
&lt;P&gt;Here's a decent guide that steps you through how to do it:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.slideshare.net/redouanemeddane/policybased-routing-using-flexconfig-firepower-threat-defense" target="_blank"&gt;https://www.slideshare.net/redouanemeddane/policybased-routing-using-flexconfig-firepower-threat-defense&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;(The Cisco configuration guide is a bit weak in this area.)&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 01:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4108398#M1071372</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-24T01:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: Route Internet Through VPN - FTD</title>
      <link>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4108679#M1071394</link>
      <description>&lt;P&gt;This is perfect! If I'm using this for VPN traffic, is the route-map still assigned to the outside interface used to establish the tunnel? Also, is a 2nd rule needed to route all other traffic normally, or does a single rule suffice?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 12:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4108679#M1071394</guid>
      <dc:creator>Scott_22</dc:creator>
      <dc:date>2020-06-24T12:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Route Internet Through VPN - FTD</title>
      <link>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4109384#M1071424</link>
      <description>&lt;P&gt;After discussing this with TAC, it was determined that the best method is as follows:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create an extended ACL with the following two entries:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Deny - Denies traffic that should be routed from the source to destination traffic through normal means&lt;/P&gt;&lt;P&gt;2. Allow - Allows all traffic that is not denied access to traverse the tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This ACL is then applied to the Site to Site tunnel - think crypto map ACL in ASA code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are working to deploy this configuration now and I will post my results.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 16:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4109384#M1071424</guid>
      <dc:creator>Scott_22</dc:creator>
      <dc:date>2020-06-25T16:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: Route Internet Through VPN - FTD</title>
      <link>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4125696#M1072320</link>
      <description>&lt;P&gt;how you can make this ACL on FTD&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jul 2020 13:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-internet-through-vpn-ftd/m-p/4125696#M1072320</guid>
      <dc:creator>mohamed_farok</dc:creator>
      <dc:date>2020-07-26T13:08:40Z</dc:date>
    </item>
  </channel>
</rss>

