<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115834#M1071867</link>
    <description>Hi Marvin / All,&lt;BR /&gt;&lt;BR /&gt;Now new observation, When have selected other interface (data interface) for polling the FTD despite of diagnostic interface and also changed the NMS poller servers which may have best reachability from FTD's identified Data Interface.&lt;BR /&gt;&lt;BR /&gt;Have configured SNMP parameters for new pollers from FMC and pushed properly also. But same are not visible in FTD's CLI, can able to see only SNMP configurations of old pollers&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 09 Jul 2020 08:43:10 GMT</pubDate>
    <dc:creator>netbeginner</dc:creator>
    <dc:date>2020-07-09T08:43:10Z</dc:date>
    <item>
      <title>FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4112471#M1071649</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have to monitor the status of IPSec tunnels created FPR-2100 (managed by FMC) by Network Monitoring System(NMS) .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FPR IOS :&amp;nbsp;&lt;SPAN&gt;6.4.0.7 (Build 53).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Requirement is to monitor all IPSec tunnels status through NMS ....if any of the tunnel goes down...NMS should trigger a event or alert , followed by generation of Auto-Ticket from ticketing tool. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We tried all possible options , but can't able to find the solution even workaround also. If anyone have gone through such problem please share how it was sorted-out.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Rgds&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;***&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 14:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4112471#M1071649</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-02T14:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4112851#M1071663</link>
      <description>&lt;P&gt;I'm doing this successfully with an FTD device and SolarWinds NPM. In my case it's running on an ASA 5516-X hardware appliance but the operation is the same since they both run the Firepower Threat Defense image.&lt;/P&gt;
&lt;P&gt;I monitor the data interface with SNMP and use the "enable cli polling" option in SolarWinds (under "edit node") to get VPN statistics. Tell it to use the ASA device template so it knows the "show" command to use for VPN stats.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SolarWinds cli polling.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78205i7683054EC4D2C882/image-size/large?v=v2&amp;amp;px=999" role="button" title="SolarWinds cli polling.PNG" alt="SolarWinds cli polling.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SolarWinds Monitoring FTD S2S VPN.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78206iB6F91BC9686126E7/image-size/large?v=v2&amp;amp;px=999" role="button" title="SolarWinds Monitoring FTD S2S VPN.PNG" alt="SolarWinds Monitoring FTD S2S VPN.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jul 2020 08:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4112851#M1071663</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-03T08:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4114604#M1071789</link>
      <description>&lt;P&gt;Thanks Marvin....!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are also working in same direction....But stuck with CLI credentials (not able to do cli on FTD with diagnostic interface) , Point to highlight here is that "we are polling FTD with Diagnostic Interfaces and not sure whether this support SSH access or not".?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using any OID or simply configured or enabled "CLI polling" that's it....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If using any OID, pls share the same (FTD compatible).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;***&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 13:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4114604#M1071789</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-07T13:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4114732#M1071796</link>
      <description>&lt;P&gt;The instance I was polling was using the cli polling with a data interface and the ASA template. I believe under the covers SolarWinds is parsing a show command or two rather than using SNMP for this particular monitoring feature.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 17:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4114732#M1071796</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-07T17:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115087#M1071820</link>
      <description>&lt;P&gt;Ok, Meanwhile i also checked - Diagnostic(mgmt) interface won't support SSH. Therefore have to check with some data interface as you also mentioned.&lt;BR /&gt;&lt;BR /&gt;Could you please explore what you mean about ASA template. did you referring OIDs (for ASA).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 06:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115087#M1071820</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-08T06:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115138#M1071822</link>
      <description>&lt;P&gt;When I refer to device template I am talking about the one I highlighted in my screenshot earlier. See my reply of &lt;SPAN class="DateTime"&gt;&lt;SPAN class="local-date"&gt;07-03-2020&lt;/SPAN&gt; &lt;SPAN class="local-time"&gt;04:30 PM.&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 08:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115138#M1071822</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-08T08:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115286#M1071837</link>
      <description>Ok GoT it..!!</description>
      <pubDate>Wed, 08 Jul 2020 12:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115286#M1071837</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-08T12:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115834#M1071867</link>
      <description>Hi Marvin / All,&lt;BR /&gt;&lt;BR /&gt;Now new observation, When have selected other interface (data interface) for polling the FTD despite of diagnostic interface and also changed the NMS poller servers which may have best reachability from FTD's identified Data Interface.&lt;BR /&gt;&lt;BR /&gt;Have configured SNMP parameters for new pollers from FMC and pushed properly also. But same are not visible in FTD's CLI, can able to see only SNMP configurations of old pollers&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Jul 2020 08:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115834#M1071867</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-09T08:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115915#M1071873</link>
      <description>&lt;P&gt;Sorry but I don't understand your latest question.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 11:35:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4115915#M1071873</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-09T11:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4116038#M1071884</link>
      <description>Hi Marvin,&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Lemme try to explain again......&lt;BR /&gt;&lt;BR /&gt;We have selected a new Data Interface (other then diagnostic interface) of Cisco FTD for polling the same from NMS and............ additionally also changed the NMS servers(eg NMS server Changed from IP-172.16.10.1 to IP-10.10.10.100) which is having the best reachability from FTD's new identified Data Interface.&lt;BR /&gt;&lt;BR /&gt;From FMC.... SNMP configuration for new NMS (10.10.10.100) for Cisco FTD has been executed and pushed properly also. But same are not visible in FTD's CLI, can able to see SNMP configurations of old NMS server only which was 172.16.10.1, new SNMP configuration for 10.10.10.100 NMS is nowhere.</description>
      <pubDate>Thu, 09 Jul 2020 14:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4116038#M1071884</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-09T14:49:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4116087#M1071889</link>
      <description>&lt;P&gt;So you are saying the changes which were deployed (successfully according to FMC) are not appearing in the running config?&lt;/P&gt;
&lt;P&gt;There have been some bugs with this behavior. What version of Firepower are you running?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 15:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4116087#M1071889</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-09T15:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4116128#M1071892</link>
      <description>That' Correct, Marvin!&lt;BR /&gt;&lt;BR /&gt;Firepower : 6.4.0.7 (Build 53).</description>
      <pubDate>Thu, 09 Jul 2020 16:56:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4116128#M1071892</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-09T16:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4127336#M1072415</link>
      <description>&lt;P&gt;Hi Marvin,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to share that we have successfully polled FTD device with Data Interface now.....Have configured CLI credentials as required for VPN/IPSec tunnel status monitoring, template also selected as "Cisco Adaptive Security Appliance".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But still not getting a option (at upper left site) for getting Site-to-Site VPN view . I am suspecting it could be due to privilege limitation (probably...but not sure) on given CLI credential.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What level of privilege did you configured for CLI credential which is in use for VPN status monitoring on NMS console in your case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or , If this require some OIDs snmp walk and configuration also. If yes, requesting if you can share those OIDs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pl also note that our FPR version is -&amp;nbsp;&lt;SPAN&gt;FPR IOS :&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;6.4.0.7 (Build 53) and is managed by FMC. Hope limitation is not due to version.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may add , if feel i am missing anything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;***&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 11:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4127336#M1072415</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-07-30T11:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135068#M1072946</link>
      <description>&lt;P&gt;Hello All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have polled below 04 OIDs for getting IPSec Tunnel Status from Cisco FTD.&lt;/P&gt;&lt;P&gt;1.3.6.1.4.1.9.9.171.1.2.1.1. cikeGlobalActiveTunnels (Currently active phase-1)&lt;BR /&gt;1.3.6.1.4.1.9.9.171.1.2.1.2. cikeGlobalPreviousTunnels&amp;nbsp;&amp;nbsp;(Previously active phase-1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.3.6.1.4.1.9.9.171.1.3.1.1. cipSecGlobalActiveTunnels&amp;nbsp;&amp;nbsp;(Currently active phase-2)&lt;BR /&gt;1.3.6.1.4.1.9.9.171.1.3.1.2. cipSecGlobalPreviousTunnels&amp;nbsp;&amp;nbsp;(Previously active phase-2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;getting the counts against each one. But they are not exact as per actual scenario.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also like to understand, out of above 04 OIDs which is/are the most relevant one on which rule /alerts can be configure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As per my understanding, should be both OIDs for Phase-1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;opinion welcome.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 08:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135068#M1072946</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-08-13T08:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135134#M1072949</link>
      <description>The 1st set of OID are related to phase-1 SAs. These are equivalent to the&lt;BR /&gt;number of SAs in the output 'show crypto isakmp sa' or 'show crypto ikev2&lt;BR /&gt;sa'&lt;BR /&gt;&lt;BR /&gt;The 2nd set of OIDs are related to phase-2 SAs. These are equivalent to the&lt;BR /&gt;number of SAs in 'show crypto ipsec sa'&lt;BR /&gt;&lt;BR /&gt;You might have 1st-OIDs more than 2nd-OIDs if you have tunnels completing&lt;BR /&gt;phase-1 but failing phase-2&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Aug 2020 09:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135134#M1072949</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-08-13T09:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135229#M1072958</link>
      <description>&lt;P&gt;Hi Mohammed,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In our case 2nd OIDs counts are huge as compare to 1st OIDs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Almost 22 times higher.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 11:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135229#M1072958</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-08-13T11:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135236#M1072959</link>
      <description>&lt;P&gt;That's not unusual. For instance 5 local subnets with active traffic to 5 remote subnets could form as many as 25 IPsec SAs (depending on how the subnet masks are defined). That's all in one ISAKMP SA.&lt;/P&gt;
&lt;P&gt;The common interpretation of "VPN tunnel" would be the active ISAKMP SAs.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 12:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135236#M1072959</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-13T12:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135286#M1072961</link>
      <description>&lt;P&gt;Hi Marvin,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks Marvin, I do understand what you mentioning....But probably you aware that here desired outcome of all this queries and exercise is to monitor the Active IPSec Tunnels for Ticketing purpose (in case any of them goes down, we should have incident on tool).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But with current circumstances and parameters- what we have on NMS after polling phase-1 and phase-2 OIDs ....does'nt look that i am even close to solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have total 45 approx IPSec tunnels available. But getting IPSec phase-2 count&amp;nbsp; as 110 approx. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; which'll not helps to monitor the active tunnels on NMS.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 13:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135286#M1072961</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-08-13T13:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135338#M1072965</link>
      <description>&lt;P&gt;Monitor the ISAKMP SAs for general awareness of active IPsec VPNs. The IPSec SAs are generally not interesting unless you are engaged in active troubleshooting.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 14:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135338#M1072965</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-13T14:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTD (Cisco FPR -2100) - IPSec Tunnels Monitoring</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135342#M1072967</link>
      <description>&lt;P&gt;OK...&lt;/P&gt;&lt;P&gt;But for&amp;nbsp;&lt;SPAN&gt;ISAKMP SAs&amp;nbsp;(phase-1) we can see only 5 counts on NMS (via OID) out of 45 configured tunnels. which is again a wrong figure and does'nt a correct information.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 14:51:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cisco-fpr-2100-ipsec-tunnels-monitoring/m-p/4135342#M1072967</guid>
      <dc:creator>netbeginner</dc:creator>
      <dc:date>2020-08-13T14:51:28Z</dc:date>
    </item>
  </channel>
</rss>

