<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow remote network through firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185813#M1075976</link>
    <description>&lt;P&gt;The screenshot above is from OfficeB or OfficeA?&lt;/P&gt;</description>
    <pubDate>Thu, 19 Nov 2020 12:04:07 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-11-19T12:04:07Z</dc:date>
    <item>
      <title>Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185744#M1075960</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I currently have two offices/networks connected to one another via Cisco Meraki Site to Site VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Office A has network address 192.168.1.0/24 and Office B has network address 192.168.2.0/24. Office B also has a Cisco FPR1120 firewall managed through FDM with inside address 192.168.3.0/24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From Office A I can ping and get to all devices through the VPN on the outside interface of the firewall (192.168.2.0/24). Similarly from Office B I can get to all devices on the Office A network both from the outside and inside of the firewall (from 192.168.2.0/24 and 192.168.3.0/24 respectively)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sitting at Office A I can’t however ping / get to the inside network of the firewall at 192.168.3.0/24. I’m sure I need to set up a firewall rule of some sort to allow traffic from Office A network 192.168.1.0/24 to get to the inside firewall network 192.168.3.0/24 but am struggling to get this setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please can you assist? Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 09:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185744#M1075960</guid>
      <dc:creator>Smitster</dc:creator>
      <dc:date>2020-11-19T09:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185749#M1075964</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1097106"&gt;@Smitster&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It could be a NAT problem, do you have a NAT exemption rule setup to ensure traffic between those networks is not unintentially natted?&lt;/P&gt;
&lt;P&gt;What rules do you have defined in your ACP? Please provide screenshots of your ACP&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 10:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185749#M1075964</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-19T10:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185757#M1075966</link>
      <description>&lt;P&gt;These are the current ACP rules:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="acp.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88816i0635349E00AF5920/image-size/large?v=v2&amp;amp;px=999" role="button" title="acp.PNG" alt="acp.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;These are the current NAT rules&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="nat.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88817i5916BE4D64C2A47A/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat.PNG" alt="nat.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;With regards to the ACP "ADServerOutIn" rule and "VM1ServerNAT" rule there is currently a Windows Server sitting behind the firewall at Office B - object "EServerVM1" and I was looking at trying to translate this from inside interface ip to outside interface ip - 192.168.3.2 to 192.168.2.2 as a way to get access to it from the OfficeA network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 10:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185757#M1075966</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T10:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185766#M1075968</link>
      <description>&lt;P&gt;You would need another ACP rule from OfficeANetwork to OfficeBNetwork.&lt;/P&gt;
&lt;P&gt;You'll need a NAT exemption rule between those networks, to ensure traffic between those networks is not natted.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 11:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185766#M1075968</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-19T11:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185781#M1075970</link>
      <description>&lt;P&gt;I've updated the rules as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ACP:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="acp.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88820i0370189534F8D5AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="acp.PNG" alt="acp.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="nat.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88821i147C3DC7B7249FE4/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat.PNG" alt="nat.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But still having the same issue. Have I missed something?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 11:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185781#M1075970</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T11:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185789#M1075971</link>
      <description>&lt;P&gt;All traffic will match the first nat rule nad never match your new nat rule.&lt;/P&gt;
&lt;P&gt;Modify or Delete/recreate the first nat rule and ensure it is below the NAT exemption rule (OfficeA-B).&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 11:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185789#M1075971</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-19T11:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185802#M1075972</link>
      <description>&lt;P&gt;I've updated the order as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="nat2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88822i011A9EF2A01C2653/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat2.PNG" alt="nat2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately this appears to have resulted in Office B network no longer being able to ping Office A. Office A can ping Office B on the outside network 192.168.2.0/24 but still not on the inside.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 11:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185802#M1075972</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T11:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185813#M1075976</link>
      <description>&lt;P&gt;The screenshot above is from OfficeB or OfficeA?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185813#M1075976</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-19T12:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185814#M1075977</link>
      <description>&lt;P&gt;Office B, there's just a Cisco Meraki at Office A (no FPR Firewall)&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185814#M1075977</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T12:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185816#M1075978</link>
      <description>&lt;P&gt;To confirm - it goes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Office A 192.168.1.0/24 --&amp;gt; Cisco Meraki --Auto VPN Tunnel -- Cisco Meraki --&amp;gt; Office B Outside 192.168.2.0/24 --&amp;gt; FPR1120 --&amp;gt; Office B Inside 192.168.3.0/24&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185816#M1075978</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T12:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185817#M1075979</link>
      <description>&lt;P&gt;Ok, so traffic is now sourced from the original IP address (OfficeBNetwork) rather the outside interface of OfficeB's FTD. So check the other end to confirm if traffic is expected from OfficeBNetwork or the outside interface of Office B's FTD.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185817#M1075979</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-19T12:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185822#M1075980</link>
      <description>&lt;P&gt;There's just a Cisco Meraki sitting at Office A, and no FTD. The Cisco Meraki Cloud is set up with an Auto VPN with Office B on 192.168.2.0/24 network, so this may be causing it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to forward the Server sitting on the inside of Office B Firewall at 192.168.3.2 to be reachable on the Outside interface at 192.168.2.2?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185822#M1075980</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T12:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185826#M1075981</link>
      <description>&lt;P&gt;I've set this up to try and forward the server sitting at 192.168.3.2 on the inside interface to 192.168.2.2 on the outside interface:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="nat.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88825iD81F2FAC7C8DB939/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat.PNG" alt="nat.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;ACP&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="acp.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88826i162258FCA13FFD40/image-size/large?v=v2&amp;amp;px=999" role="button" title="acp.PNG" alt="acp.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trying to ping the server using 192.168.2.2 but no result&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:33:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185826#M1075981</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T12:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185832#M1075983</link>
      <description>&lt;P&gt;Does the VPN crypto ACL that defines interesting traffic include the 192.168.3.0/24 network?&lt;/P&gt;
&lt;P&gt;Or are you attempting to use NAT because it's not?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your Auto NAT rule (rule #2) in the above screenshot will never be matched, because traffic will be matched by the first NAT rule.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185832#M1075983</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-19T12:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote network through firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185859#M1075984</link>
      <description>&lt;P&gt;Just to confirm it's now up and running - required the setting of a static route on the Cisco Meraki that pointed all traffic on 192.168.3.0/24 subnet to the FDM IP.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 13:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-remote-network-through-firewall/m-p/4185859#M1075984</guid>
      <dc:creator>Smitster1</dc:creator>
      <dc:date>2020-11-19T13:45:15Z</dc:date>
    </item>
  </channel>
</rss>

