<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC/FTD Site to Site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402497#M1080752</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Seems like the tunnel is pending. With a VPN and packet-tracer you need to run the same command twice, once to establish the tunnel and the&amp;nbsp; second to determine whether it is working as expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Provide the full output of packet-tracer if possible&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check "show crypto ipsec sa" to determine whether a tunnel is established and if the encaps|decaps counters are increasing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 May 2021 09:06:55 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2021-05-13T09:06:55Z</dc:date>
    <item>
      <title>FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402404#M1080738</link>
      <description>&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;We have a Site to Site VPN configured between our FTD and a 3rd Party.&lt;/P&gt;&lt;P&gt;1. I have a rule allowing inbound from Outside from 3rd party peer to internal servers whcih should bring up the VPN between the peer addresses,&lt;/P&gt;&lt;P&gt;2. Do I need a rule from inside to outside also,&amp;nbsp; We never did have on ASA because its the 3rd party that initiates and we respond.&lt;/P&gt;&lt;P&gt;3. Also the sysopt option is checked so do i even need and ACP rule.&lt;/P&gt;&lt;P&gt;4. Do I need a NAT Exemption rule,&amp;nbsp; I cant see that I would because this traffic dosent match an existing NAT rule.?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 06:49:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402404#M1080738</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-05-13T06:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402432#M1080739</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the remote peer is initating the traffic then you don't explicitly need to permit the return traffic (inside to outside).&lt;/P&gt;
&lt;P&gt;As default, yes you would need an ACP rule.&lt;/P&gt;
&lt;P&gt;Normally you would need a NAT exemption rule for Site-to-Site VPN traffic, you would usually a Dynamic PAT rule for internet access from inside to outside which the return traffic could match and be unintentially translated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Run packet-tracer to simulate and confirm.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 07:16:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402432#M1080739</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-13T07:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402495#M1080751</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;I run a packet-tracer&amp;nbsp;&lt;/P&gt;&lt;P&gt;selecting outside interface and selecting one of 3rd party servers as source and our server as destination tese two are part of the protected networks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it gets dropped reason (tunnel pending)/snp_sp_action_cb:1748&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the acl in the trace says allow&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 09:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402495#M1080751</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-05-13T09:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402497#M1080752</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Seems like the tunnel is pending. With a VPN and packet-tracer you need to run the same command twice, once to establish the tunnel and the&amp;nbsp; second to determine whether it is working as expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Provide the full output of packet-tracer if possible&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check "show crypto ipsec sa" to determine whether a tunnel is established and if the encaps|decaps counters are increasing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 09:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402497#M1080752</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-13T09:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402501#M1080753</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I ran it again and still same result&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Implicit Rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;MAC Access list&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Subtype: Resolve Egress Interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;found next-hop x.x.x.x using egress ifc&amp;nbsp; _INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;access-group CSM_FW_ACL_ global&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;access-list CSM_FW_ACL_ advanced permit ip ifc _OUTSIDE object-group BABOK-VPN-REMOTE-HOSTS ifc _INSIDE object-group BABOK-VPN-LOCAL-HOSTS rule-id 268438961&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;access-list CSM_FW_ACL_ remark rule-id 268438961: ACCESS POLICY: -NCHS-POLICY - Mandatory&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;access-list CSM_FW_ACL_ remark rule-id 268438961: L7 RULE: BABOK_VPN_Rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;object-group network BABOK-VPN-REMOTE-HOSTS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;network-object object BABOK-Terminal-Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;network-object object BABOK-Solarwinds-Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;object-group network BABOK-VPN-LOCAL-HOSTS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;network-object object FDH-STG&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;network-object object FDH-MON1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Phase: 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Type: CONN-SETTINGS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;class-map class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;match any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; set connection advanced-options UM_STATIC_TCP_MAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Subtype: per-session&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Phase: 6&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Phase: 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Type: VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Subtype: ipsec-tunnel-flow&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result: DROP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;input-interface: _OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;output-interface: _INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Action: drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000000aab0bc20ec flow (tunnel-pending)/snp_sp_action_cb:1748&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2593365201MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 09:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402501#M1080753</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-05-13T09:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402503#M1080754</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's dropped in Phase 7 VPN, so possibly isn't an ACP issue.&lt;/P&gt;
&lt;P&gt;Has the tunnel even been established? Provide the output of "show crypto ipsec sa"&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 09:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402503#M1080754</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-13T09:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402505#M1080756</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are no ipsec sas for peer x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;never is&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 09:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402505#M1080756</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-05-13T09:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402506#M1080757</link>
      <description>&lt;P&gt;I can ping the peer but the tunnel never comes up.?&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 09:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402506#M1080757</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-05-13T09:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402507#M1080758</link>
      <description>&lt;P&gt;Ok so I assume this VPN has never worked then? I assumed by the initial post you just wanted confirmation on the ACP and NAT configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You've probably got a VPN configuration issue between yourself and the 3rd party, you both need to double check your IKE and IPSec settings and the PSK.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Pinging the peer from the FTD itself won't bring up the tunnel,&amp;nbsp; only interesting traffic (as defined in the VPN topology) can establish a tunnel. As you are only permitting traffic from outside to inside, the peer will need to generate the traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Turn on ikev1 or ikev2 debugs (wheatever you are using), generate some traffic (as per the networks defined in the VPN topology) and provide the output for review.&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 09:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-site-to-site-vpn/m-p/4402507#M1080758</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-13T09:43:08Z</dc:date>
    </item>
  </channel>
</rss>

