<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FirePower Routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632552#M1090962</link>
    <description>&lt;P&gt;I don't see anything in the logs on firepower or Anyconnect about failed connections. I added the VLan address to same ACL that connects Vlan 1 to VPN still no connection.&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jun 2022 18:16:28 GMT</pubDate>
    <dc:creator>Shultz777</dc:creator>
    <dc:date>2022-06-15T18:16:28Z</dc:date>
    <item>
      <title>FirePower Routing</title>
      <link>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632513#M1090956</link>
      <description>&lt;P&gt;I have a lab were I am trying to get VPN AnyConnect traffic to access a server on vlan 10 of the inside network. But it wont reach the server, I can access everything on Vlan 1. The server can ping and traceroute to the VPN client, VPN client cannot ping and tracert fails at first hop.&lt;/P&gt;&lt;P&gt;I have sub interface on Firepower for VLAN's on inside interface from what I understand that creates a trunk port for Firepower devices.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have Nat rules in place and added Vlan address to ACL for VPN traffic.&lt;/P&gt;&lt;P&gt;IP schema:&lt;/P&gt;&lt;P&gt;VPN - 10.10.101.0/24 (Vlan 1 can access / Vlan 10 can reach)&lt;/P&gt;&lt;P&gt;VLAN10 - 192.168.10.0/24 (All Vlans can reach on internal network, VPN cannot reach)&lt;/P&gt;&lt;P&gt;VLAN1 - 192.168.1.0/24 (VPN can access both ways)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure what I am missing??&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 17:15:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632513#M1090956</guid>
      <dc:creator>Shultz777</dc:creator>
      <dc:date>2022-06-15T17:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower Routing</title>
      <link>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632514#M1090957</link>
      <description>&lt;P&gt;wht you see in the Logs, when the VPN user try to access server, what you see in the Logs ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just thinking, you may not have ACL in place from VPN IP address to Server IP (this just guess)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 17:17:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632514#M1090957</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-06-15T17:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower Routing</title>
      <link>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632516#M1090959</link>
      <description>&lt;P&gt;In fw you need&amp;nbsp;&lt;/P&gt;&lt;P&gt;Static route toward the interface connect to vlan 10&lt;/P&gt;&lt;P&gt;In other side you need static route of anyconnect pool to interface of FW&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 17:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632516#M1090959</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-15T17:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower Routing</title>
      <link>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632535#M1090960</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Have you created nonat rules in firepower for vlan 10 to reach the vpn pool&lt;BR /&gt;without natting.? You need to create twice nat to ensure source and&lt;BR /&gt;destination are not changed with connecting from vpn to vlan 10 (don't use&lt;BR /&gt;no-proxy or routing options)&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Wed, 15 Jun 2022 18:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632535#M1090960</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2022-06-15T18:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower Routing</title>
      <link>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632552#M1090962</link>
      <description>&lt;P&gt;I don't see anything in the logs on firepower or Anyconnect about failed connections. I added the VLan address to same ACL that connects Vlan 1 to VPN still no connection.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 18:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-routing/m-p/4632552#M1090962</guid>
      <dc:creator>Shultz777</dc:creator>
      <dc:date>2022-06-15T18:16:28Z</dc:date>
    </item>
  </channel>
</rss>

