<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site-to-Site tunnel from onprem firepower and firepower in Azure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665714#M1092488</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I am trying to setup a site-to-site tunnel to connect a physical onprem Cisco Firepower to a virtual Cisco Firepower in Azure. I have tried sooo much and cant get it to work. I have configure the interfaces with attaching a public ip address to the outside interface GigabitEthernet0/0. I've also tried some static routes. Do anyone have any experience with this&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_56_58-Window.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159466i9D2F447B45975BF6/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_56_58-Window.png" alt="2022-08-08 05_56_58-Window.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_59_11-Window.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159467iF50E987373BF4AB8/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_59_11-Window.png" alt="2022-08-08 05_59_11-Window.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_59_42-Window.png" style="width: 632px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159468i0CAFD50FB8F0914A/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_59_42-Window.png" alt="2022-08-08 05_59_42-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I can ping the internet from the Azure firewall&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_57_26-Window.png" style="width: 661px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159469i5AE8CF44CB9CD36C/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_57_26-Window.png" alt="2022-08-08 05_57_26-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 08 Aug 2022 13:02:06 GMT</pubDate>
    <dc:creator>isoto</dc:creator>
    <dc:date>2022-08-08T13:02:06Z</dc:date>
    <item>
      <title>Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665714#M1092488</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I am trying to setup a site-to-site tunnel to connect a physical onprem Cisco Firepower to a virtual Cisco Firepower in Azure. I have tried sooo much and cant get it to work. I have configure the interfaces with attaching a public ip address to the outside interface GigabitEthernet0/0. I've also tried some static routes. Do anyone have any experience with this&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_56_58-Window.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159466i9D2F447B45975BF6/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_56_58-Window.png" alt="2022-08-08 05_56_58-Window.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_59_11-Window.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159467iF50E987373BF4AB8/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_59_11-Window.png" alt="2022-08-08 05_59_11-Window.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_59_42-Window.png" style="width: 632px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159468i0CAFD50FB8F0914A/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_59_42-Window.png" alt="2022-08-08 05_59_42-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I can ping the internet from the Azure firewall&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 05_57_26-Window.png" style="width: 661px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159469i5AE8CF44CB9CD36C/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 05_57_26-Window.png" alt="2022-08-08 05_57_26-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 13:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665714#M1092488</guid>
      <dc:creator>isoto</dc:creator>
      <dc:date>2022-08-08T13:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665717#M1092489</link>
      <description>&lt;P&gt;Do you have reachability between FTD on prem to Azure FTD ?&lt;/P&gt;
&lt;P&gt;check below thread : enable debug and check.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn/azure-s2s-vpn-with-firepower-fmc-ftd/td-p/3353513" target="_blank"&gt;https://community.cisco.com/t5/vpn/azure-s2s-vpn-with-firepower-fmc-ftd/td-p/3353513&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 13:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665717#M1092489</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-08-08T13:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665725#M1092490</link>
      <description>&lt;P&gt;I have no reachability. The Azure firewall if pingable, but from what I can see traffic is not routed from the attached public IP address to the local address on the interface. The site-to-site configuration on both sides is setup identical with protocol and PSK, but no connection is established&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 13:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665725#M1092490</guid>
      <dc:creator>isoto</dc:creator>
      <dc:date>2022-08-08T13:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665729#M1092491</link>
      <description>&lt;P&gt;If I try to make a tunnel to a "Azure Virtual Gateway" I get the connection, but the routing isnt correct. But if I try to setup a tunnel to the firewall's PIP directly it does not work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 13:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665729#M1092491</guid>
      <dc:creator>isoto</dc:creator>
      <dc:date>2022-08-08T13:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665744#M1092492</link>
      <description>&lt;P&gt;Is there an Azure NSG in front of your Azure firewall If so, you must allow all IP traffic to the firewall's outside address. An NSG doesn't have the fine grained control to only allow the required ESP (protocol 50) and udp/500 and udp/4500 ports.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 13:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665744#M1092492</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-08-08T13:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665749#M1092494</link>
      <description>&lt;P&gt;Sorry my original reply was incorrect. Yes there is an NSG and has both 500 and 4500 allow in inbound. I will add 50 to the inbound&lt;/P&gt;
&lt;P&gt;---Note--&lt;/P&gt;
&lt;P&gt;I added 50 and still no luck&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-08 07_15_36-Window.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/159472i59850BDA9CE2DF97/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-08-08 07_15_36-Window.png" alt="2022-08-08 07_15_36-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 14:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665749#M1092494</guid>
      <dc:creator>isoto</dc:creator>
      <dc:date>2022-08-08T14:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665789#M1092499</link>
      <description>&lt;P&gt;It's IP protocol 50 (IPsec Encapsulating Security Payload or ESP) - not a UDP (or TCP) port that's required.&lt;/P&gt;
&lt;P&gt;Last I checked NSG's don't allow you to select the IP protocols allowed (apart udp (protocol 17) and tcp (protocol 6)), so we need to allow all incoming traffic to the firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 15:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4665789#M1092499</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-08-08T15:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4666049#M1092520</link>
      <description>&lt;P&gt;I actually opened it up to "any" and am still not getting the site to site to establish a connection. I run show crypto isakmp sa and not connection.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 00:31:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4666049#M1092520</guid>
      <dc:creator>isoto</dc:creator>
      <dc:date>2022-08-09T00:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4666072#M1092522</link>
      <description>&lt;P&gt;Do you see the connection being attempted when interesting traffic is presented to the firewall at one end. For example, does a packet capture filtered on the remote site firewall's address show it trying to setup the VPN?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 02:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4666072#M1092522</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-08-09T02:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site tunnel from onprem firepower and firepower in Azure</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4666108#M1092523</link>
      <description>&lt;P&gt;Have you enabled additional syslog IDs like the ones below on the Firepower to capture additional informational to help further troubleshoot the issue?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;750003&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;750002&lt;BR /&gt;713050&lt;BR /&gt;713259&lt;BR /&gt;713123&lt;BR /&gt;713019&lt;BR /&gt;713119&lt;BR /&gt;713120&lt;BR /&gt;113019&lt;BR /&gt;402116&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 05:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-from-onprem-firepower-and-firepower-in-azure/m-p/4666108#M1092523</guid>
      <dc:creator>manofsteel03</dc:creator>
      <dc:date>2022-08-09T05:20:06Z</dc:date>
    </item>
  </channel>
</rss>

