<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNMP monitoring of FTD through IPSec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4718496#M1094912</link>
    <description>&lt;P&gt;Yes - this is exactly the option I'm missing on the FTD via FMC.&lt;/P&gt;&lt;P&gt;Just making sure, setting this option, will NOT change the interface where the FMC is managing the device?&lt;/P&gt;</description>
    <pubDate>Wed, 09 Nov 2022 08:00:46 GMT</pubDate>
    <dc:creator>Michael Bartholomæussen</dc:creator>
    <dc:date>2022-11-09T08:00:46Z</dc:date>
    <item>
      <title>SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4717850#M1094851</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I've deployed a FMC managed FTD at a remote office, where it's managed via OUTSIDE interface.&lt;/P&gt;&lt;P&gt;Usually with an ASA it's possible to query SNMP on the INSIDE interface through the IPSec.&lt;BR /&gt;This doesn't seems possible with the FTD. ICMP doesn't work either via the IPSec to INSIDE.&lt;/P&gt;&lt;P&gt;Any solution to this issue?&lt;/P&gt;&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 11:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4717850#M1094851</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2022-11-08T11:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4718425#M1094909</link>
      <description>&lt;P&gt;&lt;STRONG&gt;On ASA&lt;/STRONG&gt; - If your VPN tunnel terminates on one interface, but you want to manage the ASA by accessing a different interface, you can identify that interface as a management-access interface. For example, if you enter the ASA from the outside interface, this feature lets you connect to the inside interface using ASDM, SSH, Telnet, or SNMP; or you can ping the inside interface when entering from the outside interface. Management access is available via the following VPN tunnel types: IPsec clients, IPsec site-to-site, and the AnyConnect SSL VPN client.&lt;/P&gt;
&lt;PRE&gt;management-access management_interface&lt;/PRE&gt;
&lt;P&gt;The &lt;STRONG&gt;management_interface&lt;/STRONG&gt; specifies the name of the management interface that you want to access when entering the ASA from another interface.&lt;/P&gt;
&lt;P&gt;&lt;U&gt;We can use the same command on FTD, which can be deployed &lt;STRONG&gt;via FMC Flex Policy&lt;/STRONG&gt;&lt;/U&gt;. An enhancement is already in place to introduce this on the FMC UI,&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz48122" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz48122&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 04:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4718425#M1094909</guid>
      <dc:creator>manabans</dc:creator>
      <dc:date>2022-11-09T04:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4718496#M1094912</link>
      <description>&lt;P&gt;Yes - this is exactly the option I'm missing on the FTD via FMC.&lt;/P&gt;&lt;P&gt;Just making sure, setting this option, will NOT change the interface where the FMC is managing the device?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 08:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4718496#M1094912</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2022-11-09T08:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4721021#M1095055</link>
      <description>&lt;P&gt;With the Flexconfig added to the FTD via FMC, I got syslog from INSIDE and I'm able to access INSIDE via HTTPS (only for test)&lt;/P&gt;&lt;P&gt;SNMP and SSH on the other hand doesn't work despite of the limited configuration through the FMC.&lt;/P&gt;&lt;P&gt;Any suggests to what I might have overlooked, or is there some kind of limitation?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 12:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4721021#M1095055</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2022-11-14T12:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4726723#M1095290</link>
      <description>&lt;P&gt;Have you doublechecked the NAT/route for the snmp host IP ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 16:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4726723#M1095290</guid>
      <dc:creator>buffkata</dc:creator>
      <dc:date>2022-11-23T16:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4727303#M1095303</link>
      <description>I assume that my NAT correct as syslog and http works to the device, otherwise I guess it wouldn't, right?&lt;BR /&gt;</description>
      <pubDate>Thu, 24 Nov 2022 08:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4727303#M1095303</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2022-11-24T08:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4727340#M1095305</link>
      <description>&lt;P&gt;can you draw the topology ?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 09:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4727340#M1095305</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-24T09:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4728098#M1095370</link>
      <description>The topology is quite simple&lt;BR /&gt;FMC (DC-LAN)|---"DC FIREWALL"--------@--------"REMOTE FTD"----|REMOTE-LAN&lt;BR /&gt;The NAT is configured like so...&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static REMOTE-LAN REMOTE-LAN destination static DC-LAN DC-LAN no-proxy-arp route-lookup&lt;BR /&gt;</description>
      <pubDate>Fri, 25 Nov 2022 13:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4728098#M1095370</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2022-11-25T13:09:15Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP monitoring of FTD through IPSec</title>
      <link>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4728153#M1095372</link>
      <description>&lt;P&gt;SNMP and SSH won't work, because they're implemented via nlp_int_tap interface. At least until Cisco re-architects this part of the code. Refer to this post: &lt;A href="https://community.cisco.com/t5/cisco-bug-discussions/cscvt97205-snmppoll-snmptrap-to-remote-end-site-to-site-vpn-asa/td-p/4304139" target="_blank"&gt;https://community.cisco.com/t5/cisco-bug-discussions/cscvt97205-snmppoll-snmptrap-to-remote-end-site-to-site-vpn-asa/td-p/4304139&lt;/A&gt;&lt;/P&gt;&lt;P&gt;ASA code has the same issue for SNMP (but not for SSH) as of 9.14, with the same root cause.&lt;/P&gt;&lt;P&gt;The status of the corresponding ENH is incorrect: &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt97205" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt97205&lt;/A&gt;. This bug wasn't fixed in the versions listed.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 15:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-monitoring-of-ftd-through-ipsec/m-p/4728153#M1095372</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2022-11-25T15:09:59Z</dc:date>
    </item>
  </channel>
</rss>

