<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NGFW 1140 configuration question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849630#M1101285</link>
    <description>&lt;P&gt;So under the Node A protected networks, yes, all networks we want to be tunneled are there. As for the destination Node B protected Network, no internal networks defined there.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Jun 2023 19:18:48 GMT</pubDate>
    <dc:creator>scoutt</dc:creator>
    <dc:date>2023-06-06T19:18:48Z</dc:date>
    <item>
      <title>NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849584#M1101283</link>
      <description>&lt;P&gt;We have migrated from a AS 5516 to a NGFW 1140. Everything seems to be working great so far. What I was wondering is we have site-to-site tunnels configured and it appears the normal internet traffic is also trying to go through the tunnel. How can we separate this? We just want the tunnel traffic to use it and normal internet traffic to use our proxy and go out an ACL, not the tunnel. For users that don't use the tunnel, it works fine.&lt;/P&gt;&lt;P&gt;Or is it not possible to split it like the 5516's did?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 18:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849584#M1101283</guid>
      <dc:creator>scoutt</dc:creator>
      <dc:date>2023-06-06T18:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849604#M1101284</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/867706"&gt;@scoutt&lt;/a&gt; what destination network have you defined in the VPN configuration? The configuration of the VPN should define just the correct networks that should be tunnelled. Make sure you haven't defined "any" as the destination in the VPN configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 18:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849604#M1101284</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-06T18:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849630#M1101285</link>
      <description>&lt;P&gt;So under the Node A protected networks, yes, all networks we want to be tunneled are there. As for the destination Node B protected Network, no internal networks defined there.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 19:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849630#M1101285</guid>
      <dc:creator>scoutt</dc:creator>
      <dc:date>2023-06-06T19:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849631#M1101286</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/867706"&gt;@scoutt&lt;/a&gt; so what is defined as the destination networks then? When using a policy based VPN (which is sounds like you are) only interesting traffic that matches networks defined is routed via the tunnel.&lt;/P&gt;
&lt;P&gt;Provide some screenshots of your configuration.&lt;/P&gt;
&lt;P&gt;Run packet-tracer from the CLI of internet traffic to see what it believes should happen with the traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 19:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849631#M1101286</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-06T19:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849637#M1101287</link>
      <description>&lt;P&gt;you use ACL local LAN to ANY &amp;lt;&amp;lt;- this make all traffic pass through tunnel, change it to&amp;nbsp;&lt;BR /&gt;LOCAL LAN -&amp;gt; Remote LAN&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 19:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849637#M1101287</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-06T19:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849641#M1101288</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, sorry, the destination for the protected network on Node B is the IP of the partner, a state vendor. We see it leave the firewall under the events but most of the initiators info is blank and the response never gets back to us. The state vendor says they do not see us hitting them, so we are thinking that all the web traffic is also going through the site-to-site tunnel, which we don't want&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have ACL rules pointing like you said, Local LAN -&amp;gt; Remote LAN for tunnel traffic. But we also enabled "sysopt permit-vpn" in the VPN configuration. Will this make a difference and shoot everything though the tunnel?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 19:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849641#M1101288</guid>
      <dc:creator>scoutt</dc:creator>
      <dc:date>2023-06-06T19:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849645#M1101289</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/867706"&gt;@scoutt&lt;/a&gt;&amp;nbsp;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt; sysopt connection permit-vpn&lt;/SPAN&gt; just tells the ASA to ignore the interface ACLs for VPN traffic, it won't route all traffic via the VPN.&lt;/P&gt;
&lt;P&gt;Run packet-tracer as mentioned to provide a clue as to what is happening.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 19:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849645#M1101289</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-06T19:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849650#M1101290</link>
      <description>&lt;P&gt;check if the Remote LAN subnet is conflict with Proxy IP&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 20:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4849650#M1101290</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-06T20:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4850359#M1101312</link>
      <description>&lt;P&gt;Good Morning guys,&lt;/P&gt;&lt;P&gt;Thanks for the information. We have found the problem and it required some cleanup on our part. The vendor URL's that users were hitting was the same IP range that we had in the VPN Tunnel. Once we removed that range the sites stopped going through the tunnel. Thanks for the clarification that nothing really needs to be done to separate the traffic, except make sure you don't have IP ranges that you don't need in there. lol&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 14:54:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4850359#M1101312</guid>
      <dc:creator>scoutt</dc:creator>
      <dc:date>2023-06-07T14:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1140 configuration question</title>
      <link>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4850360#M1101313</link>
      <description>&lt;P&gt;You are so welcome&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 14:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ngfw-1140-configuration-question/m-p/4850360#M1101313</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-07T14:56:05Z</dc:date>
    </item>
  </channel>
</rss>

