<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Do i need licenses in FTDs in order to implement a site to site VP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016127#M1108993</link>
    <description>&lt;P&gt;Sure there is'&lt;/P&gt;
&lt;P&gt;The dynamic peer can initiate the VPN IPsec since it config with staitc IP toward the static Peer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The static Peer can not initiate the VPN since the Peer IP in unknown.&lt;/P&gt;
&lt;P&gt;So you need to make dynamic peer always initiate the traffic' this can done by config ip sla (LAN to LAN) to make VPN tunnel UP.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Sun, 11 Feb 2024 13:16:07 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-02-11T13:16:07Z</dc:date>
    <item>
      <title>Do i need licenses in FTDs in order to implement a site to site VPN?</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014240#M1108858</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;i am trying to implement a site to site IPSec VPN between an FTD-HA pair and a cisco 2821.&lt;/P&gt;&lt;P&gt;Till now i haven't succeeded in doing so , but before starting to dig dipper i would like to ask you if there are needed any special licenses for this.&lt;/P&gt;&lt;P&gt;Currently we have the licenses you can see in the picture attached.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 14:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014240#M1108858</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-07T14:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014252#M1108859</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt;&amp;nbsp;you just need strong crypto enabled.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1707318102308.png" style="width: 645px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209785iE5BEADE664D88E40/image-dimensions/645x310?v=v2" width="645" height="310" role="button" title="RobIngram_0-1707318102308.png" alt="RobIngram_0-1707318102308.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/215838-fmc-and-ftd-smart-license-registration-a.html#toc-hId-408311610" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/215838-fmc-and-ftd-smart-license-registration-a.html#toc-hId-408311610&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014252#M1108859</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-07T15:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014256#M1108860</link>
      <description>&lt;P&gt;No additional licenses are required for the S2S VPN. What issues are you running into?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 14:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014256#M1108860</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-07T14:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014257#M1108861</link>
      <description>&lt;P&gt;Hey Rob, I think you pasted the link of this thread by mistake? (smiley face)&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 14:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014257#M1108861</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-07T14:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014258#M1108862</link>
      <description>&lt;P&gt;Thanks Rob, but i can see that there even older implementations supported in FTD , for example DES.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 14:44:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014258#M1108862</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-07T14:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014263#M1108863</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt; just checking you were paying attention. Amended the link&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 14:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014263#M1108863</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-07T14:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014264#M1108864</link>
      <description>&lt;P&gt;Hi Aref ,&lt;/P&gt;&lt;P&gt;thanks for the concern.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My implementation is fairly simple.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The 2821 has the following config:&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 14&lt;BR /&gt;crypto isakmp key ***** address 192.168.64.17&lt;BR /&gt;crypto isakmp keepalive 30&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set TS esp-aes esp-sha-hmac&lt;BR /&gt;mode transport&lt;BR /&gt;!&lt;BR /&gt;crypto map vpn-to-hq 10 ipsec-isakmp&lt;BR /&gt;set peer 192.168.64.17&lt;BR /&gt;set transform-set TS&lt;BR /&gt;match address VPN-TRAFFIC&lt;/P&gt;&lt;P&gt;Router#sh ip access-lists&lt;BR /&gt;Extended IP access list VPN-TRAFFIC&lt;BR /&gt;10 permit ip 192.168.105.176 0.0.0.15 any (2000 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0.1&lt;BR /&gt;encapsulation dot1Q 1 native&lt;BR /&gt;ip address dhcp&lt;BR /&gt;crypto map vpn-to-hq&lt;/P&gt;&lt;P&gt;Equivalent config in the FTD side.&lt;/P&gt;&lt;P&gt;Do you see any mistake in the 2821 config?&lt;/P&gt;&lt;P&gt;In addition to the FTD i have permitted via the ACP the traffic from everywhere to the interface of the FTD where the vpn listes (192.168.64.17)&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014264#M1108864</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-07T15:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014281#M1108868</link>
      <description>&lt;P&gt;The only two things that I can think of are:&lt;/P&gt;
&lt;P&gt;1) The mode under the crypto ipsec transform-set should be "tunnel" instead of "transport".&lt;/P&gt;
&lt;P&gt;2) Not sure how your NAT configs look like, if there is NAT then you should exemption the VPN traffic on the devices?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014281#M1108868</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-07T15:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014282#M1108869</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&amp;nbsp;I had enough coffee today : D&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014282#M1108869</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-07T15:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014411#M1108882</link>
      <description>&lt;P&gt;Thanks , i did change to tunnel mode but what made the difference and the tunnel came up was to change the 2821 side from dynamic IP to static.&lt;/P&gt;&lt;P&gt;So the problem is why the ipsec tunnel does not come up when the 2821 IP is set to dynamic.&lt;/P&gt;&lt;P&gt;Please refer to the screenshot.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 20:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014411#M1108882</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-07T20:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014930#M1108910</link>
      <description>&lt;P&gt;Not sure, sorry. I would need to see the full config to trying to give an answer &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 14:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5014930#M1108910</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-08T14:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016123#M1108991</link>
      <description>&lt;P&gt;Hi Aref,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have ended in a strange situation where when i initiate the IPSEC-VPN from the FTD it initiates the iSAKMP as well as the IPSec phase with the cisco vpn router , but when i initiate the tunnel from the cisco vpn router the isakmp phase does not initiate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no firewall issue as the source interface of the router is permitted as ip in the ACP policy.&amp;nbsp; &amp;nbsp; I even tried to permit ip any any in the firewall with no luck either.&lt;/P&gt;&lt;P&gt;In between the cisco vpn router and the firewall there are no other firewalls or ACLs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;And in the FTD i have permitted the initiation of vpn from both directions. Please refer to the screenshot.&lt;/P&gt;&lt;P&gt;The interesting traffic tries to go through the tunnel because i see matches in the ACL which corresponds to interesting traffic but the isakmp does not initiate.&lt;/P&gt;&lt;P&gt;Any clues of why i can not inititiate the VPN from the cisco router?&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 13:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016123#M1108991</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-11T13:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016127#M1108993</link>
      <description>&lt;P&gt;Sure there is'&lt;/P&gt;
&lt;P&gt;The dynamic peer can initiate the VPN IPsec since it config with staitc IP toward the static Peer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The static Peer can not initiate the VPN since the Peer IP in unknown.&lt;/P&gt;
&lt;P&gt;So you need to make dynamic peer always initiate the traffic' this can done by config ip sla (LAN to LAN) to make VPN tunnel UP.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 13:16:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016127#M1108993</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-11T13:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016177#M1109017</link>
      <description>&lt;P&gt;Thanks for the reply , but forgot to mention that because of the issues i had with the dynamic peer in one side , i changed both sides to static.&lt;/P&gt;&lt;P&gt;So they are both static (cisco vpn router as well as the ftd).&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 15:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016177#M1109017</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-11T15:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016178#M1109018</link>
      <description>&lt;P&gt;But even with ip sla the problem is that the cisco --&amp;gt; FTD IPSec tunnel does not come up. IP SLA would be useful if i wanted to keep the ipsec tunnel up even if no interesting traffic went through.&amp;nbsp; But in my case tge vpn does not come up when initiated fro cisco router side&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 15:50:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016178#M1109018</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-11T15:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016179#M1109019</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; What was the source of the traffic when you attempt to establish the tunnel from the router? Did you have the ike debugs enabled and nothing was generated? Do you have NAT configured on the router? Is the router the default gateway for the devices behind the router? Is PFS configured on one peer but not the other? Provide your full router configuration and screenshots from the FMC or even the crypto, tunnel-group running configuration of the FTD.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 15:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016179#M1109019</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-11T15:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016180#M1109020</link>
      <description>&lt;P&gt;Just did one more retry from the cisco side to FTD :&amp;nbsp;&lt;/P&gt;&lt;P&gt;The debug output is the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping 192.168.90.60 source fastEthernet 0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;where on fastethernet 0/1 exists the vpn policy.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Feb 11 15:53:34.030: ISAKMP:(0): Phase 1 negotiation failed with DPD active; deleting IKE/IPSec SAs&lt;BR /&gt;Feb 11 15:53:34.030: ISAKMP:(0):deleting SA reason "Death by retransmission P1" state (I) MM_NO_STATE (peer 192.168.64.17)&lt;BR /&gt;Feb 11 15:53:34.030: ISAKMP:(0):Can't decrement IKE Call Admission Control stat outgoing_negotiating since it's already 0.&lt;BR /&gt;Feb 11 15:53:34.030: ISAKMP:(0):deleting SA reason "Death by retransmission P1" state (I) MM_NO_STATE (peer 192.168.64.17)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 15:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016180#M1109020</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-11T15:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016185#M1109021</link>
      <description>&lt;P&gt;Please see my thread right after your reply as far as the source of the traffic. Debugs are the ones i sent .&lt;/P&gt;&lt;P&gt;No NAT configured.&lt;/P&gt;&lt;P&gt;No PFS is configured (at least at the ftd side is not checked).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cisco remote site VPN config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;BR /&gt;encr aes&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 5&lt;BR /&gt;crypto isakmp key &amp;lt;omitted&amp;gt; address 192.168.64.17&lt;BR /&gt;crypto isakmp keepalive 30&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec security-association lifetime seconds 86400&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set TS esp-aes 256 esp-sha-hmac&lt;BR /&gt;!&lt;BR /&gt;crypto map vpn-to-hq 10 ipsec-isakmp&lt;BR /&gt;set peer 192.168.64.17&lt;BR /&gt;set transform-set TS&lt;BR /&gt;match address VPN-TRAFFIC&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;no ip address&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0.1&lt;BR /&gt;encapsulation dot1Q 1 native&lt;BR /&gt;ip address 192.168.64.53 255.255.255.252&lt;BR /&gt;crypto map vpn-to-hq&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;BR /&gt;ip address 192.168.105.177 255.255.255.240&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 0.0.0.0 0.0.0.0 192.168.64.54&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The interesting traffic should go through 192.168.64.17&lt;BR /&gt;&lt;STRONG&gt;ip route 192.168.90.32 255.255.255.224 192.168.64.17&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended VPN-TRAFFIC&lt;BR /&gt;permit ip 192.168.105.176 0.0.0.15 192.168.90.32 0.0.0.31&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FTD Side&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set CSM_TS_1 esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map CSM_vlan_26_map 2 match address from_90_32_to_105_176&lt;BR /&gt;crypto map CSM_vlan_26_map 2 set peer 192.168.64.53&lt;BR /&gt;crypto map CSM_vlan_26_map 2 set ikev1 phase1-mode aggressive group5&lt;BR /&gt;crypto map CSM_vlan_26_map 2 set ikev1 transform-set CSM_TS_1&lt;BR /&gt;crypto map CSM_vlan_26_map 2 set security-association lifetime seconds 86400&lt;BR /&gt;crypto map CSM_vlan_26_map 2 set reverse-route&lt;BR /&gt;crypto map CSM_vlan_26_map interface vlan_26&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;revocation-check crl none&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;crypto ikev1 enable vlan_26&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;group-policy .DefaultS2SGroupPolicy internal&lt;BR /&gt;group-policy .DefaultS2SGroupPolicy attributes&lt;BR /&gt;vpn-idle-timeout 30&lt;BR /&gt;vpn-idle-timeout alert-interval 1&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-session-timeout alert-interval 1&lt;BR /&gt;vpn-filter none&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;tunnel-group 192.168.64.53 type ipsec-l2l&lt;BR /&gt;tunnel-group 192.168.64.53 general-attributes&lt;BR /&gt;default-group-policy .DefaultS2SGroupPolicy&lt;BR /&gt;tunnel-group 192.168.64.53 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Till now : The tunnel comes up when traffic is initiated from a client behind FTD in 192.168.90.0/24 network towards cisco vpn router at 192.168.105.176 network but no icmp reply returns back.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;When the ping starts from a client behind the cisco route at 192.168.105.176 255.255.255.240 network to 192.168.90.32/27 the tunnel does not come up and off course no ping reply gets back.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any ideas to try most welcome....!!!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 16:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016185#M1109021</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-02-11T16:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016191#M1109022</link>
      <description>&lt;P&gt;We return to same point'&lt;/P&gt;
&lt;P&gt;Are you use PPPoE or DHCP in WAN interface of FTD ?&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 16:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016191#M1109022</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-11T16:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Do i need licenses in FTDs in order to implement a site to site VP</title>
      <link>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016192#M1109023</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; why have you got this route below, traffic should be routed to the next hop 192.168.64.54 and it should route onward.&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;ip route 192.168.90.32 255.255.255.224 192.168.64.17&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;Remove it. &lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 16:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/do-i-need-licenses-in-ftds-in-order-to-implement-a-site-to-site/m-p/5016192#M1109023</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-11T16:47:55Z</dc:date>
    </item>
  </channel>
</rss>

