<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S VPN Cisco FTD (Managed by FMC) &amp;lt;=&amp;gt; Fortigate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5080099#M1111704</link>
    <description>&lt;P&gt;any update for this case ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2024 22:10:14 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-04-26T22:10:14Z</dc:date>
    <item>
      <title>S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5064999#M1110957</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I have a S2S VPN connected at phase 1, however doesn't successfully negotiate Phase 2. The issue I have is that my Cisco FTD sits behind a NAT device. I have configured NAT-T.&lt;/P&gt;&lt;P&gt;My configuration on my FTD has the local peer configured with the private IP of the interface (Which is then NATed on my edge router), and the remote side as the public IP address of my Fortigate.&lt;/P&gt;&lt;P&gt;The issue I have is that the Fortigate is configured with the remote peer (Cisco FTD) as the public IP address, but from the Crypto Map point of view, this doesn't mirror the configuration that's on Cisco FTD (FMC) so refuses to establish Phase 2 successfully. For info, on Phase 1 I can see the Fortigate receiving the Private IP address as the Peer ID for the Cisco FTD.&lt;/P&gt;&lt;P&gt;I need a way to manipulate the Peer ID sent from Cisco FTD (Managed by FMC) to the Fortigate, so instead of displaying as the private IP, it mirrors the Fortigate configuration, and Peer ID information it's expecting to receive.&lt;/P&gt;&lt;P&gt;If there is a better solution to effectively ensure the Crypto Maps match then I'm happy with an alternate approach.&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 16:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5064999#M1110957</guid>
      <dc:creator>jamesupcott1</dc:creator>
      <dc:date>2024-04-10T16:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5065031#M1110958</link>
      <description>&lt;P&gt;In vpn topolgy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go to advanced&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then go to&amp;nbsp; IKE&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Select option of &lt;STRONG&gt;identity&lt;/STRONG&gt; &lt;STRONG&gt;sent&lt;/STRONG&gt; &lt;STRONG&gt;to&lt;/STRONG&gt; &lt;STRONG&gt;peer&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 16:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5065031#M1110958</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-10T16:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5065277#M1110960</link>
      <description>&lt;P&gt;Thanks for your reply. I have been on this option and it gives me the option for "IP Address", which will be the interface IP, which I don't want. And the other two options are FQDN &amp;amp; DN, which I wanted to avoid having to use if I can manipulate the IP address.&lt;/P&gt;&lt;P&gt;Is there a way to use the method you mention with a manually entered IP address rather than it using the interface IP by default?&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 18:07:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5065277#M1110960</guid>
      <dc:creator>jamesupcott1</dc:creator>
      <dc:date>2024-04-10T18:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5065343#M1110961</link>
      <description>&lt;P&gt;Sorry' I know only this way.&lt;/P&gt;
&lt;P&gt;You can use fqdn as ID even if you use PSK not cert. Auth.&lt;/P&gt;
&lt;P&gt;Just make fqdn modify the ID to be fqdn instead of IP.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 18:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5065343#M1110961</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-10T18:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5066242#M1111022</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/274185"&gt;@jamesupcott1&lt;/a&gt;, if this is IKEv1, the Peer ID is not that important, since your PSK is always tied to the public peer IP address. If Fortigate cross-checks received Peer ID with the configured peer IP address, there should be an option on it to disable this check. Note that NAT scenario is very common and I don't believe Fortigate software doesn't have an option to disable this check.&lt;/P&gt;&lt;P&gt;If this is IKEv2, things are different, because PSK is always tied to the Peer ID, instead of the public peer IP address (because in IKEv2 peer identity is available early during negotiation process or, in other words, IKEv1 "hidden identity" concept no longer applies). In this case Fortigate must be configured with PSK linked to the Peer ID and public IP is not important.&lt;/P&gt;&lt;P&gt;Anyway, if Phase 1 is successful, but Phase 2 fails, it might be that something else happens which prevents Phase 2 to come up. In IKEv1 IDi is sent in message #5, i.e. before Phase 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 11:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5066242#M1111022</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-11T11:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5066262#M1111023</link>
      <description>&lt;P&gt;If you use fqdn and same issue&amp;nbsp;&lt;/P&gt;
&lt;P&gt;share form &lt;STRONG&gt;ftd&lt;/STRONG&gt; side this let me look why ID reject&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Debug crypto ipsec 127 &amp;lt;- ikev1&lt;/P&gt;
&lt;P&gt;Debug crypto ikev2 platform 127 &amp;lt;- for ikev2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think there is mismatch in phaseII SA' but let me check it&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 12:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5066262#M1111023</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-11T12:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5066282#M1111024</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Do you think that Fortigate has same debug commands as ASA/FTD? Notice that it is FTD which is behind NAT and it was reported that connection fails on Fortigate side because of this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 11:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5066282#M1111024</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-11T11:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN Cisco FTD (Managed by FMC) &lt;=&gt; Fortigate</title>
      <link>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5080099#M1111704</link>
      <description>&lt;P&gt;any update for this case ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 22:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/s2s-vpn-cisco-ftd-managed-by-fmc-lt-gt-fortigate/m-p/5080099#M1111704</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T22:10:14Z</dc:date>
    </item>
  </channel>
</rss>

