<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating a S2S VPN - protected networks via IP extended ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081190#M1111776</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; do you have a NAT exemption rule to ensure the traffic between 192.168.1.0/24 and 192.168.2.0/24 is not unintentially translated?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 28 Apr 2024 16:53:06 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-04-28T16:53:06Z</dc:date>
    <item>
      <title>Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081150#M1111766</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;i was trying to find why the the vpn between an FTD and a cisco router could not come up and concluded to this:&lt;/P&gt;&lt;P&gt;When i create the S2S VPN PtP topology if i just add the protected networks, the tunnel does not come up.&lt;/P&gt;&lt;P&gt;For example if behind the FTD is the network 192.168.1.0/24 and behind the extranet cisco is the network 192.168.2.0/24 then&amp;nbsp; if i add them in the protected network tab the ipsec vpn does not come up.&lt;/P&gt;&lt;P&gt;If instead i create an ACL with source &lt;STRONG&gt;any&lt;/STRONG&gt; and destination the &lt;STRONG&gt;192.168.2.0&lt;/STRONG&gt; and apply it to the FTD and also i create an ext. acl to allow traffic from &lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;192.168.2.0 to any&amp;nbsp;&lt;/STRONG&gt;and apply it to the extranet node the tunnel finally comes up.&lt;/P&gt;&lt;P&gt;Any ideas why this is happening?&amp;nbsp; I miss something but i can not see what it is.&lt;/P&gt;&lt;P&gt;Please refer to png attached in order to understand to what part of the gui i am referring to.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 15:59:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081150#M1111766</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-04-28T15:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081154#M1111768</link>
      <description>&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081154#M1111768</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T16:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081155#M1111769</link>
      <description>&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081155#M1111769</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T16:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081188#M1111774</link>
      <description>&lt;P&gt;The router is an 2821 with&amp;nbsp;15.1(4)M10 and the FTD runs 7.2.5.&lt;/P&gt;&lt;P&gt;Btw i am trying with IKE v1 , not IKEv2.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081188#M1111774</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-04-28T16:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081190#M1111776</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; do you have a NAT exemption rule to ensure the traffic between 192.168.1.0/24 and 192.168.2.0/24 is not unintentially translated?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081190#M1111776</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-28T16:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081191#M1111777</link>
      <description>&lt;P&gt;In both Side config route for remote LAN' and then use subnet network and check&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 17:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081191#M1111777</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T17:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081234#M1111783</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no NAT rule at this phase. I will add it later to the config.&lt;/P&gt;&lt;P&gt;What i noticed is the following:&amp;nbsp; If i put on the FTD side as protected network the "any" keyword instead of a specific protected subnet it works !&amp;nbsp; So in this case i have configured in the GUI of the FMC&amp;nbsp; the protected network for the cisco 2821 side as the &lt;STRONG&gt;192.168.2.0/24&lt;/STRONG&gt; and &lt;STRONG&gt;any&lt;/STRONG&gt; in the FTD side and the VPN started to work.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 18:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081234#M1111783</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-04-28T18:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081235#M1111784</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt; yes I understand what you've configured. If there is no NAT exemption rule traffic will not come from the original source, it will come from the translated IP address, which would match "any" in the crypto ACL.&lt;/P&gt;
&lt;P&gt;Apply NAT exemption rule on both sides to make sure traffic is no unintentially translated.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 18:15:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5081235#M1111784</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-28T18:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5103028#M1112363</link>
      <description>&lt;P&gt;To not confuse you, I will ask here&lt;/P&gt;
&lt;P&gt;Can you update me about this post&lt;/P&gt;
&lt;P&gt;Thanks alot&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 12:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5103028#M1112363</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-12T12:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a S2S VPN - protected networks via IP extended ACL</title>
      <link>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5103077#M1112372</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; , as the FTD does not permit VPN traffic to pass through the device , static route should be created in FTD in order to permit traffic to be sent to the appropriate interface where the VPN is created.&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 14:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-a-s2s-vpn-protected-networks-via-ip-extended-acl/m-p/5103077#M1112372</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-05-12T14:54:10Z</dc:date>
    </item>
  </channel>
</rss>

