<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD: Access outside interface from inside? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194129#M1115743</link>
    <description>&lt;P&gt;The guest network does not have access to our internal network. It is just for internet access for guests or for users who want to use AnyConnect instead of wireless 802.1x so they can keep their AnyConnect always running whether they work from home or abroad or in the office.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for a solution to provide that functionality without using separate firewalls. Separate interface for guest network and inside network on same firewall.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2024 07:12:22 GMT</pubDate>
    <dc:creator>Network Diver</dc:creator>
    <dc:date>2024-09-13T07:12:22Z</dc:date>
    <item>
      <title>FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194099#M1115736</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Is it possible on FTD to access a public IP assigned to outside interface from the inside network? We have the usecase where users are using AnyConnect and want to access the VPN peer from a guest network provided by the firewall. As they are switching often from home office to real office and keep their notebook in standby, AnyConnect keeps running, has cached the IP address of the VPN peer.&lt;/P&gt;&lt;P&gt;On ASA we're using multiple contexts for this. One for AnyConnect and a second one for outbound internet traffic.&lt;/P&gt;&lt;P&gt;Is this possible on FTD without using contexts or separate physical boxes? For branch offices this would require two HA pairs of FTD 1000 series. We've had so many software bugs and feature limitations with multiple contexts on ASA I don't want to have multiple contexts anymore on next generation firewalls.&lt;/P&gt;&lt;P&gt;I've learned that the FTD 3100 series and higher can run FTD as docker containers (multi instance mode), but that's oversized for a branch office internet edge firewall. One box costs about the same as a car.&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Bernd&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 04:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194099#M1115736</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2024-09-13T04:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194107#M1115737</link>
      <description>&lt;P&gt;You can simply run webvpn in inside interface'&lt;/P&gt;
&lt;P&gt;This make user internal to use anyconnect to access other zone in ftd&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 05:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194107#M1115737</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-13T05:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194116#M1115738</link>
      <description>&lt;P&gt;I know. But AnyConnect caches the public IP address of the VPN peer when connecting from outside. If internal DNS entry for VPN peer uses inside address, the AnyConnect daemon or notebook needs to be restarted to resolve to the different IP. That's too inconvenient for our users.&lt;/P&gt;&lt;P&gt;Guest network uses public DNS servers and just does dynamic NAT to a public IP. In the past we used little ASA firewalls for the guest network to be able to provide that functionality until it got replaced with ASA-X and multiple contexts. I hoped that FTD in the meantime is clever enough to allow accessing outside interface IPs from inside. Maybe a NAT rule that maps public IP to inside IP when request comes from inside?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 06:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194116#M1115738</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2024-09-13T06:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194120#M1115740</link>
      <description>&lt;P&gt;FTD also use hairpin NAT&amp;nbsp;&lt;BR /&gt;INSIDE NATing to Public IP when Inside is try to access Outside&lt;BR /&gt;if that what you looking for&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2021/07/11/ftd-nat-reflection/" target="_blank"&gt;https://integratingit.wordpress.com/2021/07/11/ftd-nat-reflection/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 06:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194120#M1115740</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-13T06:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194122#M1115741</link>
      <description>&lt;P&gt;Thanks. Have to try if that works to direct traffic from inside network requesting public interface IP to inside interface IP and enable webvpn also on inside interface.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nat (inside,inside) source static Internal-LAN interface destination static asa-outside-ip asa-inside-ip

webvpn
  enable outside
  enable inside
  ...&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 13 Sep 2024 06:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194122#M1115741</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2024-09-13T06:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194127#M1115742</link>
      <description>&lt;P&gt;I dont get your requirements&lt;/P&gt;
&lt;P&gt;Hairpin will NAT Inside to Outside and hence the internal host can access internal server that have dns public IP in dns.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why you need webvpn for internal then?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 07:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194127#M1115742</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-13T07:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194129#M1115743</link>
      <description>&lt;P&gt;The guest network does not have access to our internal network. It is just for internet access for guests or for users who want to use AnyConnect instead of wireless 802.1x so they can keep their AnyConnect always running whether they work from home or abroad or in the office.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for a solution to provide that functionality without using separate firewalls. Separate interface for guest network and inside network on same firewall.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 07:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194129#M1115743</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2024-09-13T07:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194214#M1115753</link>
      <description>&lt;P&gt;Would using AnyConnect Trusted Network Detection be an option?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect41/administration/guide/b_AnyConnect_Administrator_Guide_4-1/configure-vpn.html#id_100236" target="_blank"&gt;Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.1 - Configure VPN Access [Cisco Secure Client (including AnyConnect)] - Cisco&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 10:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5194214#M1115753</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-13T10:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5195387#M1115843</link>
      <description>&lt;P&gt;That would work from corporate office network, but not guest network. I was looking for a solution to provide a guest network that allows AnyConnect to local site without using dedicated firewall boxes or multiple contexts.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 13:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5195387#M1115843</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2024-09-17T13:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5195390#M1115844</link>
      <description>&lt;P&gt;I tried that NAT reflection rule. It works for mapping any public IP address to an inside server IP address, but it does not work when using firewall outside/inside interface IP addresses.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 13:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5195390#M1115844</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2024-09-17T13:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: FTD: Access outside interface from inside?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5230015#M1117840</link>
      <description>&lt;P&gt;Digged a bit deeper into FTD features and looked at the inline interface sets. Would it be possible to create two interfaces for an inline set that connect the public internet form the provider and behind a dedicated FTD for AnyConnect VPN? Are then the public IP address of the VPN device (labeled FTD2a/2b) accessible through the internet edge FTDs?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd-inline-interfaces.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/234729i5171B36B460AC983/image-size/large?v=v2&amp;amp;px=999" role="button" title="ftd-inline-interfaces.png" alt="ftd-inline-interfaces.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 10:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-access-outside-interface-from-inside/m-p/5230015#M1117840</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2024-11-28T10:21:17Z</dc:date>
    </item>
  </channel>
</rss>

