<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FPR1010 ASA v9.18(2) Management Access Inside question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195396#M1115846</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/2204"&gt;@TRENT WAITE&lt;/a&gt; from ASA 9.14 for SNMP polling over a site-to-site VPN, you had to include the IP address of the outside interface in the crypto map access-list as part of the VPN configuration.&lt;/P&gt;
&lt;P&gt;In ASA 9.18 you can use a loopback interface for SNMP, so perhaps route that loopback network over the VPN. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Sep 2024 13:35:54 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-09-17T13:35:54Z</dc:date>
    <item>
      <title>FPR1010 ASA v9.18(2) Management Access Inside question</title>
      <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195393#M1115845</link>
      <description>&lt;P&gt;I know a couple years back, and couple OS revisions back, there was a significant change to how one could access via SNMP the ASA's inside interface through a L2L tunnel. I have encountered now 2x FPR1010 (ASAs) with v9.18(2) that through the VPN I can not access the ASA's inside interface (ping, SSH, etc.) either direction. From the ASA I can ping a server, and traffic will not initiate tunnel. From the server I can initiate tunnel but no traffic.&lt;/P&gt;&lt;P&gt;I am not aware of what has actually changed, and what I can do for a work around. The purpose is usually to access the ASA from within the tunnel, and to save configs to tftp (within the tunnel) as well as remote monitoring (until the SNMP change).&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone else encountering similar, and was there a solution you found?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 13:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195393#M1115845</guid>
      <dc:creator>TRENT WAITE</dc:creator>
      <dc:date>2024-09-17T13:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1010 ASA v9.18(2) Management Access Inside question</title>
      <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195396#M1115846</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/2204"&gt;@TRENT WAITE&lt;/a&gt; from ASA 9.14 for SNMP polling over a site-to-site VPN, you had to include the IP address of the outside interface in the crypto map access-list as part of the VPN configuration.&lt;/P&gt;
&lt;P&gt;In ASA 9.18 you can use a loopback interface for SNMP, so perhaps route that loopback network over the VPN. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 13:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195396#M1115846</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-09-17T13:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1010 ASA v9.18(2) Management Access Inside question</title>
      <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195407#M1115849</link>
      <description>&lt;P&gt;I am not aware of loopback's being created on the ASA platform.&amp;nbsp; I can not create interfaces, only use what is available. Can the management port be used in this situation, i.e. provide that port with new IP/subnet and add to tunnel config &amp;amp; ACLs?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 13:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195407#M1115849</guid>
      <dc:creator>TRENT WAITE</dc:creator>
      <dc:date>2024-09-17T13:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1010 ASA v9.18(2) Management Access Inside question</title>
      <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195417#M1115852</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/2204"&gt;@TRENT WAITE&lt;/a&gt; the easiest thing to do would be to include the outside IP address in the crypto ACL.&lt;/P&gt;
&lt;P&gt;Perhaps you could connect the ASA mgmt interface to a VLAN on the local switch and route that network over the VPN (include that network in the crypto ACL).&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 14:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195417#M1115852</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-09-17T14:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1010 ASA v9.18(2) Management Access Inside question</title>
      <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195427#M1115853</link>
      <description>&lt;P&gt;Use outside as source interface to connect for snmp' and then include host IP of outside interface in VPN ACL.&lt;/P&gt;
&lt;P&gt;Try this way&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 14:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195427#M1115853</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-17T14:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1010 ASA v9.18(2) Management Access Inside question</title>
      <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195433#M1115855</link>
      <description>&lt;P&gt;I was using the change to SNMP as an example of changes the ASAs have made. My real problem is I need to access the inside interface of the ASA to send a config to the tftp server, or to access it from the server to make a necessary change. The old solution when this situation occurred was due to the "management access inside" not being applied to the config. That is no longer the case, the fix for access to that inside interface of the ASA is what is eluding me.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 14:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195433#M1115855</guid>
      <dc:creator>TRENT WAITE</dc:creator>
      <dc:date>2024-09-17T14:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1010 ASA v9.18(2) Management Access Inside question</title>
      <link>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195444#M1115856</link>
      <description>&lt;P&gt;You can use flexconfig for add mgmt access inside if not work check bug below&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg50549?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg50549?rfs=iqvred&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 14:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1010-asa-v9-18-2-management-access-inside-question/m-p/5195444#M1115856</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-17T14:57:19Z</dc:date>
    </item>
  </channel>
</rss>

