<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec VPN Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5215288#M1116989</link>
    <description>&lt;P&gt;The AnyConnect ASA does not seem to have any routes configured. It must know where the remote subnets are located and how to route the traffic to them. If the Ubuntu subnet gets translated by the FTDv then you don't have to add a route for that subnet on the AnyConnect ASA but you still need a route to the VPN host subnet. Essentially all the firewalls need to have the correct routes configured to be able to route the traffic between the remote subnets.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Oct 2024 17:49:37 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-10-25T17:49:37Z</dc:date>
    <item>
      <title>IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5213983#M1116901</link>
      <description>&lt;P&gt;Hello, I am trying to configure a IPsec VPN coming from 192.168.1.0/24. It is connected to and FTDv appliance on the inside interface whose IP is 192.168.1.253. The laptop IP is 192.168.1.10. The FTDv is connected to an ASAv running AnyConnect server and that is connected to another ASAv acting as a firewall. On the destination end is another laptop. I want to connect to the network of that laptop to test VPN functionality. Unfortuantely I am stuck and I cant seem to figure it out.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-10-23 172126.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232170iA1E71F59DE9503A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-10-23 172126.png" alt="Screenshot 2024-10-23 172126.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 23:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5213983#M1116901</guid>
      <dc:creator>ajaque27</dc:creator>
      <dc:date>2024-10-23T23:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5214229#M1116906</link>
      <description>&lt;P&gt;As Long as you have VPN Established between Firewalls and you have interesting traffic allowed and routing in place that should work.&lt;/P&gt;
&lt;P&gt;that is high level from what device to what device not working then need to trace the problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 07:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5214229#M1116906</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-10-24T07:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5214288#M1116913</link>
      <description>&lt;P&gt;Please share your sanitized configs of the three firewalls for review. Alternatively it would be difficult to trying to help here : D.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 08:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5214288#M1116913</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-24T08:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5215276#M1116984</link>
      <description>&lt;P&gt;Here is the config for the ASAv AnyConnect Server. I think my issue is at the FTDv. I can't ping from the INSIDE interface to the OUTSIDE interface, which are two different subnets. I also attached screenshots of my static routes and policies on FTDv and an updated topology.&lt;/P&gt;&lt;P&gt;For the policies, I am essentially doing an any-any. I want to be able to ping across. In my topology, I am going from Right to Left.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 17:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5215276#M1116984</guid>
      <dc:creator>ajaque27</dc:creator>
      <dc:date>2024-10-25T17:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5215288#M1116989</link>
      <description>&lt;P&gt;The AnyConnect ASA does not seem to have any routes configured. It must know where the remote subnets are located and how to route the traffic to them. If the Ubuntu subnet gets translated by the FTDv then you don't have to add a route for that subnet on the AnyConnect ASA but you still need a route to the VPN host subnet. Essentially all the firewalls need to have the correct routes configured to be able to route the traffic between the remote subnets.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 17:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5215288#M1116989</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-25T17:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5215292#M1116990</link>
      <description>&lt;P&gt;Thank you for that! For that translation would I create a NAT policy to translate the Ubuntu network IP to the outside interface network?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 17:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5215292#M1116990</guid>
      <dc:creator>ajaque27</dc:creator>
      <dc:date>2024-10-25T17:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5216273#M1117046</link>
      <description>&lt;P&gt;You're welcome. Translating the Ubuntu network into the outside interface IP address would be very common and we call this PAT. However, please keep in mind that NAT/PAT is not mandatory, so if you wish you can carry on with your lab without applying any NAT. In that case, a route needs to be added on the other two firewalls pointing to the FTDv to reach the Ubuntu network.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 16:32:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5216273#M1117046</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-28T16:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5216287#M1117047</link>
      <description>&lt;P&gt;Use tunnelled GW in ASA that anyconnect user connect to.&lt;/P&gt;
&lt;P&gt;In this case the ASA will have one default GW and other tunneled GW&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/112182-ssl-tdg-config-example-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/112182-ssl-tdg-config-example-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 16:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5216287#M1117047</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-28T16:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN Configuration</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5216306#M1117049</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; What are the VPN tunnel endpoints? Is it the FTD and the ASA (which ASA?), or is it Anyconnect (from which PC) to which VPN gateway?&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 17:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-configuration/m-p/5216306#M1117049</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-28T17:24:44Z</dc:date>
    </item>
  </channel>
</rss>

