<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Route Offloading on FTD for IPSEC VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257884#M1119389</link>
    <description>&lt;P&gt;My requirement along with this local offloading is one of our internal coder Device(192.168.1.7) should be Natted to public IP in bidirectional way such that it can access internet and it can be accessed from internet.&lt;/P&gt;&lt;P&gt;Below are the plans to achieve these two:&lt;/P&gt;&lt;P&gt;If Route based VPN:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;configure specific routes for the traffic you don't wish to be routed over the VTI via WAN Ip. And add a bidirectional NAT for the internal coder device and PAT alone for the external destinations which need to be offloaded.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If Policy based VPN:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In Encrypted ACL&amp;nbsp;&lt;U&gt;deny&lt;/U&gt;&amp;nbsp;the traffic you don't wish to be encrypted over the VPN and then permit any. Along with this configure the same NAT configs as above.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Could you help me to confirm if my above plan is correct and will work. Correct me if any misses or changes..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 07 Feb 2025 05:05:30 GMT</pubDate>
    <dc:creator>titusroz03</dc:creator>
    <dc:date>2025-02-07T05:05:30Z</dc:date>
    <item>
      <title>Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244667#M1118619</link>
      <description>&lt;P&gt;We have IPSEC VPN setup(HUB to Spoke), were clients access internet through VPN from Site to HUB(Data centre)&lt;/P&gt;&lt;P&gt;I have a requirement of offloading a certain internet destinations towards internet instead of injecting through VPN tunnel, to offload it directly through local internet.&lt;/P&gt;&lt;P&gt;what are the possibilities to achieve this on cisco FTD 1120&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 08:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244667#M1118619</guid>
      <dc:creator>titusroz03</dc:creator>
      <dc:date>2025-01-08T08:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244668#M1118620</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1605542"&gt;@titusroz03&lt;/a&gt; FTD when managed via FMC has basic SDWAN capabilities, you can setup Direct Internet Access from the spoke sites to route some internet traffic direct rather than through the VPN tunnel. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/usecase/b_wan-deployment/m_direct-internet-access-usecase.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/usecase/b_wan-deployment/m_direct-internet-access-usecase.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 08:36:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244668#M1118620</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-08T08:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244679#M1118622</link>
      <description>&lt;P&gt;Sure you can, what is vpn you have&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it VTI&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then only add new static route in ftd point to Wan interface,&lt;/P&gt;
&lt;P&gt;that all&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 09:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244679#M1118622</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-08T09:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244680#M1118623</link>
      <description>&lt;P&gt;Note sure you need NATing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 09:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244680#M1118623</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-08T09:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244698#M1118624</link>
      <description>&lt;P&gt;Which one will be easier to achieve this, policy or route based..?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 09:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244698#M1118624</guid>
      <dc:creator>titusroz03</dc:creator>
      <dc:date>2025-01-08T09:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244700#M1118625</link>
      <description>&lt;P&gt;policy based since you have hub and spoke and you want to direct traffic for specific website via WAN directly instead of forwarding traffic via hub&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 09:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244700#M1118625</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-08T09:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244713#M1118627</link>
      <description>&lt;P&gt;l&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1605542"&gt;@titusroz03&lt;/a&gt; you said you wanted to " offloading a certain internet destinations towards internet instead of injecting through VPN tunnel" - using the SDWAN functionality you can route some websites/applications (i.e. Teams, Webex, Outlook etc) out the local internet, whilst routing the rest of the traffic over the VPN to the DC.&lt;/P&gt;
&lt;P&gt;If you use a traditional Policy Based VPN you need to explictly configure the crypto ACL on which traffic to route over the VPN, anything that is not explictly encrypted would be routed out locally.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 10:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244713#M1118627</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-08T10:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244806#M1118630</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I know is that usually the Cisco device use ACL to define the interested network traffic for VPN tunnel. So I think you could remove the destination that you want to offload from that ACL, then it will stop from taking IPSEC tunnel.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 15:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5244806#M1118630</guid>
      <dc:creator>d3an.chen</dc:creator>
      <dc:date>2025-01-08T15:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257095#M1119348</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/577121"&gt;@d3an.chen&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; Apologies for leaving this conversation idle for long period, I want to start this again. So our last conclusion was to remove the traffic&amp;nbsp; from crypto ACL to get offloaded and leave others for VPN tunnel. On this point my requirement is just to offload some internet destinations and leave all the other traffic (including other internet) to get through tunnel as encrypted. How can we achieve this in cisco FTD..? My understanding is Deny those destinations in Crypto ACL to get them offloaded..? Correct me if this is wrong and also do I need additional configs for those offloaded destinations like static routing..?&lt;/P&gt;&lt;P&gt;And another question is if the same scenario for Route based VTI, how can I achieve..?&amp;nbsp; Should I point the networks to local offload through static routing to WAN ip..?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 11:43:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257095#M1119348</guid>
      <dc:creator>titusroz03</dc:creator>
      <dc:date>2025-02-05T11:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257111#M1119350</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1605542"&gt;@titusroz03&lt;/a&gt; I've not tried it on the FTD at least (only on an ASA) but when configuring the protected networks, select the "Access List (Extended)" in that ACL &lt;U&gt;deny&lt;/U&gt; the traffic you don't wish to be encrypted over the VPN and then permit any.&lt;/P&gt;
&lt;P&gt;If you use a route based VPN then configure specific routes for the traffic you don't wish to be routed over the VTI via a different next hop.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 12:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257111#M1119350</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-05T12:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257253#M1119362</link>
      <description>&lt;P&gt;sorry I will be busy until Sep.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope other help you&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Goodluck&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 19:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257253#M1119362</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-02-05T19:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: Route Offloading on FTD for IPSEC VPN</title>
      <link>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257884#M1119389</link>
      <description>&lt;P&gt;My requirement along with this local offloading is one of our internal coder Device(192.168.1.7) should be Natted to public IP in bidirectional way such that it can access internet and it can be accessed from internet.&lt;/P&gt;&lt;P&gt;Below are the plans to achieve these two:&lt;/P&gt;&lt;P&gt;If Route based VPN:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;configure specific routes for the traffic you don't wish to be routed over the VTI via WAN Ip. And add a bidirectional NAT for the internal coder device and PAT alone for the external destinations which need to be offloaded.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If Policy based VPN:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In Encrypted ACL&amp;nbsp;&lt;U&gt;deny&lt;/U&gt;&amp;nbsp;the traffic you don't wish to be encrypted over the VPN and then permit any. Along with this configure the same NAT configs as above.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Could you help me to confirm if my above plan is correct and will work. Correct me if any misses or changes..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 05:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-offloading-on-ftd-for-ipsec-vpn/m-p/5257884#M1119389</guid>
      <dc:creator>titusroz03</dc:creator>
      <dc:date>2025-02-07T05:05:30Z</dc:date>
    </item>
  </channel>
</rss>

