<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FPR-1010 and Remote management via FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307072#M1121707</link>
    <description>&lt;P&gt;Thanks for the quick reply.&amp;nbsp; I guess my question would be my FMC does not have public facing IP. So I'll have to create a specific NAT rule for this it sounds like?&amp;nbsp; If it makes any difference these "remote" locations are actually on campus or close by.&amp;nbsp; A few within walking distance and another one that isn't far down the road.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Jul 2025 19:04:37 GMT</pubDate>
    <dc:creator>neteng2323</dc:creator>
    <dc:date>2025-07-08T19:04:37Z</dc:date>
    <item>
      <title>Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307066#M1121703</link>
      <description>&lt;P&gt;I have a handful of FP 1010s that came with FTD installed.&amp;nbsp; These will be used for a basic S2S VPN connection back to a FP3130.&amp;nbsp; I'd like to manage these via FMC but I'm struggling with the documentation to understand a clear path to getting this accomplished.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The management traffic would need to traverse the public internet so would it be best to include the FMC IP within the VPN configuration?&amp;nbsp; I read that it can also be accomplished by doing some NAT forwarding but this seems overly complicated.&amp;nbsp; At the same time it seems like a chicken before the egg scenario where i need to configure the firewalls to talk to the FMC first before deploying them in the field and then having them talk over a VPN tunnel.&lt;BR /&gt;&lt;BR /&gt;The 1010s will be going into locations that have a static IP that will be used for the outside interface.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 18:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307066#M1121703</guid>
      <dc:creator>neteng2323</dc:creator>
      <dc:date>2025-07-08T18:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307070#M1121705</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314585"&gt;@neteng2323&lt;/a&gt;&amp;nbsp;I've not come across anyone doing that for a while, it's asking for trouble IMO. I would recommand using a data interface to establish the connectivity over the internet (outside of the VPN tunnel), the connectivity would be encrypted and no reliance on the VPN tunnel.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307070#M1121705</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-08T19:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307071#M1121706</link>
      <description>&lt;P&gt;You can use outside to connect to FMC&lt;/P&gt;
&lt;P&gt;This traffic pass over VPN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to use acl in VPN that includes host outside &amp;lt;-&amp;gt; host&amp;nbsp; server&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to enable management-access in outside interface&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307071#M1121706</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-08T19:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307072#M1121707</link>
      <description>&lt;P&gt;Thanks for the quick reply.&amp;nbsp; I guess my question would be my FMC does not have public facing IP. So I'll have to create a specific NAT rule for this it sounds like?&amp;nbsp; If it makes any difference these "remote" locations are actually on campus or close by.&amp;nbsp; A few within walking distance and another one that isn't far down the road.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307072#M1121707</guid>
      <dc:creator>neteng2323</dc:creator>
      <dc:date>2025-07-08T19:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307073#M1121708</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314585"&gt;@neteng2323&lt;/a&gt;&amp;nbsp;yes, you'd need a static NAT/PAT for the FMC tcp/8305 and an Access Control rule, which restricts communication from known IP addresses to/from the FMC.&lt;/P&gt;
&lt;P&gt;Attempting to route the management traffic over a VPN where the VPN is managed by the FMC that routes over the VPN tunnel is asking for trouble if there are any problems. Typically most firewalls would be managed over the internet over the data interface, communication would be tranmitted securely, so no concerns there.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307073#M1121708</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-08T19:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307075#M1121709</link>
      <description>&lt;P&gt;Ok so the communication between the FMC and firewalls is essentially encrypted then?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:12:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307075#M1121709</guid>
      <dc:creator>neteng2323</dc:creator>
      <dc:date>2025-07-08T19:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307081#M1121711</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314585"&gt;@neteng2323&lt;/a&gt;&amp;nbsp;Yes, when the registration is complete, the FTD and the FMC establish a secure (encrypted) tunnel called &lt;STRONG&gt;sftunnel&lt;/STRONG&gt;, all communication between the FMC/FTD is subsequently transmitted securely over this connection.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307081#M1121711</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-08T19:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307959#M1121745</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for these details.&amp;nbsp; So if I'm understanding you I'll need the FP1010 outside interface IP included on the FMC side firewall, and the FMC IP included on the FP1010 side?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 18:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307959#M1121745</guid>
      <dc:creator>neteng2323</dc:creator>
      <dc:date>2025-07-10T18:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR-1010 and Remote management via FMC</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307968#M1121746</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314585"&gt;@neteng2323&lt;/a&gt;&amp;nbsp;yes, on the FTD in front of the FMC you'd permit traffic to/from the outside IP address of the remote FTD to the FMC (real&amp;nbsp; IP). On the remote FTD you configure the NAT (public) IP address of the FMC and then register the remote FTD from the FTD to establish the communication.&lt;/P&gt;
&lt;P&gt;You can use the&amp;nbsp;command &lt;STRONG&gt;&lt;EM&gt;sudo tail -f /ngfw/var/logs/messages&lt;/EM&gt;&lt;/STRONG&gt; for troubleshooting the registration, if required.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 18:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-and-remote-management-via-fmc/m-p/5307968#M1121746</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-10T18:39:51Z</dc:date>
    </item>
  </channel>
</rss>

