<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD drop VPN Connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320965#M1122267</link>
    <description>&lt;P&gt;You are Smart and totally correct&amp;nbsp;&lt;BR /&gt;RFC1918 must not allow but for anyconnect there are two option to allow traffic&amp;nbsp;&lt;BR /&gt;1- add ACP&lt;BR /&gt;2- use bypass option &amp;lt;&amp;lt;- this more&amp;nbsp; secure&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (309).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/250331i3B9A436C5281C3CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (309).png" alt="Screenshot (309).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Aug 2025 11:29:39 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2025-08-15T11:29:39Z</dc:date>
    <item>
      <title>FTD drop VPN Connection</title>
      <link>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320479#M1122253</link>
      <description>&lt;P&gt;Hello !&lt;/P&gt;&lt;P&gt;I'm&amp;nbsp; trying to configure a VPN for remote access.&lt;/P&gt;&lt;P&gt;On the client side, I'm attempting to connect to the server using its IP address and port number, both of which are correct.&lt;BR /&gt;I can ping the public IP of the server.&lt;/P&gt;&lt;P&gt;However, the connection fails, and the client reports that the server is unreachable—even though the server is online.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The FTD syslog indicates that the packet destined for the VPN server is being dropped:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;%FTD-7-710005: TCP request discarded from x.x.x.x/44194 to outside:y.y.y.y/zzzz&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a specific location or configuration where I need to manually create a rule to allow this connection?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 20:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320479#M1122253</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-13T20:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD drop VPN Connection</title>
      <link>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320481#M1122254</link>
      <description>&lt;P&gt;This log is appear if traffic is drop by ACP&lt;/P&gt;
&lt;P&gt;So add ACP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Outside to inside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From RAVPN pool IP to server IP&lt;/P&gt;
&lt;P&gt;And check again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 20:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320481#M1122254</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-13T20:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD drop VPN Connection</title>
      <link>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320963#M1122266</link>
      <description>&lt;P&gt;I understand your point, thanks&lt;/P&gt;&lt;P&gt;That leads me to another question: I believe traffic from RFC 1918 address space should be blocked if it's coming from the internet gateway (i.e., via a public IP).&lt;/P&gt;&lt;P&gt;Can FTD distinguish whether this traffic is originating from a VPN client versus the internet gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 11:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320963#M1122266</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-15T11:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD drop VPN Connection</title>
      <link>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320965#M1122267</link>
      <description>&lt;P&gt;You are Smart and totally correct&amp;nbsp;&lt;BR /&gt;RFC1918 must not allow but for anyconnect there are two option to allow traffic&amp;nbsp;&lt;BR /&gt;1- add ACP&lt;BR /&gt;2- use bypass option &amp;lt;&amp;lt;- this more&amp;nbsp; secure&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (309).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/250331i3B9A436C5281C3CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (309).png" alt="Screenshot (309).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 11:29:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5320965#M1122267</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-15T11:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD drop VPN Connection</title>
      <link>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5321079#M1122268</link>
      <description>&lt;P&gt;Thank you, I'll try to learn how to use VPN Filter instead of ACL to control VPN traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 17:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-drop-vpn-connection/m-p/5321079#M1122268</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-08-15T17:04:05Z</dc:date>
    </item>
  </channel>
</rss>

