<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem firepower module throught vpn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-firepower-module-throught-vpn/m-p/3747048#M8956</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should be able to connect to the module remotely. The firepower module uses the management interface(interface Management1/1).&amp;nbsp; Connect the management interface to you switch, configure the module with ip address and default gateway for the network you will use for management. You should then be able to connect to the module.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
    <pubDate>Thu, 15 Nov 2018 01:29:05 GMT</pubDate>
    <dc:creator>johnd2310</dc:creator>
    <dc:date>2018-11-15T01:29:05Z</dc:date>
    <item>
      <title>Problem firepower module throught vpn</title>
      <link>https://community.cisco.com/t5/network-security/problem-firepower-module-throught-vpn/m-p/3746706#M8953</link>
      <description>&lt;P&gt;Good day&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a site to site vpn and i would like manage the firepower module from remote network&lt;/P&gt;
&lt;P&gt;but&amp;nbsp;&lt;SPAN&gt;I can not make it work&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is This possible?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This is my configuration&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-firepower-module-throught-vpn/m-p/3746706#M8953</guid>
      <dc:creator>drios</dc:creator>
      <dc:date>2020-02-21T16:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Problem firepower module throught vpn</title>
      <link>https://community.cisco.com/t5/network-security/problem-firepower-module-throught-vpn/m-p/3747048#M8956</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should be able to connect to the module remotely. The firepower module uses the management interface(interface Management1/1).&amp;nbsp; Connect the management interface to you switch, configure the module with ip address and default gateway for the network you will use for management. You should then be able to connect to the module.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 01:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-firepower-module-throught-vpn/m-p/3747048#M8956</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-11-15T01:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Problem firepower module throught vpn</title>
      <link>https://community.cisco.com/t5/network-security/problem-firepower-module-throught-vpn/m-p/3819166#M8959</link>
      <description>&lt;P&gt;I dont have a switch, so i config a ip in the interface gi0/8, and i connect this interface to mgmt&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I add a route in the firepower module to remote_network. My vpn is a site to site ,&amp;nbsp;&lt;SPAN&gt;I have tried everything but without success&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Demo-Capa3# show run&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: JAD223605XV&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2)27&lt;BR /&gt;!&lt;BR /&gt;hostname Demo-Capa3&lt;BR /&gt;enable password $sha512$5000$KFNKbtm4RMbdzTHV+B1EMQ==$GlnzgT7PSZYvvy6u551Zsw== pbkdf2&lt;BR /&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address pppoe setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa992-27-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring 1 Sun Apr 2:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network LAN&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;object network RED_REMOTE_FORTI&lt;BR /&gt;subnet 192.168.1.0 255.255.255.192&lt;BR /&gt;object network IP_10.10.10.200&lt;BR /&gt;host 10.10.10.200&lt;BR /&gt;object network Subred_10.10.20.0&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network SUB_REMOTE_VPN_ADMIN_SLP&lt;BR /&gt;subnet 172.22.1.0 255.255.255.0&lt;BR /&gt;object network SUB_REMOTE_VPN_DATOS_SLP&lt;BR /&gt;subnet 172.22.10.0 255.255.255.0&lt;BR /&gt;object network SUB_REMOTE_VPN_VOZ_SLP&lt;BR /&gt;subnet 172.22.100.0 255.255.255.0&lt;BR /&gt;object network RED_40&lt;BR /&gt;subnet 10.10.40.0 255.255.255.0&lt;BR /&gt;object network RED_50&lt;BR /&gt;subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;object-group network SUBREDES_LOCALES_VPN&lt;BR /&gt;network-object object Subred_10.10.20.0&lt;BR /&gt;network-object object LAN&lt;BR /&gt;object-group service HTTP&lt;BR /&gt;service-object tcp-udp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;object-group network SUBREDES_REMOTAS_VPN_SLP&lt;BR /&gt;network-object object SUB_REMOTE_VPN_ADMIN_SLP&lt;BR /&gt;network-object object SUB_REMOTE_VPN_DATOS_SLP&lt;BR /&gt;network-object object SUB_REMOTE_VPN_VOZ_SLP&lt;BR /&gt;object-group network SUBREDES_LEON&lt;BR /&gt;network-object object LAN&lt;BR /&gt;network-object object RED_40&lt;BR /&gt;network-object object RED_50&lt;BR /&gt;access-list 121_list extended permit ip object-group SUBREDES_LOCALES_VPN object RED_REMOTE_FORTI&lt;BR /&gt;access-list OUT-IN extended permit tcp any object IP_10.10.10.200 eq www&lt;BR /&gt;access-list VPN-FILTER extended permit ip object RED_REMOTE_FORTI object LAN&lt;BR /&gt;access-list VPN-FILTER extended permit ip object RED_REMOTE_FORTI object Subred_10.10.20.0&lt;BR /&gt;access-list VPN-SUBREDES_TO_SLP extended permit ip object LAN object-group SUBREDES_REMOTAS_VPN_SLP&lt;BR /&gt;access-list TEST extended permit tcp any any eq www&lt;BR /&gt;access-list TEST extended permit tcp any any eq https&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7101.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (inside,outside) source static LAN LAN destination static RED_REMOTE_FORTI RED_REMOTE_FORTI no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static LAN LAN destination static SUBREDES_REMOTAS_VPN_SLP SUBREDES_REMOTAS_VPN_SLP no-proxy-arp route-lookup&lt;BR /&gt;nat (MGMT,outside) source static Subred_10.10.20.0 Subred_10.10.20.0 destination static RED_REMOTE_FORTI RED_REMOTE_FORTI route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network IP_10.10.10.200&lt;BR /&gt;nat (inside,outside) static interface service tcp www 32000&lt;BR /&gt;!&lt;BR /&gt;nat (MGMT,outside) after-auto source dynamic Subred_10.10.20.0 interface&lt;BR /&gt;nat (inside,outside) after-auto source dynamic SUBREDES_LEON interface&lt;BR /&gt;access-group OUT-IN in interface outside&lt;BR /&gt;route inside 10.10.40.0 255.255.255.0 10.10.10.254 1&lt;BR /&gt;route inside 10.10.50.0 255.255.255.0 10.10.10.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.10.10.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.10.10.0 255.255.255.0 MGMT&lt;BR /&gt;http 192.168.1.0 255.255.255.0 MGMT&lt;BR /&gt;http 10.10.20.0 255.255.255.0 MGMT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set FirstSet esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal secure&lt;BR /&gt;protocol esp encryption aes 3des des&lt;BR /&gt;protocol esp integrity sha-1&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal PHASE2-SLP&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map vpn_site_to_site 1 match address 121_list&lt;BR /&gt;crypto map vpn_site_to_site 1 set pfs&lt;BR /&gt;crypto map vpn_site_to_site 1 set peer 1.1.1.1&lt;BR /&gt;crypto map vpn_site_to_site 1 set ikev1 transform-set FirstSet&lt;BR /&gt;crypto map vpn_site_to_site 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map vpn_site_to_site 2 match address VPN-SUBREDES_TO_SLP&lt;BR /&gt;crypto map vpn_site_to_site 2 set peer 2.2.2.2&lt;BR /&gt;crypto map vpn_site_to_site 2 set ikev2 ipsec-proposal PHASE2-SLP&lt;BR /&gt;crypto map vpn_site_to_site 2 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map vpn_site_to_site interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 14&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 84600&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 10.10.10.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.10.10.0 255.255.255.0 MGMT&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;ssh version 1 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access MGMT&lt;BR /&gt;vpdn group Telmex request dialout pppoe&lt;BR /&gt;vpdn group Telmex localname xxxx@prodigy.net.mx&lt;BR /&gt;vpdn group Telmex ppp authentication pap&lt;BR /&gt;vpdn username xxxx@prodigy.net.mx password *****&lt;/P&gt;
&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;dhcpd option 3 ip 10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.10.20-10.10.10.40 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy VPN-SITE-TO-SITE internal&lt;BR /&gt;group-policy VPN-SITE-TO-SITE attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username daniel password $sha512$5000$1Jn44qMFkBekjfbH/itnEA==$LsPLYbkCpL0WmzMk0K3L3w== pbkdf2 privilege 15&lt;BR /&gt;tunnel-group 1.1.1.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 1.1.1.1 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 2.2.2.2 type ipsec-l2l&lt;BR /&gt;tunnel-group 2.2.2.2 ipsec-attributes&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;match any&lt;BR /&gt;class-map TEST&lt;BR /&gt;match access-list TEST&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;class global-class&lt;BR /&gt;sfr fail-open&lt;BR /&gt;class TEST&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:b3a8ed93f755d9362486ebb1137254d3&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 00:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-firepower-module-throught-vpn/m-p/3819166#M8959</guid>
      <dc:creator>drios</dc:creator>
      <dc:date>2019-03-14T00:47:52Z</dc:date>
    </item>
  </channel>
</rss>

