<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Site to Site VPN access control policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701296#M925833</link>
    <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To my understanding you need to add a Rule to the Acces Control Policy to allow traffic through the tunnel (if not set the "&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: nowrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #d9e9ff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Bypass Access Control policy for decrypted traffic&lt;/SPAN&gt;" option)&lt;/P&gt;
&lt;P&gt;Since i am not able to to select another specific criteria for VPN i am also allowing traffic coming from outside (when vpn tunnel is not up) with this rule don't I?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;kind regards&lt;/P&gt;
&lt;P&gt;Tobias&lt;/P&gt;</description>
    <pubDate>Wed, 05 Sep 2018 15:30:51 GMT</pubDate>
    <dc:creator>Tobias Hilbert</dc:creator>
    <dc:date>2018-09-05T15:30:51Z</dc:date>
    <item>
      <title>FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3407431#M925829</link>
      <description>&lt;P&gt;When building the site to site VPN in FTD/FMC where does the tunnel endpoint exist (what zone)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, in Palo Alto, a tunnel can be placed into it's own zone and the access control policy uses that zone to send traffic to or receive from a remote site that is associated with that tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In FTD, how do you associate a tunnel zone to a vpn or associate a vpn with a zone to write the rules in the access control policy?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the document here (&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_threat_defense_site_to_site_vpns.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_threat_defense_site_to_site_vpns.pdf&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;there is a section that says in the vpn configuration that&amp;nbsp; "access control lists will be generated from the choices made here (in the Protected networks config)".&amp;nbsp; Where are those ACLs?&amp;nbsp; Does that mean that rules don't need to be written in the access control policy?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3407431#M925829</guid>
      <dc:creator>Andy Infante</dc:creator>
      <dc:date>2020-02-21T15:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3411170#M925830</link>
      <description>No one knows the answer??</description>
      <pubDate>Thu, 05 Jul 2018 23:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3411170#M925830</guid>
      <dc:creator>Andy Infante</dc:creator>
      <dc:date>2018-07-05T23:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3411247#M925831</link>
      <description>&lt;P&gt;The ACLs they refer to are the ones used in the cryptomap. The underlying logic is almost exactly the same as on an ASA as this feature is using the Lina subsystem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't believe you can (currently as of Firepower 6.2.3) further restrict the access with additional ACLs (e.g. as you would do with vpn-filter on a traditional ASA)&amp;nbsp; once you allow the addresses to communicate as part of your site-site VPN&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jul 2018 03:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3411247#M925831</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-07-06T03:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3411618#M925832</link>
      <description>So what you are saying is once the VPN is built using the FMC GUI it's "done?"  There's no other configurations, no ACLs to build associated with a tunnel, etc...?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;What is the purpose, are you aware, of the "tunnel" zone?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Andy&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Jul 2018 14:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3411618#M925832</guid>
      <dc:creator>Andy Infante</dc:creator>
      <dc:date>2018-07-06T14:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701296#M925833</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To my understanding you need to add a Rule to the Acces Control Policy to allow traffic through the tunnel (if not set the "&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: nowrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #d9e9ff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Bypass Access Control policy for decrypted traffic&lt;/SPAN&gt;" option)&lt;/P&gt;
&lt;P&gt;Since i am not able to to select another specific criteria for VPN i am also allowing traffic coming from outside (when vpn tunnel is not up) with this rule don't I?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;kind regards&lt;/P&gt;
&lt;P&gt;Tobias&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 15:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701296#M925833</guid>
      <dc:creator>Tobias Hilbert</dc:creator>
      <dc:date>2018-09-05T15:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701427#M925834</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295267"&gt;@Tobias Hilbert&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ACP rule for a site-site VPN is only allowing the remote site subnet(s) inbound, not any other random traffic from outside.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 17:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701427#M925834</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-05T17:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701861#M925835</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not shure how to make sure that the rule only matches the Traffic coming from the VPN Tunnel.&lt;/P&gt;
&lt;P&gt;If I add the rule based on Source Network and Destination Network, The rule would also match traffic coming unencrypted from the outside interface if the Source and destiantion matches. I would like to add a "source zone" like "VPN" to the rule but that is not available. The eventviewer shows the&amp;nbsp; decrypted vpn packet coning from INTERNET Zone.&lt;/P&gt;
&lt;P&gt;Now if i decommision the vpn or the tunnel might not be up i think the FW is accepting Packet with the correct SRC / DST coming from the INNTERNET Zone thus the Outside?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am looking for a configuration option to tie that APC to the VPN besides SRC / DST IP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;kind regards&lt;/P&gt;
&lt;P&gt;Tobias&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 09:36:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701861#M925835</guid>
      <dc:creator>Tobias Hilbert</dc:creator>
      <dc:date>2018-09-06T09:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701876#M925836</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry for bothering &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I found the solution.&lt;/P&gt;
&lt;P&gt;There is a option to assign a VPN Session to a "tunnel-zone" through a prefilter policy rule.&lt;/P&gt;
&lt;P&gt;This tunnel-zone is then available as a ZONE object in the ACP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;kind regards&lt;/P&gt;
&lt;P&gt;Tobias&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 09:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701876#M925836</guid>
      <dc:creator>Tobias Hilbert</dc:creator>
      <dc:date>2018-09-06T09:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701886#M925837</link>
      <description>&lt;P&gt;Is the remote protected network using public IP addresses internally? How about your internal network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Normally the ACP says allow remote private network to local private network. If they are both RFC 1918 spaces then there's no way you should see other incoming traffic with that destination.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 09:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3701886#M925837</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-06T09:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Site to Site VPN access control policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3709119#M925838</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;well if you trust your service provider that is true.&lt;/P&gt;
&lt;P&gt;But if the service provider uses a RFC1918 Networks within his Backbone (actually I have already had a case where our Firewall learned 10.0.0.0/8 subnets over OSPF from a ISP) he might&amp;nbsp; then be able to pass the firewall if the tunnel is down.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I played around with the Prefilter and Tunnel Tag but that is not working as expected. I thought it did but alter the upgrade to 6.2.3.5 its not working anymore.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only a rule like 10.10.10.0/24 10.20.20.20/24 port 443 without any other argument lets the traffic pass.&lt;/P&gt;
&lt;P&gt;I am wondering whats the best practice for a Site2Site tunnel on FTD.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;kind regards&lt;/P&gt;
&lt;P&gt;Tobias&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 21:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-site-to-site-vpn-access-control-policy/m-p/3709119#M925838</guid>
      <dc:creator>Tobias Hilbert</dc:creator>
      <dc:date>2018-09-18T21:33:03Z</dc:date>
    </item>
  </channel>
</rss>

