<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTDv in Azure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334003#M970218</link>
    <description>&lt;P&gt;Did anyone get FTDv&amp;nbsp;working in azure&amp;nbsp;?&amp;nbsp;The FTDv&amp;nbsp;is not passing external&amp;nbsp;traffic to the VM .&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:22:37 GMT</pubDate>
    <dc:creator>zi</dc:creator>
    <dc:date>2020-02-21T15:22:37Z</dc:date>
    <item>
      <title>FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334003#M970218</link>
      <description>&lt;P&gt;Did anyone get FTDv&amp;nbsp;working in azure&amp;nbsp;?&amp;nbsp;The FTDv&amp;nbsp;is not passing external&amp;nbsp;traffic to the VM .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334003#M970218</guid>
      <dc:creator>zi</dc:creator>
      <dc:date>2020-02-21T15:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334244#M970219</link>
      <description>Have you watched this YouTube video?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.youtube.com/watch?v=n3tyF9FbUr0&amp;amp;t=1812s" target="_blank"&gt;https://www.youtube.com/watch?v=n3tyF9FbUr0&amp;amp;t=1812s&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Jim&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2018 12:44:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334244#M970219</guid>
      <dc:creator>jimholla</dc:creator>
      <dc:date>2018-02-20T12:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334630#M970220</link>
      <description>&lt;P&gt;Yes, i watched all of his videos . and followed his setup sted by step.&amp;nbsp;I've been working with Cisco TAC and MS Azure support for a Week now without any results!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your response.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 21:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334630#M970220</guid>
      <dc:creator>zi</dc:creator>
      <dc:date>2018-02-20T21:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334631#M970221</link>
      <description>Yes, i watched all of his videos . and followed his setup sted by step. I've been working with Cisco TAC and MS Azure support for a Week now without any results! &lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;Thanks for your response.</description>
      <pubDate>Tue, 20 Feb 2018 21:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334631#M970221</guid>
      <dc:creator>zi</dc:creator>
      <dc:date>2018-02-20T21:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334643#M970222</link>
      <description>Do you have an open TAC case? &lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2018 21:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334643#M970222</guid>
      <dc:creator>jimholla</dc:creator>
      <dc:date>2018-02-20T21:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334644#M970223</link>
      <description>Yes, i  do.  ( 683998759 ) . If you can help it would be awesome.</description>
      <pubDate>Tue, 20 Feb 2018 21:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334644#M970223</guid>
      <dc:creator>zi</dc:creator>
      <dc:date>2018-02-20T21:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334650#M970224</link>
      <description>Let me take a look and get back. It may be tomorrow.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2018 21:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334650#M970224</guid>
      <dc:creator>jimholla</dc:creator>
      <dc:date>2018-02-20T21:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334652#M970225</link>
      <description>Ok , sounds good .&lt;BR /&gt;&lt;BR /&gt;Thank you for your help &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;</description>
      <pubDate>Tue, 20 Feb 2018 21:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334652#M970225</guid>
      <dc:creator>zi</dc:creator>
      <dc:date>2018-02-20T21:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334708#M970226</link>
      <description>&lt;P&gt;What's the basic topology?&amp;nbsp; &amp;nbsp;And what traffic flows do you want to enable.&amp;nbsp; Inbound initiated? Outbound initiated?&amp;nbsp; both?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; FTDv&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;inside&amp;nbsp; outside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Azure&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;VM&amp;nbsp; -------- gig0/0&amp;nbsp; gig0/1 ------Internet GW----- Internet&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;ipVM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ipIN&amp;nbsp; &amp;nbsp; ipOUT&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;..........ipPublic&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Is it something like this?&amp;nbsp; &amp;nbsp;Please confirm or correct as needed.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 00:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334708#M970226</guid>
      <dc:creator>ewaterwo</dc:creator>
      <dc:date>2018-02-21T00:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334789#M970227</link>
      <description>I have a basic topology in Azure , a couple of VM's in Azure and an FTDv . I want to the inbound and outbound traffic to go through the FTDv .  The FTDv have 4 NICs, NIC0 (Managment ) - NIC1(Diagnostics) -NIC2(Outside with a public IP) -NIC3(inside, and defined  as the next hop of the VM's using UDR's ) . All of these are under 1 Vnet .</description>
      <pubDate>Wed, 21 Feb 2018 04:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3334789#M970227</guid>
      <dc:creator>zi</dc:creator>
      <dc:date>2018-02-21T04:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3335334#M970228</link>
      <description>Hi Jimholla , &lt;BR /&gt;&lt;BR /&gt;Did you get the chance to look at this issue, please ?</description>
      <pubDate>Wed, 21 Feb 2018 18:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3335334#M970228</guid>
      <dc:creator>zi</dc:creator>
      <dc:date>2018-02-21T18:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348726#M970229</link>
      <description>&lt;P&gt;Did you ever get a resolution to this? I am having similar issues. TAC didn't seem to be knowledgeable on how Azure works with vFTD. Being new to FTD and Azure I am stuck as well.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 19:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348726#M970229</guid>
      <dc:creator>patricia.guenther</dc:creator>
      <dc:date>2018-03-14T19:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348739#M970230</link>
      <description>&lt;P&gt;Hi Patricia,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's an example with a typical deployment scenario.&amp;nbsp; I'm assuming FTDv is registered with FMCv (if not, we can provide some additional info).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; FTDv&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;inside&amp;nbsp; outside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Azure&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;VM&amp;nbsp; -------- gig0/0&amp;nbsp; gig0/1 ------Internet GW----- Internet&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;ipVM&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;STRONG&gt;ipIN&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp; &lt;STRONG&gt;ipOUT&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;..........&lt;STRONG&gt;ipPublic&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configure the gig0/0 and gig0/1 interfaces with the Private IP addresses that are assigned to them in Azure (&lt;STRONG&gt;ipIN&lt;/STRONG&gt; and &lt;STRONG&gt;ipOUT&lt;/STRONG&gt;). ( FTDv gig0/0 maps to the 3rd NIC in Azure.&amp;nbsp; FTDv gig0/1 maps to the 4th NIC in Azure).&amp;nbsp; &amp;nbsp;Name them ( "inside" and "outside" for example).&amp;nbsp; And give them zones ("inside" and "outside" for example").&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then create a new Public IP in Azure and associated it with your "outside" interface.&amp;nbsp; &amp;nbsp;This will be the effective Public IP for your backend server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once that's done, packets coming from internet will get NATed by Azure to your FTDv outside Private IP (&lt;STRONG&gt;ipOUT&lt;/STRONG&gt;).&amp;nbsp; &amp;nbsp; You would then configure a NAT rule in FTDv (via FMCv gui) to NAT the traffic to the backend IP (&lt;STRONG&gt;ipVM&lt;/STRONG&gt; in the diagram).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In FMC-&amp;gt;Devices-&amp;gt;NAT, create a "Threat Defense NAT" policy and add a rule like this:&lt;/P&gt;
&lt;P&gt;This example will send HTTP to the backend server (&lt;STRONG&gt;ipVM&lt;/STRONG&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;NAT Rule: Manual NAT Rule&lt;BR /&gt;Type: Static&lt;BR /&gt;Enable: enabled&lt;BR /&gt;Interface objects: source interface: "outside"&amp;nbsp; &amp;nbsp;destination interface: "inside"&lt;BR /&gt;Translation: &lt;BR /&gt; Original Source: any-ipv4(0.0.0.0/0)&lt;BR /&gt; Original Destination: Source Interface IP&lt;BR /&gt; Original Source Port: &amp;lt;blank&amp;gt;&lt;BR /&gt; Original Dest Port: HTTP&amp;nbsp;&lt;BR /&gt; Translated Source: Destination Interface IP&lt;BR /&gt; Translated Destination: inside-server (an object you create for &lt;STRONG&gt;ipVM&lt;/STRONG&gt;)&lt;BR /&gt; Translated Source Port: &amp;lt;blank&amp;gt;&lt;BR /&gt; Translated Destination Port: HTTP&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;Once that's done, Packets from the internet should be forwarded to your backend server - they will have a Source IP of FTDv's inside interface (&lt;STRONG&gt;ipIN&lt;/STRONG&gt;) which is needed for the return path.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;There are variations in how to do this but this is a good example.&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;(Also, Make sure no Network Security Groups on the NICs or Subnets are blocking your traffic of interest.)&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 20:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348739#M970230</guid>
      <dc:creator>ewaterwo</dc:creator>
      <dc:date>2018-03-14T20:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348743#M970231</link>
      <description>&lt;P&gt;Thank you! I just configured this NAT policy. One thing I am still confused about is the Azure route tables and how they work with the vFTD. A Cisco video that walked through an Azure setup process had me delete the default routes in the outside and inside Route Tables in Azure and configure one on the vFTD to point to the .1 IP of the outside subnet. The video indicated that once this was done the errors in FMC stating Gig0/0 and 0/1 would go away, but they haven't.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Off to test my NAT statement with a test RDP box. Will let you know if it worked.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 20:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348743#M970231</guid>
      <dc:creator>patricia.guenther</dc:creator>
      <dc:date>2018-03-14T20:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348777#M970232</link>
      <description>In general, the Azure route tables/UDRs determine what next-hop is used for any given packet.   So for traffic you want to route through FTDv, you'd set a UDR route with a next-hop of the FTDv IP.   Inside FTDv we set the route on a particular interface to make sure traffic leaves on that interface - and we use the ".1" as the gateway (the built-in Azure router IP on each subnet) so the packet gets handed to Azure routing.  The packet will then be routed by whatever is in the UDRs on that subnet.</description>
      <pubDate>Wed, 14 Mar 2018 21:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3348777#M970232</guid>
      <dc:creator>ewaterwo</dc:creator>
      <dc:date>2018-03-14T21:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349273#M970233</link>
      <description>&lt;P&gt;Ok that makes sense. If I follow you correctly then the vnet my outside interface sits in needs a UDR default route to the internet. FTD default route points to the .1 router of the outside vnet and right now there is no default route. I created a route to 0.0.0.0/0 to point to next hop of Internet. Correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is very helpful!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 15:03:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349273#M970233</guid>
      <dc:creator>patricia.guenther</dc:creator>
      <dc:date>2018-03-15T15:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349298#M970234</link>
      <description>&lt;P&gt;That sounds right... just to summarize (and add one short cut)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- FTDv would need a route to 0.0.0.0/0 over its "outside" interface with next hop ".1" on the outside subnet.&lt;/P&gt;
&lt;P&gt;- Azure outside subnet already has a default route to the internet for 0.0.0.0/0 (all subnets do) so you shouldn't have to add any outside subnet UDR.&amp;nbsp; (you only need to add a route when you want to override the default routing behaviors).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some general info:&lt;/P&gt;
&lt;P&gt;The Effective Routing Table&amp;nbsp;on any subnet is a combination of automatically built in routes,&amp;nbsp; UDRs, and routes from other sources.&amp;nbsp; &amp;nbsp;The most specific route wins (regardless of the source of the route) but UDR takes precedence in case of tie.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can check the "effective routes" on a subnet&amp;nbsp; by looking at a NIC on the subnet.&amp;nbsp; There's an "effective route" option where you can see all the various routes in the table and where they came from.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 15:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349298#M970234</guid>
      <dc:creator>ewaterwo</dc:creator>
      <dc:date>2018-03-15T15:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349436#M970235</link>
      <description>&lt;P&gt;We are connecting to Azure using Express Route so if I don't put a default route in the outside vnet it will take the one we are injecting via MPLS and Express Route.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 18:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349436#M970235</guid>
      <dc:creator>patricia.guenther</dc:creator>
      <dc:date>2018-03-15T18:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349482#M970236</link>
      <description>&lt;P&gt;AH!&amp;nbsp; ok.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In that case, it would be good to check the effective routes on the "inside" subnets.&amp;nbsp; Make sure the route pointing to FTDv's "inside" interface wins in the "effective route table".&amp;nbsp; &amp;nbsp;You may need a UDR that is more specific than the routes learned from Express Route (via Azure BGP).&amp;nbsp; &amp;nbsp;Or you can turn off BGP propagation on the "inside" route table ( in "configuration")&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 19:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3349482#M970236</guid>
      <dc:creator>ewaterwo</dc:creator>
      <dc:date>2018-03-15T19:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: FTDv in Azure</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3351745#M970237</link>
      <description>&lt;P&gt;So I have more info on this issue now. Topology is as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;inside host (10.15.10.5)--&amp;gt; Inside int FTD (10.15.10.4) --&amp;gt; outside int FTD (10.15.50.4) -- Azure Public IP for FTD interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Inside FTD route table has BGP Express route routes (including default) so I have configured a UDR of 0.0.0.0/0 pointing to 10.15.10.4.&lt;/P&gt;
&lt;P&gt;FTD has a default route to 10.15.50.1 (Azure router IP)&lt;/P&gt;
&lt;P&gt;Outside FTD route table is not receiving BGP routes from Express Route so the effective 0.0.0.0/0 route is coming from Azure and pointing to the Internet.&lt;/P&gt;
&lt;P&gt;FTD has a NAT policy configured as:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;NAT Rule: Auto NAT Rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Type: Dynamic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Source Interface Object - Inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Destination Interface Object - Outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Translation Original Source: any-ip&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Translation Pack: Destination Interface IP&lt;/P&gt;
&lt;P&gt;I try to ping 8.8.8.8 and turned out debug icmp trace on the FTD CLI and I am seeing the source and destination interfaces are both the outside. How is this possible?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;debug icmp trace enabled at level 255&lt;BR /&gt;firepower# ICMP echo request from Outside:10.15.10.5 to Outside:8.8.8.8 ID=1 seq=210 len=32&lt;BR /&gt;ICMP echo request from Outside:10.15.10.5 to Outside:8.8.8.8 ID=1 seq=211 len=32&lt;/P&gt;
&lt;P&gt;My zones appear configured correctly and the vnets is Azure are assigned correctly.&lt;/P&gt;
&lt;P&gt;the 10.15.10.0/24 (inside) vnet is assigned to vnic3 which is Gig0/1 and the 10.15.50.0/24 (outside) vnet is vnic2 which is Gi0/0.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 16:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-azure/m-p/3351745#M970237</guid>
      <dc:creator>patricia.guenther</dc:creator>
      <dc:date>2018-03-20T16:28:08Z</dc:date>
    </item>
  </channel>
</rss>

