10-08-2019 12:25 PM - edited 02-21-2020 09:34 AM
Hello, I have an FTD I am looking to deploy remotely to a home user. Over kill I know. Wondering about being able to manage that guy via FDM via the outside interface? I have an ACL to allow my public to the LAN side of the FTD. I can ping the outside interface. Is there a command or something in fdm that I can designate the outside interface to also be the management interface? Or (because the FTD is acting as a site-to-site vpn device for the honme user) do I re-ip the FTD MGMT interface IP to one in the local LAN?
We have 50+ asa 5505's that are near eol, and looking to replace with NGFW 1010's, so just doing a test now. Device woudl be a site-to-site vpn for the home user, and supplying PoE to their cisco phone.
Solved! Go to Solution.
11-15-2019 12:08 PM
Hey Daniel, I finally got an answer from Cisco TAC. This particular piece is an enhancement request, and I wasn't the only customer on the request.
From the TAC case:
"I had a discussion with high resources that are already involved on my own ticket and they concluded that this is just not supported over FTD code like it does on the ASA code. Having that said, we are in the process of opening an enhancement request so this can be included in future releases."
11-17-2019 04:31 AM
hi marvin,
i'll be doing a POC to manage our ASA ACL and inventory. not sure if you've heard of AlgoSec and was wondering if CDO is better?
we got a mix of ASA 5500-X with and without FP modules and will be looking towards FTD/FP boxes in our next HW refresh.
11-17-2019 04:42 AM
@johnlloyd_13 I've heard of Algosec but never used it.
Generally speaking I'd say CDO is going to be the better solution for a Cisco estate vs. any third party product. Also, Cisco is following an Agile development model with CDO and new features are coming out quite frequently at no additional cost to you.
If you have a multivendor environment then perhaps a third party product will be better - it's likely to cost you a LOT more though.
https://www.scmagazine.com/review/algosec-security-management-solution-2/
11-17-2019 04:49 AM
hi marvin,
thanks for your valuable insight!
i look forward to do some POC or lab up CDO.
CDO looks simple and easy to use as compared to FMC.
06-17-2021 01:51 AM
Hi,
did you ever found a solution for this? I have the exact same problem. VPN Tunnel is up an running but i can`t connect to FDM via the VPN Tunnel.
06-17-2021 02:12 AM
06-17-2021 05:12 AM
Please see the following video showing how we can now do what you're asking (as of release 6.7):
06-17-2021 06:32 AM
Yes, but only when i manage the FTD device via FMC but i wan't to manage it via FDM. The FP 1010 device will be installed at a remote office and builds up a VPN S2S Tunnel to the main Office. I wan't access the FDM over the VPN tunnel.
06-17-2021 06:37 AM
Agree, this is a great step forward for Cisco, but I have the same use case where they are being deployed to remote offices and not managed via the FMC. We don't have the need to manage them through our FMC for a home user, and the amount of home users we have would quickly dwarf the capabilities of our virtual FMC.
Our Solution was to buy some Cisco C881-k9's with the PoE mothercard, and just route all traffic back to a site-to-site vpn at our HQ. All the remote user internet traffic goes through our HQ this way, but was a cheap alternative. And we can monitor them all via SNMP.
06-17-2021 11:16 AM
So you have multiple remote FDM-managed Firepower 1010s that you want to manage via a data interface (inside) that you reach via site-site VPN?
What version are they running? In current versions (6.7 and above) you can enable a data interface to manage the device (even with FDM management only).
(Cisco would recommend you use CDO to manage them all in this use case.)
06-17-2021 11:26 AM
Oh interesting, the video had a screen cap that said it only worked with the FMC. I have a 1010 sitting on a shelf I"ll hook up and try that with. But yeah, hit the nail on the head there, remote FDM managed Firepower 1010's we want to manage via the inside interface over a site-to-site VPN.
06-17-2021 12:34 PM
I already configured that but it dosen't work. The inside interface (vlan10) was not evan pingable, so i configured this command via FlexConfig:
management-access vlan10
After that i was able to ping the inside interface vlan10 via VPN tunnel but FDM access is not working. When i try to open the FDM i can see the https packets incoming in the log but FDM is not reachable.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide