08-13-2025 01:47 PM
Hello !
I'm trying to configure a VPN for remote access.
On the client side, I'm attempting to connect to the server using its IP address and port number, both of which are correct.
I can ping the public IP of the server.
However, the connection fails, and the client reports that the server is unreachable—even though the server is online.
The FTD syslog indicates that the packet destined for the VPN server is being dropped:
%FTD-7-710005: TCP request discarded from x.x.x.x/44194 to outside:y.y.y.y/zzzz
Is there a specific location or configuration where I need to manually create a rule to allow this connection?
Thank you
Solved! Go to Solution.
08-13-2025 01:53 PM
This log is appear if traffic is drop by ACP
So add ACP
Outside to inside
From RAVPN pool IP to server IP
And check again
MHM
08-13-2025 01:53 PM
This log is appear if traffic is drop by ACP
So add ACP
Outside to inside
From RAVPN pool IP to server IP
And check again
MHM
08-15-2025 04:22 AM
I understand your point, thanks
That leads me to another question: I believe traffic from RFC 1918 address space should be blocked if it's coming from the internet gateway (i.e., via a public IP).
Can FTD distinguish whether this traffic is originating from a VPN client versus the internet gateway?
08-15-2025 04:29 AM
You are Smart and totally correct
RFC1918 must not allow but for anyconnect there are two option to allow traffic
1- add ACP
2- use bypass option <<- this more secure
08-15-2025 10:04 AM
Thank you, I'll try to learn how to use VPN Filter instead of ACL to control VPN traffic.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide