11-29-2024 01:13 AM
Hi,
I'm thinking about follwing internet edge FTD setup for branch offices. Firewall pair FTD1a/b has two interfaces in public provider outside VLAN.
The local AnyConnect VPN peer on FTD2a/b should be accessible from the local guest network, hence it can't be on the same firewall that provides outbound access (FTD1a/b). In the lab I did such a setup and am able to access from inside through FTD1a/b the outside IP of the device FTD2a/b behind the inline interface.
Is this a supported and common setup or am I walking here on uncharted territory full of boobie traps?
When looking on FMC connection events, I see that the unicast traffic that FTD1a/b receives from inside and should be sent to the router also is sent to the inline interface. Is this normal? I would expect only to see broadcast traffic from the same VLAN to be seen on the inline interface. The FMC management guide [1] states: "Inline interfaces receive all traffic unconditionally, but all traffic received on these interfaces is retransmitted out of an inline set unless explicitly dropped." So inline interface behaves like a hub and not a switch?
An alternative would be a FTD pair in transparent mode to do threat-protection of AnyConnect VPN peer, but then this would require one additional firewall pair.
Thanks in advance for enlightenment.
Regards,
Bernd
11-30-2024 12:18 PM
Version 7.7 introduces geolocation based RAVPN filtering.
12-03-2024 04:35 AM
FTD 7.7 is a long way to go. Current suggested release is 7.4.2. Also original question was more about having inline interface and routed interface in same VLAN causing troubles as also unicast traffic that should go to default gateway is being seen on the inline interface.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide