04-24-2018 02:08 PM - edited 02-21-2020 07:40 AM
Gentlemen,
We are trying to deploy a FTD 5506W-X at a branch site running code 6.2.3, managed by on-the-box FDM. I stress on FDM since, it is manageable over the data interfaces.
The goal is to manage the device remotely over a site-to-site VPN tunnel back to HQ where all NMS solutions reside.
(Branch) FTD 6.2.3----vpn----ASA 9.8 (HQ)
Challenge:
HTTPS/SSH access on inside interface, in this case BVI1 which the other interfaces are a part of.
We are not able to access either of these ports on any FTD interfaces over the VPN. However, we are able to do so locally.
Please do let us know if someone has been able to implement this successfully.
04-26-2018 05:16 PM
05-03-2018 02:06 PM
Well, that certainly works. However, we wouldn't really want SNMP v2 over the internet.
We're trying to get SNMP v3 to work using FlexConfig, because they haven't gotten that to the UI yet.
So, bottom line, one cannot manage FTD over the VPN?
Its hard to understand why Cisco would shutdown 5505, without having migrated everything to the newer platform?
05-03-2018 02:16 PM
05-03-2018 02:22 PM
12-27-2018 04:40 PM
Hello, One way you can manage your device over the VPN is to route the management interface on another device such as a core switch.
something like.
site A ---VPN---siteB--Core(L3 device) ---FTD management interface.
Then you can manage it as a host at site B.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide