We are trying to deploy a FTD 5506W-X at a branch site running code 6.2.3, managed by on-the-box FDM. I stress on FDM since, it is manageable over the data interfaces.
The goal is to manage the device remotely over a site-to-site VPN tunnel back to HQ where all NMS solutions reside.
(Branch) FTD 6.2.3----vpn----ASA 9.8 (HQ)
HTTPS/SSH access on inside interface, in this case BVI1 which the other interfaces are a part of.
We are not able to access either of these ports on any FTD interfaces over the VPN. However, we are able to do so locally.
Please do let us know if someone has been able to implement this successfully.
Well, that certainly works. However, we wouldn't really want SNMP v2 over the internet.
We're trying to get SNMP v3 to work using FlexConfig, because they haven't gotten that to the UI yet.
So, bottom line, one cannot manage FTD over the VPN?
Its hard to understand why Cisco would shutdown 5505, without having migrated everything to the newer platform?
Hello, One way you can manage your device over the VPN is to route the management interface on another device such as a core switch.
site A ---VPN---siteB--Core(L3 device) ---FTD management interface.
Then you can manage it as a host at site B.