02-19-2018 08:02 PM - edited 02-21-2020 07:22 AM
Did anyone get FTDv working in azure ? The FTDv is not passing external traffic to the VM .
Solved! Go to Solution.
02-20-2018 01:57 PM
02-20-2018 04:36 PM - edited 02-20-2018 04:38 PM
What's the basic topology? And what traffic flows do you want to enable. Inbound initiated? Outbound initiated? both?
FTDv
inside outside Azure
VM -------- gig0/0 gig0/1 ------Internet GW----- Internet
ipVM ipIN ipOUT
..........ipPublic
Is it something like this? Please confirm or correct as needed.
02-20-2018 04:44 AM
02-20-2018 01:32 PM
Yes, i watched all of his videos . and followed his setup sted by step. I've been working with Cisco TAC and MS Azure support for a Week now without any results!
Thanks for your response.
02-20-2018 01:46 PM
02-20-2018 01:50 PM
02-20-2018 01:57 PM
02-20-2018 01:59 PM
02-20-2018 04:36 PM - edited 02-20-2018 04:38 PM
What's the basic topology? And what traffic flows do you want to enable. Inbound initiated? Outbound initiated? both?
FTDv
inside outside Azure
VM -------- gig0/0 gig0/1 ------Internet GW----- Internet
ipVM ipIN ipOUT
..........ipPublic
Is it something like this? Please confirm or correct as needed.
02-20-2018 08:19 PM
02-21-2018 10:06 AM
03-14-2018 12:59 PM
Did you ever get a resolution to this? I am having similar issues. TAC didn't seem to be knowledgeable on how Azure works with vFTD. Being new to FTD and Azure I am stuck as well.
03-14-2018 01:34 PM - edited 03-14-2018 01:35 PM
Hi Patricia,
Here's an example with a typical deployment scenario. I'm assuming FTDv is registered with FMCv (if not, we can provide some additional info).
FTDv
inside outside Azure
VM -------- gig0/0 gig0/1 ------Internet GW----- Internet
ipVM ipIN ipOUT
..........ipPublic
Configure the gig0/0 and gig0/1 interfaces with the Private IP addresses that are assigned to them in Azure (ipIN and ipOUT). ( FTDv gig0/0 maps to the 3rd NIC in Azure. FTDv gig0/1 maps to the 4th NIC in Azure). Name them ( "inside" and "outside" for example). And give them zones ("inside" and "outside" for example").
Then create a new Public IP in Azure and associated it with your "outside" interface. This will be the effective Public IP for your backend server.
Once that's done, packets coming from internet will get NATed by Azure to your FTDv outside Private IP (ipOUT). You would then configure a NAT rule in FTDv (via FMCv gui) to NAT the traffic to the backend IP (ipVM in the diagram).
In FMC->Devices->NAT, create a "Threat Defense NAT" policy and add a rule like this:
This example will send HTTP to the backend server (ipVM):
NAT Rule: Manual NAT Rule
Type: Static
Enable: enabled
Interface objects: source interface: "outside" destination interface: "inside"
Translation:
Original Source: any-ipv4(0.0.0.0/0)
Original Destination: Source Interface IP
Original Source Port: <blank>
Original Dest Port: HTTP
Translated Source: Destination Interface IP
Translated Destination: inside-server (an object you create for ipVM)
Translated Source Port: <blank>
Translated Destination Port: HTTP
Once that's done, Packets from the internet should be forwarded to your backend server - they will have a Source IP of FTDv's inside interface (ipIN) which is needed for the return path.
There are variations in how to do this but this is a good example.
(Also, Make sure no Network Security Groups on the NICs or Subnets are blocking your traffic of interest.)
03-14-2018 01:47 PM
Thank you! I just configured this NAT policy. One thing I am still confused about is the Azure route tables and how they work with the vFTD. A Cisco video that walked through an Azure setup process had me delete the default routes in the outside and inside Route Tables in Azure and configure one on the vFTD to point to the .1 IP of the outside subnet. The video indicated that once this was done the errors in FMC stating Gig0/0 and 0/1 would go away, but they haven't.
Off to test my NAT statement with a test RDP box. Will let you know if it worked.
03-14-2018 02:54 PM
03-15-2018 08:03 AM
Ok that makes sense. If I follow you correctly then the vnet my outside interface sits in needs a UDR default route to the internet. FTD default route points to the .1 router of the outside vnet and right now there is no default route. I created a route to 0.0.0.0/0 to point to next hop of Internet. Correct?
This is very helpful!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide