I've deployed a FMC managed FTD at a remote office, where it's managed via OUTSIDE interface.
Usually with an ASA it's possible to query SNMP on the INSIDE interface through the IPSec.
This doesn't seems possible with the FTD. ICMP doesn't work either via the IPSec to INSIDE.
Any solution to this issue?
On ASA - If your VPN tunnel terminates on one interface, but you want to manage the ASA by accessing a different interface, you can identify that interface as a management-access interface. For example, if you enter the ASA from the outside interface, this feature lets you connect to the inside interface using ASDM, SSH, Telnet, or SNMP; or you can ping the inside interface when entering from the outside interface. Management access is available via the following VPN tunnel types: IPsec clients, IPsec site-to-site, and the AnyConnect SSL VPN client.
The management_interface specifies the name of the management interface that you want to access when entering the ASA from another interface.
We can use the same command on FTD, which can be deployed via FMC Flex Policy. An enhancement is already in place to introduce this on the FMC UI, https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz48122
With the Flexconfig added to the FTD via FMC, I got syslog from INSIDE and I'm able to access INSIDE via HTTPS (only for test)
SNMP and SSH on the other hand doesn't work despite of the limited configuration through the FMC.
Any suggests to what I might have overlooked, or is there some kind of limitation?
SNMP and SSH won't work, because they're implemented via nlp_int_tap interface. At least until Cisco re-architects this part of the code. Refer to this post: https://community.cisco.com/t5/cisco-bug-discussions/cscvt97205-snmppoll-snmptrap-to-remote-end-site-to-site-vpn-asa/td-p/4304139
ASA code has the same issue for SNMP (but not for SSH) as of 9.14, with the same root cause.
The status of the corresponding ENH is incorrect: https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt97205. This bug wasn't fixed in the versions listed.