11-08-2022 03:52 AM
Hi All,
I've deployed a FMC managed FTD at a remote office, where it's managed via OUTSIDE interface.
Usually with an ASA it's possible to query SNMP on the INSIDE interface through the IPSec.
This doesn't seems possible with the FTD. ICMP doesn't work either via the IPSec to INSIDE.
Any solution to this issue?
Regards,
Michael
11-08-2022 08:10 PM
On ASA - If your VPN tunnel terminates on one interface, but you want to manage the ASA by accessing a different interface, you can identify that interface as a management-access interface. For example, if you enter the ASA from the outside interface, this feature lets you connect to the inside interface using ASDM, SSH, Telnet, or SNMP; or you can ping the inside interface when entering from the outside interface. Management access is available via the following VPN tunnel types: IPsec clients, IPsec site-to-site, and the AnyConnect SSL VPN client.
management-access management_interface
The management_interface specifies the name of the management interface that you want to access when entering the ASA from another interface.
We can use the same command on FTD, which can be deployed via FMC Flex Policy. An enhancement is already in place to introduce this on the FMC UI, https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz48122
11-09-2022 12:00 AM
Yes - this is exactly the option I'm missing on the FTD via FMC.
Just making sure, setting this option, will NOT change the interface where the FMC is managing the device?
11-14-2022 04:39 AM
With the Flexconfig added to the FTD via FMC, I got syslog from INSIDE and I'm able to access INSIDE via HTTPS (only for test)
SNMP and SSH on the other hand doesn't work despite of the limited configuration through the FMC.
Any suggests to what I might have overlooked, or is there some kind of limitation?
11-23-2022 08:16 AM
Have you doublechecked the NAT/route for the snmp host IP ?
11-24-2022 12:59 AM
11-25-2022 07:09 AM
SNMP and SSH won't work, because they're implemented via nlp_int_tap interface. At least until Cisco re-architects this part of the code. Refer to this post: https://community.cisco.com/t5/cisco-bug-discussions/cscvt97205-snmppoll-snmptrap-to-remote-end-site-to-site-vpn-asa/td-p/4304139
ASA code has the same issue for SNMP (but not for SSH) as of 9.14, with the same root cause.
The status of the corresponding ENH is incorrect: https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt97205. This bug wasn't fixed in the versions listed.
HTH
11-24-2022 01:56 AM
can you draw the topology ?
11-25-2022 05:09 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide