cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4423
Views
7
Helpful
23
Replies

Cisco FMC/FTD site-to-site VPN 'set nat-t disable' LINA configuration

When creating a policy-based VPN on FMC, how do you get the CLI equivalent of what would be configured on an ASA as 'crypto map CSM_outside_map 1 set nat-t disable' to get configured on the FTD?

With ASDM its a tick box in the Advanced, Crypto Map Entry section or from the CLI its 'crypto map <name> 1 set nat-t disable'.

With FMC, there is a tick box for 'Enable NAT Traversal' when editing the local endpoint, but not the remote, however this doesn't translate to applying the same LINA command.

Disabling NAT Keepalive messages in the Advanced Tunnel section, applies the global command 'no crypto isakmp nat-traversal', however this is global and I need to do it on a peer basis.

FMC/FTD 7.2.5

 

1 Accepted Solution

Accepted Solutions

Of course it will throw an error, because the Lina CLI generated by FMC (or rather CSM running on the box) is not correct: "... set nat-t disable". It should have been "... set nat-t-disable". This is simply a bug.

 

View solution in original post

23 Replies 23

Max Jobs
Level 1
Level 1

Hi buddy, this is what i found over other's topics:

To achieve the equivalent of 'crypto map CSM_outside_map 1 set nat-t disable' on an ASA within FMC/FTD, you'll need to use FlexConfig. FlexConfig lets you apply CLI configurations directly onto FTD devices managed by FMC.

Here's how:

  1. Log in to your FMC.
  2. Go to Devices > FlexConfig > FlexConfig Objects.
  3. Click 'Create FlexConfig Object'.
  4. Name the object, specify the device type (FTD), and enter the CLI command: crypto map <name> 1 set nat-t disable (Replace <name> with your crypto map's name.)
  5. Save the object.

Now, apply this FlexConfig object to your FTD device:

  1. Go to Devices > Device Management.
  2. Select your device.
  3. Visit the FlexConfig tab.
  4. Click 'Attach Policy'.
  5. Choose the FlexConfig object you created and click 'Attach'.

Once attached, the FlexConfig will be deployed to the FTD device, achieving the equivalent of 'crypto map CSM_outside_map 1 set nat-t disable'.

Tried that and get 'Error - Unsupported CLI'

andrewbutterworth_0-1709553852672.png

 

Max Jobs
Level 1
Level 1

If you're encountering an "Error - Unsupported CLI" message when trying to apply the FlexConfig, it indicates that the CLI command you're attempting to use may not be supported or compatible with the FTD device or the version of FMC/FTD you are using.

In such cases, it's essential to verify the compatibility of the CLI command with your FTD device and the version of FMC/FTD you're using. Additionally, you may need to adjust your approach to achieve the desired configuration.

Here are some steps you can take to troubleshoot and potentially resolve the issue:

  1. Check Device Compatibility: Ensure that the CLI command you're trying to apply is compatible with the FTD device model and software version you're using. Sometimes certain commands might not be supported across different hardware platforms or software versions.

  2. Review Documentation: Consult the official documentation provided by Cisco for your specific FTD device model and software version. The documentation should outline the supported CLI commands and configuration methods.

  3. Update Software: If you're running an older version of FMC/FTD, consider updating to the latest version. Newer software releases often include support for additional CLI commands and features.

  4. Alternative Configuration: If the specific CLI command you're trying to apply is not supported, consider alternative methods or workarounds to achieve the desired configuration outcome.

  5. Reach Out to Support: If you're unable to resolve the issue on your own, consider reaching out to Cisco support for assistance. They can provide guidance and troubleshooting steps specific to your environment and configuration requirements.

By following these steps, you should be able to identify the cause of the "Unsupported CLI" error and take appropriate action to address it.

I'm guessing Moein Ascari is AI - and its super annoying....

Dolphin chicken underpants

Sure I am a AI

Thought so

I think this feature if disable in one side it will not work, so no need to disable in both Peer (both FW mgmt by one FMC)

MHM

@andrew.butterworth try this (change the sequence number if required):-

?crypt map CSM_outside_map 1 set nat-t-disable?

https://bst.cisco.com/bugsearch/bug/CSCvh87734?rfs=qvlogin

 

Hi Rob, Sorry that doesn't work either.  FMC just spits out an error when deploying

I will test with asa enable one side NAT-T and disable it in other side.

Update you tonight 

MHM

Can you check if the sequence number is still the same? Deployment could error out if we are trying to disable NAT-T for non-existent sequence number.

I was able to get the deployment through using this flexconfig.

crypt map CSM_outside_map 1 set nat-t-disable

Need to ask the team to update the bug as well, and that's for tomorrow morning.

As I understand for his reply 

He have Fmc control both peer 

One peer he can disable NAT-T via GUI and other peer can not do that

And as I mentioned he don't need both ends to disable NAT-T he can do that in one peer.

Correct me if I am wrong 

MHM

FMC is only controlling one peer - the other is 'Extranet'