Create a Site-to-Site VPN Between On-Premises Firewall Management Center-Managed Threat Defense and ASA
Procedure
Step 1 | In the navigation pane, choose . | ||
Step 2 | Click the create tunnel () button on the top-right corner and click Site-to-Site VPN with the FMC Managed Device / ASA label. | ||
Step 3 | In the Configuration Name field, enter a name for the site-to-site VPN configuration you create. | ||
Step 4 | Click the Route Based radio button. | ||
Step 5 | In the Peer Devices area, provide the following information: | ||
Step 6 | In the Tunnel Details area, the VTI Address specifies the addresses for the new Virtual Tunnel Interfaces on the peers. Security Cloud Control provides a sample address which you can change if it causes conflict. You can assign any unused IP address that is currently not used on this device. | ||
Step 7 | In the IKE Settings area, choose the IKE version for the Internet Key Exchange (IKE) negotiations and specify the privacy configurations. For more information on the IKE policies, see Configuring the Global IKE Policy. Based on your configuration, Security Cloud Control suggests the IKE settings. You can either continue with the recommended IKE configuration settings or configure a new one.
| ||
Step 8 | In the IPSec Settings area, provide the following information:
| ||
Step 9 | In the Finish area, read the configuration and continue further only if you’re satisfied with your configuration.
| ||
Step 10 | Click Submit. The configurations are automatically pushed from Security Cloud Control to on-premises management center. | ||
Step 11 | Perform the following steps to deploy the configuration manually to an on-premises management center-managed threat defense device.
|