Create a Site-to-Site VPN Between On-Prem Firewall Management Center-Managed Threat Defense and Extranet
You can configure a site-to-site VPN tunnel between the on-prem management center-managed threat defense device onboarded to CDO and an extranet device. The extranet can be non-Cisco devices or Cisco devices that CDO does not manage.
Before you begin
The site-to-site VPN tunnel configurations must be applied manually to the extranet devices.
Procedure
Step 1 | In the navigation pane, choose . | ||
Step 2 | Click the create tunnel () button on the top-right corner and click Site-to-Site VPN with FMC Managed Device / ASA label. | ||
Step 3 | In the Configuration Name field, enter a name for the site-to-site VPN configuration you create. | ||
Step 4 | Click the Route Based radio button. | ||
Step 5 | In the Peer Devices area, provide the following information: | ||
Step 6 | In the IKE Settings area, choose the IKE versions to use during Internet Key Exchange (IKE) negotiations and specify the privacy configurations: For more information on the IKE policies, see Configuring the Global IKE Policy. Based on the configuration made by the user, CDO suggests the IKE settings. You can either continue with the recommended IKE configuration settings or define a new one.
| ||
Step 7 | In the IPSec Settings area, perform the following:
| ||
Step 8 | In the Finish area, read the configuration and continue further only if you’re satisfied with your configuration. | ||
Step 9 | Click Submit. The configurations are pushed automatically to the on-prem management center after clicking Submit. | ||
Step 10 | Perform the following steps to deploy the configuration to an on-prem management center-managed threat defense device.
|