

Set the public interface of the remote peer. Select the correct external interface for the FTD and then select the Local network that will need to be encrypted across the site to site VPN. Give the Site-to-Site connection a connection profile name that is easily identifiable. Go through the Site-to-Site wizard on FDM as shown in the image. Navigate to Site-to-Site VPN > Create Site-to-Site Connection. Create an object for the local network behind the FDM device as shown in the image.Ĭreate an object for the remote network behind the ASA device as shown in the image. Navigate to Objects > Networks > Add New Network.Ĭonfigure objects for the LAN Networks from FDM GUI. Start with the configuration on FTD with FDM. If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The information in this document is based on these software and hardware versions:
