Overview
Provides instructions for configuring a Threat Defense (FTD) device as a hub in a route-based site-to-site VPN using Firewall Management Center (FMC).
When you specify the tunnel type as dynamic and configure the related parameters, the management center generates a dynamic virtual template. The virtual template dynamically generates the virtual access interface that is unique for each VPN session.
Procedure
| 1. | In the Hub Nodes section, click +. The Add Endpoint dialog box is displayed. |
|
| 2. | Choose NGFW1 as the hub from the Device drop-down list.
|
|
| 3. | Click + next to the Dynamic Virtual Tunnel Interface drop-down list to add a new dynamic VTI. The Add Virtual Tunnel Interface dialog box appears with the following pre-populated default configurations.
Click OK to save the DVTI. A message is displayed that confirms the VTI is created successfully. Click OK. The Dynamic Virtual Tunnel Interface is set to outside_dynamic_vti_1(198.48.133.81). |
|
| 4. | Select GigabitEthernet 0/0 (outside) from the Tunnel Source drop-down list. The IP address of the outside interface (198.18.133.81) is auto-populated in the next field. |
|
| 5. | Expand Advanced Settings to view the default settings. |
|
| 6. | Click OK. NGFW1 is successfully configured as the hub node. |