<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Nested Access Control Policy on FTD 6.2.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nested-access-control-policy-on-ftd-6-2-2/m-p/3308206#M1064671</link>
    <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;I have a ASA 5515-x FTD 6.2.2 and FMC. I created an access control policy based on a parent policy on which, I trusted a traffic to/from my mgmt PC on parent policy and then I added some rules to child policy. I saved and deployed to my FTD device but despite FMC says the Parent Policy (which includes a child policy) is up-to-date on all targeted devices, but while inspecting through ASA FTD CLI, I cannot see any child rules; there is just Parent Policy listed in the running-configuration.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd1.jpg" style="width: 700px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/6006i7C872A03F9224B40/image-size/large?v=v2&amp;amp;px=999" role="button" title="ftd1.jpg" alt="ftd1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd1.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/6009iBB276ED3F107D72D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ftd1.jpg" alt="ftd1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and here is the CLI output on TFPD device:&lt;/P&gt;
&lt;PRE&gt;access-list CSM_FW_ACL_ remark rule-id 9998: PREFILTER POLICY: Default Tunnel and Priority Policy
access-list CSM_FW_ACL_ remark rule-id 9998: RULE: DEFAULT TUNNEL ACTION RULE
access-list CSM_FW_ACL_ advanced permit ipinip any any rule-id 9998 
access-list CSM_FW_ACL_ advanced permit 41 any any rule-id 9998 
access-list CSM_FW_ACL_ advanced permit gre any any rule-id 9998 
access-list CSM_FW_ACL_ advanced permit udp any eq 3544 any range 1025 65535 rule-id 9998 
access-list CSM_FW_ACL_ advanced permit udp any range 1025 65535 any eq 3544 rule-id 9998 
access-list CSM_FW_ACL_ remark rule-id 268435460: ACCESS POLICY: TPARENT-POLICY - Mandatory
access-list CSM_FW_ACL_ remark rule-id 268435460: L7 RULE: Timaz-PC-Anywhere-Rule
access-list CSM_FW_ACL_ advanced permit ip object TIMAZ-PC any rule-id 268435460 
access-list CSM_FW_ACL_ remark rule-id 268435459: ACCESS POLICY: TPARENT-POLICY - Default
access-list CSM_FW_ACL_ remark rule-id 268435459: L4 RULE: DEFAULT ACTION RULE
access-list CSM_FW_ACL_ advanced deny ip any any rule-id 268435459 event-log flow-start &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as a result, the rules inside child policy don't run. Do I need to do something for the child policy to take effect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:06:13 GMT</pubDate>
    <dc:creator>ciscoworlds</dc:creator>
    <dc:date>2020-02-21T15:06:13Z</dc:date>
    <item>
      <title>Nested Access Control Policy on FTD 6.2.2</title>
      <link>https://community.cisco.com/t5/network-security/nested-access-control-policy-on-ftd-6-2-2/m-p/3308206#M1064671</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;I have a ASA 5515-x FTD 6.2.2 and FMC. I created an access control policy based on a parent policy on which, I trusted a traffic to/from my mgmt PC on parent policy and then I added some rules to child policy. I saved and deployed to my FTD device but despite FMC says the Parent Policy (which includes a child policy) is up-to-date on all targeted devices, but while inspecting through ASA FTD CLI, I cannot see any child rules; there is just Parent Policy listed in the running-configuration.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd1.jpg" style="width: 700px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/6006i7C872A03F9224B40/image-size/large?v=v2&amp;amp;px=999" role="button" title="ftd1.jpg" alt="ftd1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ftd1.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/6009iBB276ED3F107D72D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ftd1.jpg" alt="ftd1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and here is the CLI output on TFPD device:&lt;/P&gt;
&lt;PRE&gt;access-list CSM_FW_ACL_ remark rule-id 9998: PREFILTER POLICY: Default Tunnel and Priority Policy
access-list CSM_FW_ACL_ remark rule-id 9998: RULE: DEFAULT TUNNEL ACTION RULE
access-list CSM_FW_ACL_ advanced permit ipinip any any rule-id 9998 
access-list CSM_FW_ACL_ advanced permit 41 any any rule-id 9998 
access-list CSM_FW_ACL_ advanced permit gre any any rule-id 9998 
access-list CSM_FW_ACL_ advanced permit udp any eq 3544 any range 1025 65535 rule-id 9998 
access-list CSM_FW_ACL_ advanced permit udp any range 1025 65535 any eq 3544 rule-id 9998 
access-list CSM_FW_ACL_ remark rule-id 268435460: ACCESS POLICY: TPARENT-POLICY - Mandatory
access-list CSM_FW_ACL_ remark rule-id 268435460: L7 RULE: Timaz-PC-Anywhere-Rule
access-list CSM_FW_ACL_ advanced permit ip object TIMAZ-PC any rule-id 268435460 
access-list CSM_FW_ACL_ remark rule-id 268435459: ACCESS POLICY: TPARENT-POLICY - Default
access-list CSM_FW_ACL_ remark rule-id 268435459: L4 RULE: DEFAULT ACTION RULE
access-list CSM_FW_ACL_ advanced deny ip any any rule-id 268435459 event-log flow-start &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as a result, the rules inside child policy don't run. Do I need to do something for the child policy to take effect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nested-access-control-policy-on-ftd-6-2-2/m-p/3308206#M1064671</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2020-02-21T15:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Nested Access Control Policy on FTD 6.2.2</title>
      <link>https://community.cisco.com/t5/network-security/nested-access-control-policy-on-ftd-6-2-2/m-p/3308218#M1064672</link>
      <description>Hi;&lt;BR /&gt;&lt;BR /&gt;I resolved the issue by myself! I assigned parent policy directly to the FTD device, thought that it should contain child policies too. But I was wrong; the opposite is true. The child policy should be assigned to FTD device which inherits parent policy too.</description>
      <pubDate>Tue, 09 Jan 2018 11:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nested-access-control-policy-on-ftd-6-2-2/m-p/3308218#M1064672</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2018-01-09T11:33:32Z</dc:date>
    </item>
  </channel>
</rss>

