<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower Threat Defense Blocking traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142383#M1073402</link>
    <description>&lt;P&gt;On FTD decrypted traffic is subjected to Access Control Policy by default. This was not the case on ASA, you probably the command no sysopt connection permit-vpn configured on the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Thu, 27 Aug 2020 13:09:33 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-08-27T13:09:33Z</dc:date>
    <item>
      <title>Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141794#M1073365</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We have several site to site vpns on our new FTD devices i have noticed that if traffic (DNS) originates from the remote 3rd party side of the vpn it gets blocked, e.g servers on the remote end need to hit our DC's so the servers are initiating the request, I thought all traffic would be allowed bidirectional through the tunnel,? I had to explicitly allow on the Outside interface does anyone know why this happens.???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thankyou&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 16:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141794#M1073365</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2020-08-26T16:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141804#M1073367</link>
      <description>Hi,&lt;BR /&gt;Yes I'd expect you to explicitly permit traffic from outside to inside on the FTD, it works differently to the ASA.&lt;BR /&gt;Does the 3rd party normally access your internal network and did you have to explictly permit this other traffic also?&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 26 Aug 2020 16:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141804#M1073367</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-26T16:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141862#M1073375</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;yes 3rd party do access our network on ASA's and no didn't have to explicitly permit on Outside.?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 17:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141862#M1073375</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2020-08-26T17:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141867#M1073376</link>
      <description>Can you provide a screenshot of your ACP that relates to this VPN traffic please.</description>
      <pubDate>Wed, 26 Aug 2020 17:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4141867#M1073376</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-26T17:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142309#M1073394</link>
      <description>&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;Hi Rob&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;As requested I have obviously obfuscated element’s (see attached)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;Here is a summary&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;Step 1&lt;SPAN&gt;.&amp;nbsp; User launches application which is hosted at 3rd&amp;nbsp;party location across the site to site&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;Step 2&lt;SPAN&gt;. 3rd&amp;nbsp;party Server needs to talk to Server on our side for authentication to complete&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;What I could see was traffic (DNS) being blocked and I had to explicitly allow this traffic on the Outside interface in whereas&amp;nbsp;with the ASA we don’t&amp;nbsp; everything&amp;nbsp;is allowed both directions through the Tunnel.&amp;nbsp; Hope this helps&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv2693869640MsoNormal"&gt;&lt;SPAN&gt;appreciated&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 11:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142309#M1073394</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2020-08-27T11:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142310#M1073395</link>
      <description>&lt;P&gt;not sure if i attached in previous reply&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 11:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142310#M1073395</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2020-08-27T11:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142326#M1073400</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;So you are only permitting traffic initated from inside to outside. Yes the return traffic will be permitted....but if the remote site initiated traffic then you do not have a rule for this. You will need to specifically define rules sourced from outside to destination inside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 11:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142326#M1073400</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T11:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142378#M1073401</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;Thanks again for the info, so its FTD behaviour then as we don't have to do this on our ASA&amp;gt;??&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 13:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142378#M1073401</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2020-08-27T13:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142383#M1073402</link>
      <description>&lt;P&gt;On FTD decrypted traffic is subjected to Access Control Policy by default. This was not the case on ASA, you probably the command no sysopt connection permit-vpn configured on the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 13:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142383#M1073402</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T13:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142687#M1073434</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;So are you saying that any traffic that comes through the tunnel and is initiated by the 3rd party will need an explicit ACP entry on the Outside Interface, so through the tunnel decrypted then interface check ?????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 20:46:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142687#M1073434</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2020-08-27T20:46:41Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower Threat Defense Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142689#M1073435</link>
      <description>&lt;P&gt;Correct, you would need an explicit ACP rule from 3rd party on "outside" interface to "inside" for when the 3rd party initiates the connection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are currently only permitting traffic when initiated from your side of the VPN, the return traffic from the 3rd party will be permitted because the firewall is stateful. &lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 20:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-threat-defense-blocking-traffic/m-p/4142689#M1073435</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T20:52:11Z</dc:date>
    </item>
  </channel>
</rss>

