<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD 1010 default action behavior with base license in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533090#M1086501</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317180"&gt;@tato386&lt;/a&gt; if traffic is not matching your defined access control rule, are your physical or vlan interfaces actually assigned to the correct zones (inside_zone and outside_zone)? You do not need to define a rule using the zones, you could just use the source/destination networks.&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jan 2022 08:12:50 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-01-18T08:12:50Z</dc:date>
    <item>
      <title>FTD 1010 default action behavior with base license</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533015#M1086499</link>
      <description>&lt;P&gt;I have an FTD 1010 with only a base license and a requirement to use this as a simple Internet router/gateway.&amp;nbsp; I have a dynamic NAT rule using interface PAT and one access rule that trusts outgoing traffic.&amp;nbsp; If I set the default action to block I cannot get Internet traffic to flow so for now I have the default action to trust to get things going.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment this is not a big deal but what would happen when/if I setup a static NAT?&amp;nbsp; At that time I would want to set the default action to block to prevent unwanted traffic to the static NAT host but then it would break the dynamic NAT clients?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="FTD1010_ACP.jpg" style="width: 709px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/141429iA6A903F412F6F429/image-dimensions/709x200?v=v2" width="709" height="200" role="button" title="FTD1010_ACP.jpg" alt="FTD1010_ACP.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 02:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533015#M1086499</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2022-01-18T02:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1010 default action behavior with base license</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533090#M1086501</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317180"&gt;@tato386&lt;/a&gt; if traffic is not matching your defined access control rule, are your physical or vlan interfaces actually assigned to the correct zones (inside_zone and outside_zone)? You do not need to define a rule using the zones, you could just use the source/destination networks.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 08:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533090#M1086501</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-18T08:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1010 default action behavior with base license</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533333#M1086511</link>
      <description>&lt;P&gt;i do not believe this due to your License, more of config issue looks for me. not able read the image properly to suggest something here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 14:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533333#M1086511</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-18T14:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1010 default action behavior with base license</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533356#M1086516</link>
      <description>&lt;P&gt;Do you only have the inside_zone or are there more subnets behind the FTD?&lt;/P&gt;
&lt;P&gt;Currently, if you add a static NAT statement and an access rule allowing access to that server from the outside, and then set the default action to block, users on the inside_zone will still be able to reach the internet.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 15:06:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533356#M1086516</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-01-18T15:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTD 1010 default action behavior with base license</title>
      <link>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533366#M1086518</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;is correct it does not have anything to do with the license.&amp;nbsp; It was an issue with the configuration of the security zones.&amp;nbsp; The zones were one of the first things I setup and I am 99% sure I added interfaces at that time but lo and behold when I double-checked (thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;!) the zones were empty?!&amp;nbsp; After adding (re-adding?) the interfaces traffic flowed correctly with block as default action.&amp;nbsp; &amp;nbsp; &amp;nbsp;An interesting thing is that Internet traffic seems to be working perfectly normal but curiously, inbound reply from DNS servers is showing as being blocked.&amp;nbsp; Should I worry about this if things appear to be normal?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="FTD1010_Events.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/141498iB0ADCA172746BF0F/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD1010_Events.jpg" alt="FTD1010_Events.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 15:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-1010-default-action-behavior-with-base-license/m-p/4533366#M1086518</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2022-01-18T15:14:49Z</dc:date>
    </item>
  </channel>
</rss>

