<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD not accessing internet after migration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567272#M1088083</link>
    <description>&lt;P&gt;I've used the Firepower Migration Tool several times and generally had good success with it.&lt;/P&gt;
&lt;P&gt;Did you migrate to the already-registered FTD devices (via FMC) or did you just migrate policies to FMC and then later add the FTD? In the former case interfaces and routes would all be configured by the migration tool.&lt;/P&gt;
&lt;P&gt;Since you should still have the FTD accessible via it's management interface you can check the routing config from the cli with "show running-config route".&lt;/P&gt;</description>
    <pubDate>Wed, 09 Mar 2022 16:55:16 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2022-03-09T16:55:16Z</dc:date>
    <item>
      <title>FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567253#M1088080</link>
      <description>&lt;P&gt;We attempted to migrate from our ASA 5515xs this morning to FTDs. Needless to say when we tried to access the internet it was not available. We used the Cisco Migration tool and all settings (NATs, ACLs, interface settings, static routes, etc. ) seemed to come over fine. I restarted the switches connected to the dmz and inside interfaces to clear the arp cache in each. The inside interfaces are connected to my core switch so rebooting that can be rough. I did manage to clear the arp cache for the interfaces they were connected to. I also rebooted our fatpipe bandwidth aggregators which sit just outside our outside interface. Access to our inside network was working fine as far as ip configuration goes. The same IP addresses that were used on the ASA interfaces were being used on the FTD interfaces. I am being general on purpose. My consultant thinks it is a routing issue. I dont know what to think. I had to put the ASAs back into production.&lt;/P&gt;&lt;P&gt;Any suggestions would be welcome&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 16:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567253#M1088080</guid>
      <dc:creator>ethutchinson</dc:creator>
      <dc:date>2022-03-09T16:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567259#M1088081</link>
      <description>&lt;P&gt;I should also note the Anyconnect VPN authentications worked great but they could not access the inside network when connected. The ip address pool was the same as the one used by the ASAs. and now that the ASAs are backup VPN is working fine.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 16:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567259#M1088081</guid>
      <dc:creator>ethutchinson</dc:creator>
      <dc:date>2022-03-09T16:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567268#M1088082</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/293368"&gt;@ethutchinson&lt;/a&gt; so if anyconnect VPNs have successfully established, that proves inbound connectivity on the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It possibly indicates a NAT issue for connectivity from inside to outside - check your NAT rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check your ACP for traffic from inside to outisde.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the AnyConnect clients cannot communicate with the internal network, check the routing on the FTD to ensure it can reach the internal networks, check NAT exemption rules and check your ACP to ensure traffic is explictly permitted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's going to be hard to troubleshoot if the FTD's are not in production, did you run packet-tracer to simulate traffic from in to out?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 16:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567268#M1088082</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T16:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567272#M1088083</link>
      <description>&lt;P&gt;I've used the Firepower Migration Tool several times and generally had good success with it.&lt;/P&gt;
&lt;P&gt;Did you migrate to the already-registered FTD devices (via FMC) or did you just migrate policies to FMC and then later add the FTD? In the former case interfaces and routes would all be configured by the migration tool.&lt;/P&gt;
&lt;P&gt;Since you should still have the FTD accessible via it's management interface you can check the routing config from the cli with "show running-config route".&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 16:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567272#M1088083</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-03-09T16:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567301#M1088090</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have checked the routes on both FTDs and they are both correct with the same ROLR as the ASAs&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 17:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567301#M1088090</guid>
      <dc:creator>ethutchinson</dc:creator>
      <dc:date>2022-03-09T17:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567303#M1088091</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In answer to your first question we migrated to the FTDs which were already setup and licensed in the FMC.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 17:30:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567303#M1088091</guid>
      <dc:creator>ethutchinson</dc:creator>
      <dc:date>2022-03-09T17:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567352#M1088097</link>
      <description>&lt;P&gt;Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to assume when you refer to ACP you mean Access Control Policy? Because there is no inside to outside line pointing to my ROLR there. It is in my NAT tables but not in my ACP.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 18:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4567352#M1088097</guid>
      <dc:creator>ethutchinson</dc:creator>
      <dc:date>2022-03-09T18:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4568417#M1088147</link>
      <description>&lt;P&gt;One of the things that also went wrong was the VPN connectivity not accessing my internal network when we cutover. So the consultant that is helping us had suggested setting up the FTDs up with different inside, dmz, and outside IP addresses so I can at least test the VPN connectivity of the new FTDs while the ASAs are still up. I have plenty of unused outside addresses to play with.&amp;nbsp; So he setup a new pool of IP addresses and I can connect to this outside ip address using the AnyConnect client. It connects up just fine but I still cannot view my internal network. This is after he put the lines in my ACL to allow access to my internal network from the FTD VPN pool IPs. He wanted me to put a static route in our core switch to allow access to the new vpn pool he setup using the inside interface ip of the FTD as the gateway of the route. But still nothing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 22:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4568417#M1088147</guid>
      <dc:creator>ethutchinson</dc:creator>
      <dc:date>2022-03-10T22:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTD not accessing internet after migration</title>
      <link>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4568581#M1088154</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/293368"&gt;@ethutchinson&lt;/a&gt; if the VPN is established and you cannot access resources this is usually a missing NAT exemption rule or routing. Run packet-tracer this will provide a clue as to the issue.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 08:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-not-accessing-internet-after-migration/m-p/4568581#M1088154</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-11T08:00:07Z</dc:date>
    </item>
  </channel>
</rss>

