<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTDv in Azure and issue with Probes (SSH TCP Port 22) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617592#M1090408</link>
    <description>&lt;P&gt;Provided the routing of this traffic is configured properly, these health probes are "to" the firewall itself and ACP rules are generally meant for traffic which is "through" the firewall, you need to permit SSH via the platform settings attached to this FTD pair.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Navigate to the platform settings, under secure shell select the correct interfaces and permit any-ipv4 address for testing and deploy the policy. Verify the outcome, it would be a good idea to run packet captures if needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 25 May 2022 13:43:56 GMT</pubDate>
    <dc:creator>Udupi Krishna.</dc:creator>
    <dc:date>2022-05-25T13:43:56Z</dc:date>
    <item>
      <title>Cisco FTDv in Azure and issue with Probes (SSH TCP Port 22)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617253#M1090404</link>
      <description>&lt;P&gt;Hello Team!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I got a Cisco FTD cluster (managed by Cisco FMC) deployed in Azure. I have configured loadbalancer so that the traffic is evenly balanced between the two FTDv devices because there is no concept of HA in Azure. The loadbalance are probing (Health Probes) the FTDv on TCP port 22 (SSH) to check the&amp;nbsp;availability of both FTDv's. If the loadbalancer doesn't get a response from FTDv on probes (TCP port 22 SSH) the device is marked as unavailable and no traffic is send to the device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have created ACP rules for the probes from Azure IP address&amp;nbsp;168.63.129.16 and I can see the events. Somehow the Azure can't probe the FTDv's and they are marked as "dead" and no traffic are routed through the firewalls. When this is happening I logged into firewall and it seems everything is working fine and I can't see any blocked events or Azure IP address&amp;nbsp;168.63.129.16.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has someone got a similar issue and I hope to receive suggestions on how to troubleshoot this issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;Sam&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 08:26:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617253#M1090404</guid>
      <dc:creator>IamSamSaul</dc:creator>
      <dc:date>2022-05-25T08:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTDv in Azure and issue with Probes (SSH TCP Port 22)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617592#M1090408</link>
      <description>&lt;P&gt;Provided the routing of this traffic is configured properly, these health probes are "to" the firewall itself and ACP rules are generally meant for traffic which is "through" the firewall, you need to permit SSH via the platform settings attached to this FTD pair.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Navigate to the platform settings, under secure shell select the correct interfaces and permit any-ipv4 address for testing and deploy the policy. Verify the outcome, it would be a good idea to run packet captures if needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 13:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617592#M1090408</guid>
      <dc:creator>Udupi Krishna.</dc:creator>
      <dc:date>2022-05-25T13:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTDv in Azure and issue with Probes (SSH TCP Port 22)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617611#M1090410</link>
      <description>Thanks for your reply. I have already configured ssh with any under the&lt;BR /&gt;Platform settings. Under the ACP I can see hits from probes on port 22 ssh.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Sam&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 25 May 2022 14:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617611#M1090410</guid>
      <dc:creator>IamSamSaul</dc:creator>
      <dc:date>2022-05-25T14:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTDv in Azure and issue with Probes (SSH TCP Port 22)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617963#M1090429</link>
      <description>&lt;P&gt;Alright thats a good first step. Run a capture to see if its landing on the correct interface and there are responses going back to complete a proper 3-way handshake. If it isnt, there's obviously some sort of connectivity failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This should be a good reference article to confirm everything is in place -&amp;nbsp;&lt;A href="https://jackstromberg.com/2019/06/deploying-cisco-virtual-appliances-ngfwv-on-azure/" target="_blank"&gt;https://jackstromberg.com/2019/06/deploying-cisco-virtual-appliances-ngfwv-on-azure/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 02:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftdv-in-azure-and-issue-with-probes-ssh-tcp-port-22/m-p/4617963#M1090429</guid>
      <dc:creator>Udupi Krishna.</dc:creator>
      <dc:date>2022-05-26T02:17:20Z</dc:date>
    </item>
  </channel>
</rss>

