<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does Re:ftd add static routes and configure priorities in the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4646482#M1091716</link>
    <description>&lt;P&gt;You need to identify the route that management traffic is taking between FMC and FTD.&lt;/P&gt;
&lt;P&gt;Are the two FTDs in HA pair?&lt;/P&gt;
&lt;P&gt;Is management traffic being routed through a data interface on the FTD that is having issues?&lt;/P&gt;
&lt;P&gt;Or, is traffic being routed through the other FTD that is not having issues?&lt;/P&gt;
&lt;P&gt;can you ping the FTD from&amp;nbsp;172.17.3.254 to&amp;nbsp;172.17.2.10 (the gateway that mgmt traffic is using)?&lt;/P&gt;
&lt;P&gt;You can add an ACL entry using the commands I posted earlier, just change the configuration from routing to access-list.&amp;nbsp; If this solves the issue you will need to add the correct access rule in the FMC before you deploy or the configuration will be overwritten.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Jul 2022 07:34:50 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2022-07-08T07:34:50Z</dc:date>
    <item>
      <title>How does ftd add static routes in ctl and configure priorities?</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4629381#M1090821</link>
      <description>&lt;P&gt;My ftd can't connect to fmc because of routing reasons, now I need to add a static route and make the configuration priority higher than ospf&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 07:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4629381#M1090821</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-10T07:13:29Z</dc:date>
    </item>
    <item>
      <title>Hot: How ftd adds static routes in ctl and configures configuration priorities</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4630274#M1090848</link>
      <description>&lt;H2 id="toc-hId-1391963119"&gt;configuration network static-routes&lt;/H2&gt;&lt;P class=""&gt;to add or remove static routes, use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;configuration network static-routes&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;configuration network static-routes&lt;/SPAN&gt;&amp;nbsp;{&amp;nbsp;ipv4&amp;nbsp;|&amp;nbsp;ipv6 {&amp;nbsp;add&amp;nbsp;&lt;EM&gt;interface&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;destiny&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;netmask_or_prefix&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;gateway&amp;nbsp;&lt;/EM&gt;|&amp;nbsp;delete}&lt;/P&gt;&lt;H2 id="toc-hId--415491344"&gt;Syntax Description&lt;/H2&gt;&lt;DIV class=""&gt;&amp;nbsp; &lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;add&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Ads a static route for the management interface.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;delete&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Remove a static route for the management interface. You are proformed to choose which route to delete.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;interface&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;The ID of the management interface. Use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;show network&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command to view the Management interface ID for your model.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;ipv4&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Ads or deletes a static route for the IPv4 management address.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;ipv6&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Ads or deletes a static route for the IPv6 management address.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;destiny&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;The deployment IP address to add or remove, in IPv4 or IPv6 format as an appliance. For example, 10.100.10.10 or 2001:db8::201.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;netmask_or_prefix&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;The network address mask for IPv4, or prefix for IPv6. The IPv4 netmask must be in a numbered presentation, for example, 255.255.255.0. The IPv6 prefix is a standard prefix number, sum as 96.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;The gateway address to add or remove, in IPv4 or IPv6 format as an appliance.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;H2 id="toc-hId-2072021489"&gt;Command History&lt;/H2&gt;&lt;DIV class=""&gt;&amp;nbsp;ReleaseRegistration &lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;6.0.1&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;This command was introduced.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;configuration network static-routes ipv4 add eth0 192.168.10.0 255.255.255.0 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html#wp2268306860" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html#wp2268306860&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Add static route on Firepower module:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/add-static-route-on-firepower-module/ta-p/3156256" target="_blank"&gt;https://community.cisco.com/t5/security-documents/add-static-route-on-firepower-module/ta-p/3156256&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Combined with OSPF, the AD is small and the default value is 1, so there is no need to modify it.&lt;/P&gt;&lt;P&gt;Not sure if it's right or not, you can try it, hope it works&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 12 Jun 2022 10:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4630274#M1090848</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-12T10:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: How does ftd add static routes in ctl and configure priorities?</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4630392#M1090853</link>
      <description>&lt;P&gt;I am assuming you have your management interface default gateway via a data interface on the FTD and it is the data interface which is having the routing issue?&lt;/P&gt;
&lt;P&gt;If so here is the solotion. &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Remember that you must correct the static route issue in the GUI once you have connectivity again as a new policy deploy will overwrite this solution.&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt; You also need to have access the the FTD CLI and are able to access root privileges. You dont need to go into the /ngfw/var/sf/bin directory but I like going there as this is where the script is located.&amp;nbsp; Hope this helps.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="nb-NO"&gt;&amp;gt;expert&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="nb-NO"&gt;# sudo su -&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="nb-NO"&gt;root# cd /ngfw/var/sf/bin&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="nb-NO"&gt;root# LinaConfigTool "route DMZ 1092.168.1.0 255.255.255.0 192.168.2.1";&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jun 2022 19:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4630392#M1090853</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-12T19:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: How does ftd add static routes in ctl and configure priorities?</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4630669#M1090872</link>
      <description>&lt;P&gt;Excuse me, does the DMZ in "route DMZ" refer to the area to which the routing interface belongs, or is it a custom nickname field?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 02:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4630669#M1090872</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-14T02:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: How does ftd add static routes in ctl and configure priorities?</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4631215#M1090908</link>
      <description>This is basic ASA / FTD CLI routing configuration, so DMZ reders to the interface that the subnet is reachable through.&lt;BR /&gt;</description>
      <pubDate>Tue, 14 Jun 2022 04:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4631215#M1090908</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-14T04:14:19Z</dc:date>
    </item>
    <item>
      <title>Hot: How does Re:ftd add static routes and configure priorities in a CTL?</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4633036#M1090975</link>
      <description>I've deployed OSPF to let the device learn how to route to FMC, but why the device still shows disabled status and cannot be managed.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 16 Jun 2022 09:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4633036#M1090975</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-16T09:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: Hot: How does Re:ftd add static routes and configure priorities in</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4634545#M1091051</link>
      <description>&lt;P&gt;Are you able to ping the FTD from the FMC? can you telnet from FMC CLI to the FTD on port tcp/8305.&amp;nbsp; Remember also that you need to allow traffic from the FTD to the FMC on port tcp/8305 if this management traffic is passing through another firewall.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2022 22:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4634545#M1091051</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-19T22:16:58Z</dc:date>
    </item>
    <item>
      <title>Hot: Re: Hot: How Re:ftd adds static routes and configuration priorities</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4634562#M1091055</link>
      <description>My two ftdCan't ping fmc ftd-b or ping fmc A-B between ha ftd-A. But B can be managed by FMC. ... The problem has not been found, FTD-A and B are the same configuration.&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Jun 2022 01:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4634562#M1091055</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-20T01:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Hot: Re: Hot: How Re:ftd adds static routes and configuration prio</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4636149#M1091149</link>
      <description>&lt;P&gt;could you provide a network diagram? that shows the IPs and how these devices are connected to the network and their relation to eachother.&lt;/P&gt;
&lt;P&gt;When you ping from the FTD you will be pinging from the data interfaces so if this traffic is not allowed in access rules the traffic is not permitted. so a better test would be ping from FMC.&lt;/P&gt;
&lt;P&gt;So, what is between the FTDs and the FMC?&amp;nbsp; a router, another firewall, or are they on the same subnet (doubtful as this started out as a routing question)?&lt;/P&gt;
&lt;P&gt;Since FTD B can be managed the issue is most likely not routing.&amp;nbsp; What is the management IP you have given FTD A?&amp;nbsp; You said that A and B have the same configuration, does that mean you gave FTD A the same IP as you configured on B?&amp;nbsp; If so then this is your problem.&amp;nbsp; FTD A needs a separate IP.&lt;/P&gt;
&lt;P&gt;If there are any firewalls or access lists in the path between the FMC and FTD A and B then you need to also check if the traffic is allowed towards FTD A.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 20:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4636149#M1091149</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-21T20:20:03Z</dc:date>
    </item>
    <item>
      <title>Hot: Re:Hot:Hot:How Re:ftd adds static routes and configurations before configuration</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4636428#M1091158</link>
      <description>I use the ping prompt on fmc: ping: icmp open socket: Operation not operated&lt;BR /&gt;&lt;BR /&gt;My Network Topology&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;FTD_A&lt;BR /&gt;&lt;BR /&gt;FTD-A&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show network&lt;BR /&gt;===============[ System Information ] ===============&lt;BR /&gt;Hostname: ASCHZXS-12F-JF-A02-FW-2110-01&lt;BR /&gt;DNS servers: 172.169.18.8&lt;BR /&gt;management port: 8305&lt;BR /&gt;IPv4 Default route&lt;BR /&gt;Gateway: 172.17.3.254&lt;BR /&gt;&lt;BR /&gt;==================[ management0 ] ===================&lt;BR /&gt;State: Enabled&lt;BR /&gt;Channels: Management &amp;amp; Events&lt;BR /&gt;Mod: Non-Automation&lt;BR /&gt;MDI/MDIX: Auto/MDIX&lt;BR /&gt;MTU: 1500&lt;BR /&gt;MAC address: CC:7F:76:B1:73:80&lt;BR /&gt;—[ IPv4 ] —&lt;BR /&gt;Configuration: Manuel&lt;BR /&gt;Address: 172.17.2.10&lt;BR /&gt;Netmask: 255.255.254.0&lt;BR /&gt;Broadcast: 172.17.3.255&lt;BR /&gt;—[ IPv6 ] —&lt;BR /&gt;Configuration: Disabled&lt;BR /&gt;&lt;BR /&gt;===============[ Proxy Information ] ================&lt;BR /&gt;State: Disabled&lt;BR /&gt;Authentication: Disabled&lt;BR /&gt;&lt;BR /&gt;&amp;gt;?&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show route&lt;BR /&gt;&lt;BR /&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - cancel date default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloadestatic route, + - reregistered route&lt;BR /&gt;Gateway of last resort is 172.17.10.65 to network 0.0.0.0&lt;BR /&gt;&lt;BR /&gt;O*E1 0.0.0.0 0.0.0.0 [110/1010] via 172.17.10.65, 2w6d, TO_RT01_OUTSIDE-1&lt;BR /&gt;C 1.1.1.0 255.255.255.252 is directionally connected, failover_link&lt;BR /&gt;L 1.1.1.1 255.255.255.255 is directionally connected, failover_link&lt;BR /&gt;C 2.2.2.0 255.255.255.252 is directionally connected, state_link&lt;BR /&gt;L 2.2.2.1 255.255.255.255 is directionally connected, state_link&lt;BR /&gt;O E2 172.16.1.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.2.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.3.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.20.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 5d17h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.255.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 5d17h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.0.0 255.255.248.0&lt;BR /&gt;[110/20] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;C 172.17.7.0 255.255.255.248 is directionally connected, SHAOXING_DMZ_LM_IDS&lt;BR /&gt;L 172.17.7.2 255.255.255.255 is directionally connected, SHAOXING_DMZ_LM_IDS&lt;BR /&gt;O E1 172.17.8.0 255.255.255.0&lt;BR /&gt;[110/21] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.10.0 255.255.255.224&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;C 172.17.10.64 255.255.255.248 is directionally connected, TO_RT01_OUTSIDE-1&lt;BR /&gt;L 172.17.10.67 255.255.255.255 is directionally connected, TO_RT01_OUTSIDE-1&lt;BR /&gt;C 172.17.10.72 255.255.255.248 is directionally connected, TO_RT02_OUTSIDE-2&lt;BR /&gt;L 172.17.10.75 255.255.255.255 is directionally connected, TO_RT02_OUTSIDE-2&lt;BR /&gt;C 172.17.10.80 255.255.255.248&lt;BR /&gt;is directionally connected, TO_HXSW01_INSIDE-1&lt;BR /&gt;L 172.17.10.82 255.255.255.255&lt;BR /&gt;is directionally connected, TO_HXSW01_INSIDE-1&lt;BR /&gt;C 172.17.10.88 255.255.255.248&lt;BR /&gt;is directionally connected, TO_HXSW02_INSIDE-2&lt;BR /&gt;L 172.17.10.90 255.255.255.255&lt;BR /&gt;is directionally connected, TO_HXSW02_INSIDE-2&lt;BR /&gt;O 172.17.10.96 255.255.255.252&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.11.0 255.255.255.0&lt;BR /&gt;[110/12] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.20.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O 172.17.255.1 255.255.255.255&lt;BR /&gt;[110/11] via 172.17.10.65, 2w6d, TO_RT01_OUTSIDE-1&lt;BR /&gt;O 172.17.255.2 255.255.255.255&lt;BR /&gt;[110/16] via 172.17.10.73, 2w6d, TO_RT02_OUTSIDE-2&lt;BR /&gt;O 172.17.255.5 255.255.255.255&lt;BR /&gt;[110/10] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O 172.17.255.6 255.255.255.255&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.31.0.0 255.255.0.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.169.10.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.169.18.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.169.253.0 255.255.255.0&lt;BR /&gt;[110/12] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 192.168.168.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 198.18.1.4 255.255.255.252&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O 198.18.1.8 255.255.255.252&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;&lt;BR /&gt;&amp;gt;?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show interface ip brief&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;Internal-Data0/1 unregistered YES unset up&lt;BR /&gt;Ethernet1/1 172.17.10.67 YES CONFIG up&lt;BR /&gt;Ethernet1/2 172.17.10.75 YES CONFIG up&lt;BR /&gt;Ethernet1/3 172.17.10.82 YES CONFIG up&lt;BR /&gt;Ethernet1/4 172.17.10.90 YES CONFIG up&lt;BR /&gt;Ethernet1/5 172.17.7.2 YES CONFIG up&lt;BR /&gt;Ethernet1/6 172.17.7.10 YES CONFIG down down down&lt;BR /&gt;Ethernet1/7 172.17.7.18 YES CONFIG down down down&lt;BR /&gt;Etherenet1/8 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/9 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/10 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/11 1.1.1.1 YES unset up up&lt;BR /&gt;Ethernet1/12 2.2.2.1 YES unset up up&lt;BR /&gt;Ethernet1/13 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/14 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/15 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/16 unsigned YES unset admin down down&lt;BR /&gt;Internal-Control1/1 unregistered YES unset up&lt;BR /&gt;Internal-Data1/1 169.254.1.1 YES unset up up&lt;BR /&gt;Internal-Data1/2 unsigned YES unset up&lt;BR /&gt;Management1/1 unsigned YES unset up&lt;BR /&gt;&amp;gt;?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show tailor state&lt;BR /&gt;&lt;BR /&gt;State Last Failure Response Date/Time&lt;BR /&gt;This host - Primary&lt;BR /&gt;Stanby Ready None&lt;BR /&gt;Other host - Second&lt;BR /&gt;Active None&lt;BR /&gt;&lt;BR /&gt;====Configuration State===&lt;BR /&gt;Sync Done - STANBY&lt;BR /&gt;====Communication State===&lt;BR /&gt;Mac Set&lt;BR /&gt;&lt;BR /&gt;&amp;gt;?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;FTD-B&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show network&lt;BR /&gt;===============[ System Information ] ===============&lt;BR /&gt;Hostname: firepower&lt;BR /&gt;DNS servers: 172.169.18.8&lt;BR /&gt;management port: 8305&lt;BR /&gt;IPv4 Default route&lt;BR /&gt;Gateway: 172.17.3.254&lt;BR /&gt;&lt;BR /&gt;==================[ management0 ] ===================&lt;BR /&gt;State: Enabled&lt;BR /&gt;Channels: Management &amp;amp; Events&lt;BR /&gt;Mod: Non-Automation&lt;BR /&gt;MDI/MDIX: Auto/MDIX&lt;BR /&gt;MTU: 1500&lt;BR /&gt;MAC address: AC:3A:67:52:57:80&lt;BR /&gt;—[ IPv4 ] —&lt;BR /&gt;Configuration: Manuel&lt;BR /&gt;Address: 172.17.2.11&lt;BR /&gt;Netmask: 255.255.254.0&lt;BR /&gt;Broadcast: 172.17.3.255&lt;BR /&gt;—[ IPv6 ] —&lt;BR /&gt;Configuration: Disabled&lt;BR /&gt;&lt;BR /&gt;===============[ Proxy Information ] ================&lt;BR /&gt;State: Disabled&lt;BR /&gt;Authentication: Disabled&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show interface ip brief&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;Internal-Data0/1 unregistered YES unset up&lt;BR /&gt;Ethernet1/1 172.17.10.66 YES CONFIG up&lt;BR /&gt;Ethernet1/2 172.17.10.74 YES CONFIG up&lt;BR /&gt;Ethernet1/3 172.17.10.81 YES CONFIG up&lt;BR /&gt;Ethernet1/4 172.17.10.89 YES CONFIG up&lt;BR /&gt;Ethernet1/5 172.17.7.1 YES CONFIG up&lt;BR /&gt;Ethernet1/6 172.17.7.9 YES CONFIG down down down&lt;BR /&gt;Ethernet1/7 172.17.7.17 YES CONFIG down down down&lt;BR /&gt;Etherenet1/8 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/9 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/10 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/11 1.1.1.2 YES unset up up&lt;BR /&gt;Ethernet1/12 2.2.2.2 YES unset up up&lt;BR /&gt;Ethernet1/13 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/14 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/15 unsigned YES unset admin down down&lt;BR /&gt;Ethernet1/16 unsigned YES unset admin down down&lt;BR /&gt;Internal-Control1/1 unregistered YES unset up&lt;BR /&gt;Internal-Data1/1 169.254.1.1 YES unset up up&lt;BR /&gt;Internal-Data1/2 unsigned YES unset up&lt;BR /&gt;Management1/1 unsigned YES unset up&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show route&lt;BR /&gt;&lt;BR /&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - cancel date default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloadestatic route, + - reregistered route&lt;BR /&gt;Gateway of last resort is 172.17.10.65 to network 0.0.0.0&lt;BR /&gt;&lt;BR /&gt;O*E1 0.0.0.0 0.0.0.0 [110/1010] via 172.17.10.65, 2w6d, TO_RT01_OUTSIDE-1&lt;BR /&gt;C 1.1.1.0 255.255.255.252 is directionally connected, failover_link&lt;BR /&gt;L 1.1.1.2 255.255.255.255 is directionally connected, failover_link&lt;BR /&gt;C 2.2.2.0 255.255.255.252 is directionally connected, state_link&lt;BR /&gt;L 2.2.2.2 255.255.255.255 is directionally connected, state_link&lt;BR /&gt;O E2 172.16.1.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.2.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.3.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.20.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 5d17h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.16.255.0 255.255.255.0&lt;BR /&gt;[110/1] via 172.17.10.83, 5d17h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.0.0 255.255.248.0&lt;BR /&gt;[110/20] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;C 172.17.7.0 255.255.255.248 is directionally connected, SHAOXING_DMZ_LM_IDS&lt;BR /&gt;L 172.17.7.1 255.255.255.255 is directionally connected, SHAOXING_DMZ_LM_IDS&lt;BR /&gt;O E1 172.17.8.0 255.255.255.0&lt;BR /&gt;[110/21] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.10.0 255.255.255.224&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;C 172.17.10.64 255.255.255.248 is directionally connected, TO_RT01_OUTSIDE-1&lt;BR /&gt;L 172.17.10.66 255.255.255.255 is directionally connected, TO_RT01_OUTSIDE-1&lt;BR /&gt;C 172.17.10.72 255.255.255.248 is directionally connected, TO_RT02_OUTSIDE-2&lt;BR /&gt;L 172.17.10.74 255.255.255.255 is directionally connected, TO_RT02_OUTSIDE-2&lt;BR /&gt;C 172.17.10.80 255.255.255.248&lt;BR /&gt;is directionally connected, TO_HXSW01_INSIDE-1&lt;BR /&gt;L 172.17.10.81 255.255.255.255&lt;BR /&gt;is directionally connected, TO_HXSW01_INSIDE-1&lt;BR /&gt;C 172.17.10.88 255.255.255.248&lt;BR /&gt;is directionally connected, TO_HXSW02_INSIDE-2&lt;BR /&gt;L 172.17.10.89 255.255.255.255&lt;BR /&gt;is directionally connected, TO_HXSW02_INSIDE-2&lt;BR /&gt;O 172.17.10.96 255.255.255.252&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.11.0 255.255.255.0&lt;BR /&gt;[110/12] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.17.20.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O 172.17.255.1 255.255.255.255&lt;BR /&gt;[110/11] via 172.17.10.65, 2w6d, TO_RT01_OUTSIDE-1&lt;BR /&gt;O 172.17.255.2 255.255.255.255&lt;BR /&gt;[110/16] via 172.17.10.73, 2w6d, TO_RT02_OUTSIDE-2&lt;BR /&gt;O 172.17.255.5 255.255.255.255&lt;BR /&gt;[110/10] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O 172.17.255.6 255.255.255.255&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 172.31.0.0 255.255.0.0&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.169.10.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.169.18.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 172.169.253.0 255.255.255.0&lt;BR /&gt;[110/12] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O IA 192.168.168.0 255.255.255.0&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;O E2 198.18.1.4 255.255.255.252&lt;BR /&gt;[110/1] via 172.17.10.83, 6d16h, TO_HXSW01_INSIDE-1&lt;BR /&gt;O 198.18.1.8 255.255.255.252&lt;BR /&gt;[110/11] via 172.17.10.83, 2w6d, TO_HXSW01_INSIDE-1&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show tailor&lt;BR /&gt;descriptor exec history interface state statistics |&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show tailor state&lt;BR /&gt;&lt;BR /&gt;State Last Failure Response Date/Time&lt;BR /&gt;This host - Second&lt;BR /&gt;Active None&lt;BR /&gt;Other host - Primary&lt;BR /&gt;Stanby Ready Comm Failure 09:58:15 UTC Jun 1 2022&lt;BR /&gt;&lt;BR /&gt;====Configuration State===&lt;BR /&gt;sync done&lt;BR /&gt;====Communication State===&lt;BR /&gt;Mac Set&lt;BR /&gt;&lt;BR /&gt;&amp;gt;?&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Jun 2022 10:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4636428#M1091158</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-22T10:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Hot: Re:Hot:Hot:How Re:ftd adds static routes and configurations b</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4636432#M1091159</link>
      <description>&lt;P&gt;to ping from the FMC you need to be the root user, so you need to log into cli, enter expert mode and then sudo su -&lt;/P&gt;
&lt;P&gt;could you issue the command show managers on both FTD?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 10:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4636432#M1091159</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-22T10:21:00Z</dc:date>
    </item>
    <item>
      <title>Hot: Re: Hot: Re:Hot:Hot:How Re:ftd adds static routes and configurations b</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4638024#M1091230</link>
      <description>FTD-A 172.17.2.10&lt;BR /&gt;&amp;gt; show managers&lt;BR /&gt;Type: Manager&lt;BR /&gt;Host: 172.16.1.31&lt;BR /&gt;Registration: Completed&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&lt;BR /&gt;?FTD-A 172.17.2.11 (managed side events)&lt;BR /&gt;&amp;gt; show managers&lt;BR /&gt;Type: Manager&lt;BR /&gt;Host: 172.16.1.31&lt;BR /&gt;Registration: Completed&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&lt;BR /&gt;?&lt;BR /&gt;&lt;BR /&gt;FMC-SSH&lt;BR /&gt;&lt;BR /&gt;Last login: Fri Jun 24 04:46:39 2022 from 172.17.3.68&lt;BR /&gt;&lt;BR /&gt;Copright 2004-2020, Cisco and/or its affairs. All rights reserved.&lt;BR /&gt;Cisco is a registered trader of Cisco Systems, Inc.&lt;BR /&gt;All other travels are property of their responsive officers.&lt;BR /&gt;&lt;BR /&gt;Cisco Fire Linux OS v6.4.0 (build 2)&lt;BR /&gt;Cisco Firepower Management Center for VMWare v6.4.0.7 (build 53)&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;Configure Change to Configure mode&lt;BR /&gt;exit exit this CLI session&lt;BR /&gt;excel Invokable a shell&lt;BR /&gt;show Change to Show Mode&lt;BR /&gt;system change to system mode&lt;BR /&gt;&lt;BR /&gt;&amp;gt; excert&lt;BR /&gt;admin@ASCHZXS-12F-JF-A02-CISCO-FMC-01:~$ ping 172.17.2.10&lt;BR /&gt;Ping: icmp open socket: Operation not operated&lt;BR /&gt;admin@ASCHZXS-12F-JF-A02-CISCO-FMC-01:~$&lt;BR /&gt;&lt;BR /&gt;?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 24 Jun 2022 04:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4638024#M1091230</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-24T04:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Hot: Re: Hot: Re:Hot:Hot:How Re:ftd adds static routes and configu</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639090#M1091298</link>
      <description>&lt;P&gt;to issue a ping from the FMC you need to have root privileges, (sudo su -)&lt;/P&gt;
&lt;P&gt;But as per the output of show managers the FMC has successfully registered with the FTD device.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jun 2022 21:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639090#M1091298</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-26T21:07:39Z</dc:date>
    </item>
    <item>
      <title>Reply: Re:Hot:Re:Hot:Re:Hot:Hot:How Re:ftd adds static routes and configu</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639162#M1091303</link>
      <description>&lt;P&gt;However, the FMC shows that the FTD is disabled and cannot be managed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to try to make a any any configuration on FTD-CLI to see if the FTD-A is unable to connect to the FMC due to policy reasons, and how to write such a policy under the CLI and save it to take effect.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 03:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639162#M1091303</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-27T03:43:56Z</dc:date>
    </item>
    <item>
      <title>Reply: Re:Hot:Re:Hot:Re:Hot:Hot:How Re:ftd adds static routes and configu</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639164#M1091304</link>
      <description>&lt;P&gt;Since I was the post-docking device, the FTD was disconnected in November 2021.&lt;/P&gt;&lt;P&gt;Or how I should seek remote technical support.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 03:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639164#M1091304</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-27T03:45:21Z</dc:date>
    </item>
    <item>
      <title>Reply: Re:Hot:Re:Hot:Hot:How Re:ftd adds static routes and configurations b</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639174#M1091305</link>
      <description>&lt;P&gt;root@ASCHZXS-12F-JF-A02-CISCO-FMC-01:/Volume/home/admin# ping 172.16.2.251&lt;BR /&gt;PING 172.16.2.251 (172.16.2.251) 56 (84) bytes of data.&lt;BR /&gt;64 bytes from 172.16.2.251: icmp_req=1 ttl=63 time=0.266 ms&lt;BR /&gt;64 bytes from 172.16.2.251: icmp_req=2 ttl=63 time=0.236 ms&lt;BR /&gt;^C&lt;BR /&gt;— 172.16.2.251 ping statistics —&lt;BR /&gt;2 packets transmited, 2 received, 0% packet loss, time 1032ms&lt;BR /&gt;rtt min/avg/max/mdev = 0.236/0.251/0.266/0.015 ms&lt;BR /&gt;root@ASCHZXS-12F-JF-A02-CISCO-FMC-01:/Volume/home/admin# ping 172.17.2.10&lt;BR /&gt;PING 172.17.2.10 (172.17.2.10) 56 (84) bytes of data.&lt;BR /&gt;64 bytes from 172.17.2.10: icmp_req=1 ttl=60 time=7.89 ms&lt;BR /&gt;64 bytes from 172.17.2.10: icmp_req=2 ttl=60 time=7.90 ms&lt;BR /&gt;64 bytes from 172.17.2.10: icmp_req=3 ttl=60 time=7.93 ms&lt;BR /&gt;^C&lt;BR /&gt;— 172.17.2.10 ping statistics —&lt;BR /&gt;3 packets transmited, 3 received, 0% packet loss, time 2002ms&lt;BR /&gt;rtt min/avg/max/mdev = 7.891/7.907/7.932/0.104 ms&lt;BR /&gt;root@ASCHZXS-12F-JF-A02-CISCO-FMC-01:/Volume/home/admin# ping 172.17.2.11&lt;BR /&gt;PING 172.17.2.11 (172.17.2.11) 56 (84) bytes of data.&lt;BR /&gt;64 bytes from 172.17.2.11: icmp_req=1 ttl=60 time=8.18 ms&lt;BR /&gt;64 bytes from 172.17.2.11: icmp_req=2 ttl=60 time=8.08 ms&lt;BR /&gt;64 bytes from 172.17.2.11: icmp_req=3 ttl=60 time=7.91 ms&lt;BR /&gt;^C&lt;BR /&gt;— 172.17.2.11 ping statistics —&lt;BR /&gt;3 packets transmited, 3 received, 0% packet loss, time 2002ms&lt;BR /&gt;rtt min/avg/max/mdev = 7.916/8.062/8.183/0.110 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried in fmc ping &amp;nbsp;FTD &amp;nbsp;Three are available but only 172.17.2.10 display is disabled.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC 172.16.1.31" style="width: 999px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="FMC 172.16.1.31" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/154702i2E9895D84A2DBA23/image-size/large?v=v2&amp;amp;px=999" role="button" title="WX20220627-120043@2x.png" alt="FMC 172.16.1.31" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FMC 172.16.1.31&lt;/span&gt;&lt;/span&gt;&lt;SPAN class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FMC 172.16.1.31&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD-B 172.17.2.11" style="width: 732px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="FTD-B 172.17.2.11" style="width: 732px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/154703i85D15838532D6E64/image-size/large?v=v2&amp;amp;px=999" role="button" title="WX20220627-120021@2x.png" alt="FTD-B 172.17.2.11" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD-B 172.17.2.11&lt;/span&gt;&lt;/span&gt;&lt;SPAN class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD-B 172.17.2.11&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD-SX 172.16.2.251" style="width: 736px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="FTD-SX 172.16.2.251" style="width: 736px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/154704iE7B840B1180B190D/image-size/large?v=v2&amp;amp;px=999" role="button" title="WX20220627-120027@2x.png" alt="FTD-SX 172.16.2.251" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD-SX 172.16.2.251&lt;/span&gt;&lt;/span&gt;&lt;SPAN class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD-SX 172.16.2.251&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD-A 172.17.2.10" style="width: 936px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="FTD-A 172.17.2.10" style="width: 936px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/154705i87584F0E63A0199E/image-size/large?v=v2&amp;amp;px=999" role="button" title="1656302412146.jpg" alt="FTD-A 172.17.2.10" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD-A 172.17.2.10&lt;/span&gt;&lt;/span&gt;&lt;SPAN class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FTD-A 172.17.2.10&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 04:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639174#M1091305</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-06-27T04:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: Reply: Re:Hot:Re:Hot:Re:Hot:Hot:How Re:ftd adds static routes and</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639868#M1091350</link>
      <description>&lt;P&gt;Does the management traffic for the FTDs pass through FTD-B ?&amp;nbsp; If yes, instead of an any any rule right now, I suggest doing a packet tracer first. One with source of FMC and destination of FTD mgmt IP and destination port of tcp/8305.&amp;nbsp; Then also in the reverse direction FTD mgmt IP to FMC with destination port of tcp/8305.&lt;/P&gt;
&lt;P&gt;If you are looking for technical support I suggest contacting your local Cisco partner, or if you are able to open a TAC case directly then you can do so.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 20:01:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4639868#M1091350</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-06-27T20:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: Re: Re: Re: Re:Hot:Re:Hot:Re:Hot:Hot:Hot:How Re:ftd Add Static Route and</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4645634#M1091679</link>
      <description>&lt;P&gt;Please look at the data I replied to below&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2022 07:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4645634#M1091679</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-07-07T07:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Re: Re: Re: Re:Hot:Re:Hot:Re:Hot:Hot:Hot:How Re:ftd Add Static Route and</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4645666#M1091680</link>
      <description>&lt;P&gt;root@ASCHZXS-12F-JF-A02-CISCO-FMC-01:/Volume/home/admin# telnet 172.17.2.10 8305&lt;BR /&gt;Trying 172.17.2.10...&lt;BR /&gt;Connected to 172.17.2.10.&lt;BR /&gt;Escape character is '^]'.&lt;BR /&gt;^C&lt;BR /&gt;^CConnection closed by foreign host.&lt;BR /&gt;root@ASCHZXS-12F-JF-A02-CISCO-FMC-01:/Volume/home/admin# telnet 172.17.2.11 8305&lt;BR /&gt;Trying 172.17.2.11...&lt;BR /&gt;telnet: connect to address 172.17.2.11: Connection refused&lt;BR /&gt;&lt;A href="mailto:root@ASCHZXS-12F-JF-A02-CISCO-FMC-01:/Volume/home/admin" target="_blank" rel="nofollow noopener noreferrer"&gt;root@ASCHZXS-12F-JF-A02-CISCO-FMC-01:/Volume/home/admin# &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;172.17.2.10 is a FTD_A that I can't manage right now&amp;nbsp;&lt;/P&gt;&lt;P&gt;172.17.2.11 is the FTD_B I can manage today&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is FTD-A Request FMC (172.16.1.31) 8305&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@ASCHZXS-12F-JF-A02-FW-2110-01:/home/admin# telnet 172.16.1.31 8305&lt;BR /&gt;Trying 172.16.1.31...&lt;BR /&gt;Connected to 172.16.1.31.&lt;BR /&gt;Escape character is '^]'.&lt;BR /&gt;^C^C^CConnection closed by foreign host.&lt;BR /&gt;root@ASCHZXS-12F-JF-A02-FW-2110-01:/home/admin#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2022 08:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4645666#M1091680</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2022-07-07T08:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Re: Re: Re: Re:Hot:Re:Hot:Re:Hot:Hot:Hot:How Re:ftd Add Static Rou</title>
      <link>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4645689#M1091681</link>
      <description>&lt;P&gt;Please read my last post and provide the requested information&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2022 09:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-ftd-add-static-routes-in-ctl-and-configure-priorities/m-p/4645689#M1091681</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-07-07T09:25:52Z</dc:date>
    </item>
  </channel>
</rss>

