<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FDM SNMP setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4745268#M1096275</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: INPUT-ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: Resolve Egress Interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Found next-hop&lt;FONT color="#FF0000"&gt; 10.10.222.11&lt;/FONT&gt; using egress ifc inside(vrfid:0) &amp;lt;&amp;lt;- by use&amp;nbsp;&lt;FONT color="#FF0000"&gt;10.10.222.2&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;ARE you sure that you dont have IP conflict, check subnet mask.&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Dec 2022 09:14:24 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-12-26T09:14:24Z</dc:date>
    <item>
      <title>FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4735242#M1095768</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am going through the SNMP settings.&lt;BR /&gt;FPR2110/FDM 7.0.1-84 and 6.6.1-91&lt;BR /&gt;The current settings were all done by referring to the Cisco manual, and the 6.6.1 version did all the settings through Flexconfig posted on Youtube.&lt;/P&gt;
&lt;P&gt;I confirmed that the SNMP Manager is pinging to the main firewall / server firewall Inside interface.&lt;/P&gt;
&lt;P&gt;I confirmed that SNMP settings were added on the CLI, but the problem is that there is no response when I test through SNMPWALK.&lt;BR /&gt;Even though I tried to do SNMPWALK to myself in the firewall CLI, there is no response.&lt;/P&gt;
&lt;P&gt;Is it a problem that Inside Interface is composed of serial sections?&lt;BR /&gt;Even so, I guess SNMP Manager can receive MiB from Main/Server firewall's inside interface.&lt;BR /&gt;Because SNMP can ping with both interface.&lt;/P&gt;
&lt;P&gt;I don't know which one is the problem.&lt;BR /&gt;Below is the topology of my network.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SeokGeunChoi73564_0-1670549084846.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/170253iE28DEC0B8E21E364/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SeokGeunChoi73564_0-1670549084846.png" alt="SeokGeunChoi73564_0-1670549084846.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 01:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4735242#M1095768</guid>
      <dc:creator>SeokGeunChoi73564</dc:creator>
      <dc:date>2022-12-09T01:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742570#M1096096</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Did you refer to this doc for configuration &amp;nbsp;:&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/216551-configure-and-troubleshoot-snmp-on-firep.html#anc9" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/216551-configure-and-troubleshoot-snmp-on-firep.html#anc9&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;At the end of the doc there are few verification output. Can you check that and is it possible to share those?&lt;BR /&gt;A quick packet capture / trace would help to identify where its failing exactly.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;-----------------------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;If you find my reply solved your question or issue, kindly click the 'Accept as Solution' button and vote it as helpful.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;You can also learn more about Secure Firewall (formerly known as NGFW) through our live Ask the Experts (ATXs) session. Check out Cisco Network Security ATXs Resources [&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493&lt;/A&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:14px;"&gt;-----------------------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Divya Jain&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 11:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742570#M1096096</guid>
      <dc:creator>Divya Jain</dc:creator>
      <dc:date>2022-12-20T11:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742582#M1096097</link>
      <description>&lt;P&gt;&lt;SPAN&gt;snmp-server host &amp;lt;interface&amp;gt; .......... &amp;lt;&amp;lt;&amp;lt;- are you select the interface that ASA will use to connect to SNMP server ?&lt;BR /&gt;are you sure that the interface ip is reachable?&lt;BR /&gt;&lt;BR /&gt;you can do packet-tracer&amp;nbsp;&lt;BR /&gt;packet-tracer input OUT udp &amp;lt;interface IP &amp;gt; 1234 &amp;lt;SNMP server&amp;gt; 161&lt;BR /&gt;&lt;BR /&gt;do this and see if there is NAT or ACL prevent access to server.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 11:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742582#M1096097</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-20T11:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742950#M1096132</link>
      <description>&lt;P&gt;Hi, This is current running-config on FDM CLI&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SeokGeunChoi73564_0-1671579643107.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171520iF194A5A6267F70B1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SeokGeunChoi73564_0-1671579643107.png" alt="SeokGeunChoi73564_0-1671579643107.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to use inside interface, diagnostic interface is for testing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SeokGeunChoi73564_1-1671579702775.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171521i20F3AAC2E8D9F3D1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SeokGeunChoi73564_1-1671579702775.png" alt="SeokGeunChoi73564_1-1671579702775.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And I try to verify using FDM CLI's expert mode, execute snmpwalk to itself but it didn't work.&lt;/P&gt;
&lt;P&gt;192.168.255.1 is BB (C9300)&lt;/P&gt;
&lt;P&gt;192.168.255.3 is FDM diagnostic interface&lt;/P&gt;
&lt;P&gt;10.10.10.1 is inside interface.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 23:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742950#M1096132</guid>
      <dc:creator>SeokGeunChoi73564</dc:creator>
      <dc:date>2022-12-20T23:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742955#M1096133</link>
      <description>&lt;P&gt;Hi, This is current running-config on FDM CLI&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SeokGeunChoi73564_4-1671579879784.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171525iB914DEF0E6AF12EF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SeokGeunChoi73564_4-1671579879784.png" alt="SeokGeunChoi73564_4-1671579879784.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to use inside interface, diagnostic interface is for testing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SeokGeunChoi73564_5-1671579879783.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171524i854B7259D1CBE6CD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SeokGeunChoi73564_5-1671579879783.png" alt="SeokGeunChoi73564_5-1671579879783.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And I try to verify using FDM CLI's expert mode, execute snmpwalk to itself but it didn't work.&lt;/P&gt;
&lt;P&gt;192.168.255.1 is BB (C9300)&lt;/P&gt;
&lt;P&gt;192.168.255.3 is FDM diagnostic interface&lt;/P&gt;
&lt;P&gt;10.10.10.1 is inside interface.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;+ When I finished test using packet-tracer, I'll respond asap&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 23:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4742955#M1096133</guid>
      <dc:creator>SeokGeunChoi73564</dc:creator>
      <dc:date>2022-12-20T23:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4743992#M1096205</link>
      <description>&lt;P&gt;&amp;gt; packet-tracer input Inside udp 192.168.230.23 snmp 10.10.222.9 snmp&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.10.220.1 using egress ifc outside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435476 ifc inside object 192.168.230.0-24 ifc outside any rule-id 268435476 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435476: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435476: L5 RULE: Policy19&lt;BR /&gt;object-group service |acSvcg-268435476&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-snmp&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect snmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1482498183, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Packet: UDP&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: allow rule, id 268435476, allow&lt;BR /&gt;Snort id 1, NAP id 1, IPS id 0, Verdict PASS&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.10.220.1 using egress ifc outside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 14&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.10.220.1 on interface outside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address ac4a.5654.e657 hits 82388 reference 808&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 13:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4743992#M1096205</guid>
      <dc:creator>SeokGeunChoi73564</dc:creator>
      <dc:date>2022-12-22T13:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4744462#M1096227</link>
      <description>&lt;P&gt;&lt;SPAN&gt;IN SERVER FW&lt;BR /&gt;we must do packet tracer input to OUT interface of Server FW,&lt;BR /&gt;we need to see if the other device can access Server IN.&lt;BR /&gt;packet-tracer input &lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;OUT&lt;/STRONG&gt;&lt;/FONT&gt; udp &amp;lt;interface IP &amp;gt; 1234&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;&amp;lt;SNMP server&amp;gt; 161&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2022 09:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4744462#M1096227</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-23T09:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4745242#M1096273</link>
      <description>&lt;P&gt;Hi, here is info.&lt;/P&gt;
&lt;P&gt;10.10.222.2 = Svr F/W's Outside interface IP&lt;/P&gt;
&lt;P&gt;192.168.223.130 = SNMP Manager, inside of Svr F/W&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;(Svr F/W inside :10.10.222.9)&lt;/STRONG&gt; &amp;lt;&amp;gt; &lt;STRONG&gt;(SvrFarm SW : 10.10.222.11)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input outside udp 10.10.222.2 snmp 192.168.223.130 snmp&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;STRONG&gt;Found next-hop 10.10.222.11 using egress ifc inside(vrfid:0)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000000aab63c99d4 flow (NA)/NA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;++ Outside Any &amp;gt; Inside 192.168.223.130(SNMP Man) Allow all, and also every access-rule is allowed.&lt;/P&gt;
&lt;P&gt;Only default rule is deny&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SeokGeunChoi73564_0-1672043292357.png" style="width: 849px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/172043i3475618E9D0185DA/image-dimensions/849x52?v=v2" width="849" height="52" role="button" title="SeokGeunChoi73564_0-1672043292357.png" alt="SeokGeunChoi73564_0-1672043292357.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;+++ below from here were all worked. (10.10.10.1 = Main F/W's Inside interface) (192.168.255.1 = B/B's VLAN IP)&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input outside udp 10.10.10.1 snmp 192.168.223.130 snmp&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input outside udp 192.168.255.1 snmp 192.168.223.130 snmp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2022 08:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4745242#M1096273</guid>
      <dc:creator>SeokGeunChoi73564</dc:creator>
      <dc:date>2022-12-26T08:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4745268#M1096275</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: INPUT-ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: Resolve Egress Interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Found next-hop&lt;FONT color="#FF0000"&gt; 10.10.222.11&lt;/FONT&gt; using egress ifc inside(vrfid:0) &amp;lt;&amp;lt;- by use&amp;nbsp;&lt;FONT color="#FF0000"&gt;10.10.222.2&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;ARE you sure that you dont have IP conflict, check subnet mask.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2022 09:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4745268#M1096275</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-26T09:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4745399#M1096282</link>
      <description>&lt;P&gt;every Serial line are assigned 29bit subnet mask.&lt;/P&gt;
&lt;P&gt;10.10.222.1/29 -&amp;gt; 222.0~222.7&lt;/P&gt;
&lt;P&gt;10.10.222.9/29 -&amp;gt; 222.8~222.15&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2022 23:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4745399#M1096282</guid>
      <dc:creator>SeokGeunChoi73564</dc:creator>
      <dc:date>2022-12-26T23:51:44Z</dc:date>
    </item>
    <item>
      <title>Re: FDM SNMP setup</title>
      <link>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4751316#M1096561</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;As per your output, it shows that packet is dropped because of &amp;nbsp;access list. check if you have any ACL configured for that particular traffic&lt;BR /&gt;&lt;BR /&gt;""&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; packet-tracer input outside udp 10.10.222.2 snmp 192.168.223.130 snmp&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.10.222.11 using egress ifc inside(vrfid:0)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;BR /&gt;Subtype:&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) &lt;/STRONG&gt;Flow is denied by configured rule, Drop-location: frame 0x000000aab63c99d4 flow (NA)/NA&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Divya Jain&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 13:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-snmp-setup/m-p/4751316#M1096561</guid>
      <dc:creator>Divya Jain</dc:creator>
      <dc:date>2023-01-09T13:17:20Z</dc:date>
    </item>
  </channel>
</rss>

