<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access rules firepower 1010 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870522#M1102449</link>
    <description>&lt;P&gt;Hello Aref,&lt;/P&gt;&lt;P&gt;the DNS resolvers is the external ones.&lt;/P&gt;&lt;P&gt;when you say firewall able to resolve that FQDN do you mean when i do it via cli ?&lt;/P&gt;&lt;P&gt;becuase when i do it via CLI like this ping system facebook.com&amp;nbsp; it doesnt work&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Jul 2023 00:46:03 GMT</pubDate>
    <dc:creator>BornJames</dc:creator>
    <dc:date>2023-07-10T00:46:03Z</dc:date>
    <item>
      <title>access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870272#M1102437</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;have a question regarding access rules.&lt;/P&gt;&lt;P&gt;how come if any any eveyrhting works fine.&lt;/P&gt;&lt;P&gt;however when i want to allow lets say connect to facebook, and everything else disable&amp;nbsp;&lt;/P&gt;&lt;P&gt;so i put source(inside) network(any-ipv4) ports(any) destination(outside_zone) network(FQDN facebook.com) ports (any)&lt;/P&gt;&lt;P&gt;so now I should have connection only to facebook, however no connection at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jul 2023 01:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870272#M1102437</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-09T01:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870505#M1102443</link>
      <description>&lt;P&gt;How the internal endpoints resolve facebook.com? Is that via an internal DNS server or an external one? In case you are using internal DNS, is that internal DNS server able to resolve facebook.com? Also, is the firewall able to actually resolve that FQDN? and is the firewall and the endpoints are resolving to the same IP? If not the firewall might drop the traffic if the IP addresses don't match.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jul 2023 22:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870505#M1102443</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-09T22:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870522#M1102449</link>
      <description>&lt;P&gt;Hello Aref,&lt;/P&gt;&lt;P&gt;the DNS resolvers is the external ones.&lt;/P&gt;&lt;P&gt;when you say firewall able to resolve that FQDN do you mean when i do it via cli ?&lt;/P&gt;&lt;P&gt;becuase when i do it via CLI like this ping system facebook.com&amp;nbsp; it doesnt work&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 00:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870522#M1102449</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-10T00:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870724#M1102450</link>
      <description>&lt;P&gt;so there is issue with DNS&amp;nbsp;&lt;BR /&gt;first point to clear here is&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;DNS for data different than DNS for mgmt&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;you run FPR 1010 with ASA image or FTD image ?&lt;BR /&gt;FPR mgmt by FDM or FMC ?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 08:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870724#M1102450</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-10T08:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870774#M1102452</link>
      <description>&lt;P&gt;Thank you for the reply.&lt;/P&gt;&lt;P&gt;I have got default DNS group which consists of 8.8.8.8 8.8.4.4 and is used for Vlan 1 and for management&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BornJames_0-1688980115000.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/189949i12AAF1B7AEBB1D1A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="BornJames_0-1688980115000.png" alt="BornJames_0-1688980115000.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;but I also I have got this configured, so the PCs could get this DNS&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BornJames_1-1688980765679.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/189968iF1F6182890518F6E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="BornJames_1-1688980765679.png" alt="BornJames_1-1688980765679.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;are you saying that it is not how it is suppose to be ?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;you run FPR 1010 with ASA image or FTD image ?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;FPR mgmt by FDM or FMC ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;how would I check that ?&lt;/P&gt;&lt;P&gt;it is just out of box&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 09:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870774#M1102452</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-10T09:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870789#M1102453</link>
      <description>&lt;P&gt;Yes, to verify the firewall resolution you can try with the command "sh dns" from LINA CLI, or you can use the command "sh access-list &amp;lt; the ACL name&amp;gt;" and look at the rule where you defined the FQDN. If you are running an FTD code then you can type the command "support system diagnostic-cli" from the CLISH mode (&amp;gt;) and then type "enable" and hit enter with no password, that will take you to LINA CLI which is basically the ASA CLI.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 09:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870789#M1102453</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-10T09:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870804#M1102455</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;I dont have these commands "sh dns" "invalid command at ^ dns"&lt;/P&gt;&lt;P&gt;I did find an article on troubleshooting the DNS, but was surprised that I cannot run these commands&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 09:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870804#M1102455</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-10T09:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870826#M1102456</link>
      <description>&lt;P&gt;Would you mind sending the screenshot from where you are trying to apply them?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 09:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870826#M1102456</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-10T09:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870832#M1102457</link>
      <description>&lt;P&gt;i have tried through here&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BornJames_0-1688983308995.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/189972i217E1AC62B20ACE3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="BornJames_0-1688983308995.png" alt="BornJames_0-1688983308995.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;when running via the gui clie i get "this command is not supported"&lt;/P&gt;&lt;P&gt;as well as via putty&lt;/P&gt;&lt;P&gt;when via putty&amp;nbsp;&lt;/P&gt;&lt;P&gt;testfirepower# sh dns&lt;/P&gt;&lt;P&gt;% Invalid Command at '^' marker&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870832#M1102457</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-10T10:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870847#M1102459</link>
      <description>&lt;P&gt;the (&amp;gt;) is what so called CLISH mode, those commands can't be run from there, however, it should have worked via the SSH connection. Did you try to issue the other command "sh access-list &amp;lt; the ACL name&amp;gt;"?, also, if you run the command "sh run dns" do you see any configuration output?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870847#M1102459</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-10T10:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870852#M1102460</link>
      <description>&lt;P&gt;Client -&amp;gt; FPR -&amp;gt; 8.8.8.8 this need ACL config in FPR allow INside subnet to ANY UDP port 53 and as normal you need NATing INside to OUTside public IP&lt;BR /&gt;&lt;BR /&gt;FPR -&amp;gt; 8.8.8.8 this need change the source of DNS from mgmt to INside Or keep mgmt as source of DNS but NATing the mgmt interface to OUTside interface.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870852#M1102460</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-10T10:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870858#M1102461</link>
      <description>&lt;P&gt;im not connected via ssh but console.&lt;/P&gt;&lt;P&gt;I am wondering could this be becuase the license is not enabled yet ?&lt;/P&gt;&lt;P&gt;we havent registered the device yet&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870858#M1102461</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-10T10:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870860#M1102462</link>
      <description>&lt;P&gt;I don't believe applying the licenses would affect at least the DNS configuration. How did you get to this mode "&lt;SPAN&gt;testfirepower#&amp;nbsp;&lt;/SPAN&gt;" from the console? did you have to move from the CLISH mode (&amp;gt;) using the command "support system diagnostic-cli"? if not you might be on the FXOS line rather than LINA.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870860#M1102462</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-10T10:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870863#M1102463</link>
      <description>&lt;P&gt;we just have a console cable connected to the firewall and when I use putty to connect to it, it asks crednetials and thats it im in&amp;nbsp;&lt;SPAN&gt;testfirepower#&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;" mode&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;didnt have to use anything&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870863#M1102463</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-10T10:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870864#M1102464</link>
      <description>&lt;P&gt;Yeh, I do have that rle allowing from inside to outside port 53 for tcp and udp, also NATing is in place as the everything is working fine when I have any to any rule configured.&lt;/P&gt;&lt;P&gt;dont understand the second part that I need to change for management...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870864#M1102464</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-10T10:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870865#M1102465</link>
      <description>&lt;P&gt;ok then I believe you are in FXOS mode. When you are on "&lt;SPAN&gt;testfirepower#&lt;/SPAN&gt;" try please to type "connect ftd", and then "support system diagnostic-cli" and then "enable" and hit enter with no password and finally issue the above commands please.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870865#M1102465</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-10T10:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870871#M1102467</link>
      <description>&lt;P&gt;OK, when you use FQDN in ACL instead of IP, here the FPR will resolve the FQDN into IP&amp;nbsp;&lt;BR /&gt;so here the DNS is mgmt not data,&amp;nbsp;&lt;BR /&gt;FPR will send DNS request using mgmt as source IP and 8.8.8.8 as destination BUT&amp;nbsp;&lt;BR /&gt;are 8.8.8.8 know FPR mgmt private IP ? sure NO, so you need IP that can access internet and hence you can use data interface INside as source for DNS mgmt traffic.&amp;nbsp;&lt;BR /&gt;hope this help you friend.&amp;nbsp;&lt;BR /&gt;thanks&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 10:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4870871#M1102467</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-10T10:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4871400#M1102509</link>
      <description>&lt;P&gt;Hello Aref,&lt;/P&gt;&lt;P&gt;It did allow me to enter the connect ftd, i got to "&amp;gt;" mode but when trying to enter support system diagnostic-cli it doenst let me , cnanot push space between the words or even push enter when entering just support&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 02:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4871400#M1102509</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-11T02:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4871403#M1102510</link>
      <description>&lt;P&gt;Hello MHM,&lt;/P&gt;&lt;P&gt;I have access to the internet via Vlan 1 it is working, what would this rule look like ?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"so you need IP that can access internet and hence you can use data interface INside as source for DNS mgmt traffic. "&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thank you for the help&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 03:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4871403#M1102510</guid>
      <dc:creator>BornJames</dc:creator>
      <dc:date>2023-07-11T03:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: access rules firepower 1010</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4871488#M1102514</link>
      <description>&lt;P&gt;Apologies, that was my bad, I did invert the first two words. The command should be "system support diagnostic-cli".&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 07:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-firepower-1010/m-p/4871488#M1102514</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-11T07:08:14Z</dc:date>
    </item>
  </channel>
</rss>

