<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet-Tracer Output (FTD 7.2.4) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106490#M1112684</link>
    <description>&lt;P&gt;As you like friend.&lt;/P&gt;
&lt;P&gt;Goodluck&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Thu, 16 May 2024 20:45:11 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-05-16T20:45:11Z</dc:date>
    <item>
      <title>Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106440#M1112668</link>
      <description>&lt;P&gt;Trying to use packet-tracer to determine the direct rule a packet is being allowed but the output only lists what appears to be a dynamic ACL created on the FTD. How can I get the exact rule that is allowing the traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ex.&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 10.1.1.1 5555 8.8.8.8 53 detailed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 19:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106440#M1112668</guid>
      <dc:creator>Chuck Reimer</dc:creator>
      <dc:date>2024-05-16T19:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106444#M1112669</link>
      <description>&lt;P&gt;Share full packet tracer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:08:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106444#M1112669</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-16T20:08:12Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106446#M1112670</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1426508"&gt;@Chuck Reimer&lt;/a&gt; you can use the command &lt;STRONG&gt;system support firewall-engine-debug&lt;/STRONG&gt; and apply a filter on source/destination IP and&amp;nbsp; generate traffic to determine what rule the traffic matches against.&lt;/P&gt;
&lt;P&gt;Is your input interface correct? should it not be the inside interface if your source is a private IP address 10.1.1.1 or are you hairpinning traffic?&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 19:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106446#M1112670</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-05-16T19:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106448#M1112671</link>
      <description>&lt;P&gt;For security reasons, I don't want to post the entire output but here is the output for access-list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 19:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106448#M1112671</guid>
      <dc:creator>Chuck Reimer</dc:creator>
      <dc:date>2024-05-16T19:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106451#M1112672</link>
      <description>&lt;P&gt;!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106451#M1112672</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-16T20:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106457#M1112673</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;I tried the firewall-engine-debug but didn't get any output after trying to establish the connection. Is this written to your console output or to syslog? Additionally I updated my input interface but the ACL is still masked and not revealing the actual rule allowing the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 19:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106457#M1112673</guid>
      <dc:creator>Chuck Reimer</dc:creator>
      <dc:date>2024-05-16T19:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106458#M1112674</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1426508"&gt;@Chuck Reimer&lt;/a&gt; if traffic matches the filter you applied it should display on the console.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214577-firepower-data-path-troubleshooting-phas.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/214577-firepower-data-path-troubleshooting-phas.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 19:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106458#M1112674</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-05-16T19:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106459#M1112675</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;it's just a generic PT example. I'm testing RDP access to external server in Azure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 19:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106459#M1112675</guid>
      <dc:creator>Chuck Reimer</dc:creator>
      <dc:date>2024-05-16T19:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106462#M1112676</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;That worked perfectly after I left out the source port. I attended a session last year&amp;nbsp;@ Ciscolive that went over this debug command. Forgot all about it. Thanks for the help here!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106462#M1112676</guid>
      <dc:creator>Chuck Reimer</dc:creator>
      <dc:date>2024-05-16T20:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106463#M1112677</link>
      <description>&lt;P&gt;!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106463#M1112677</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-16T20:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106465#M1112678</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;There is not rule in the pre-filter that would allow this traffic. I think output just says that prefilter was assigned but not necessarily used. Rob's advice worked perfectly if you ever need this info.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:09:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106465#M1112678</guid>
      <dc:creator>Chuck Reimer</dc:creator>
      <dc:date>2024-05-16T20:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106479#M1112683</link>
      <description>&lt;P&gt;I guess in closing, packet-tracer is a good troubleshooting tool to determine whether the packet is allowed or not but if it is allowed and you want to determine actual rule&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;solution works perfectly. Thanks all for the help and guidance on such a elementary question. Kind of embarrassed to ask&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106479#M1112683</guid>
      <dc:creator>Chuck Reimer</dc:creator>
      <dc:date>2024-05-16T20:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: Packet-Tracer Output (FTD 7.2.4)</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106490#M1112684</link>
      <description>&lt;P&gt;As you like friend.&lt;/P&gt;
&lt;P&gt;Goodluck&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-ftd-7-2-4/m-p/5106490#M1112684</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-16T20:45:11Z</dc:date>
    </item>
  </channel>
</rss>

