<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traceroute through FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5121856#M1113183</link>
    <description>&lt;PRE&gt;icmp permit any time-exceeded &amp;lt;your outside interface name&amp;gt;
icmp permit any unreachable &amp;lt;your outside interface name&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;How did you enabled this in FDM can't find?&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 11:26:42 GMT</pubDate>
    <dc:creator>sherali mamatkarimov</dc:creator>
    <dc:date>2024-05-31T11:26:42Z</dc:date>
    <item>
      <title>Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792237#M991334</link>
      <description>&lt;P&gt;I am trying to get traceroute to work from my internal network to the Internet through a FTD2110 managed by FMC running 6.2.3 code&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created an access policy allowing ICMP type 3 and 11 from the outside to the inside. I added ICMP permit statements in the Platform Settings for the device (3 and 11 on the outside interface to any-ipv4).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also added the Flex config statement to decrement the TTL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But this still isn't working. Is this a bug? Unsupported?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:44:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792237#M991334</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2020-02-21T16:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792268#M991335</link>
      <description>&lt;P&gt;check link&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/threat_defense_service_policies.html#id_71096" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-guide-v63/threat_defense_service_policies.html#id_71096&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="traceroute.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/29082i7101DD1E1C113B46/image-size/large?v=v2&amp;amp;px=999" role="button" title="traceroute.PNG" alt="traceroute.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 15:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792268#M991335</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-31T15:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792305#M991336</link>
      <description>&lt;P&gt;Unfortunately, that isn't working either&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the GUI doesn't interpret the rule correctly--when you try to add OSPF(89) as a port, it simply defaults to "any"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But that isn't the underlying problem. The issue I am having is that the FTD won't pass the traceroute traffic period--it is dropping the ICMP on the outside interface. I don't even get to the TTL issue&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(wishing we were still using the ASA ...)&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 16:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792305#M991336</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2019-01-31T16:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792367#M991337</link>
      <description>&lt;P&gt;Have you seen the instructions at packetu.com? Paul Stewart does a nice job of walking through the necessary configuration there:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://packetu.com/2018/08/12/traceroute-through-firepower-threat-defense/" target="_blank"&gt;https://packetu.com/2018/08/12/traceroute-through-firepower-threat-defense/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have it working like that on several FTD deployments.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 16:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792367#M991337</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-01-31T16:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792385#M991338</link>
      <description>&lt;P&gt;yes I did, and verified the configuration in CLI. Everything looks correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 17:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3792385#M991338</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2019-01-31T17:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3793069#M991339</link>
      <description>&lt;P&gt;Here's what the relevant bits in an FTD running-config should look like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;icmp permit any time-exceeded &amp;lt;your outside interface name&amp;gt;
icmp permit any unreachable &amp;lt;your outside interface name&amp;gt;
!
policy-map global_policy
&amp;lt;snip&amp;gt;
  inspect icmp 
  inspect icmp error 
 class class-default
 &amp;lt;snip&amp;gt;
 set connection decrement-ttl
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you confirm you have those?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If so, have you tried a packet-tracer diagnostic and what does it show?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Feb 2019 17:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3793069#M991339</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-02-01T17:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3804212#M991340</link>
      <description>&lt;P&gt;i turns out that there was another rule in the access policy that was higher up and causing the problem.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Feb 2019 16:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3804212#M991340</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2019-02-18T16:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3989010#M991341</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this supported on FTD 6.5 FDM to enable the FW as a hop on the traceroute?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 16:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3989010#M991341</guid>
      <dc:creator>gcube</dc:creator>
      <dc:date>2019-11-25T16:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3989274#M991342</link>
      <description>&lt;P&gt;Yes. I just confirmed it in my lab.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FDM Decrement TTL" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/62188iE471EE2ACE069DA3/image-size/large?v=v2&amp;amp;px=999" role="button" title="FDM Decrement TTL.PNG" alt="FDM Decrement TTL" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;FDM Decrement TTL&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 03:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/3989274#M991342</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-11-26T03:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887221#M1102738</link>
      <description>&lt;P&gt;I noticed you can set a ICMP policy for FTD via FMC under Platform settings. Anyways, I tried creating a policy to deny ICMP any in there for Outside interface but it did not work. Is just creating a flex config the best way to deny ICMP on let's say Outside interface?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 19:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887221#M1102738</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2023-07-18T19:20:23Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887238#M1102741</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt;&amp;nbsp;you'd only use flexconfig if configuring a control plane ACL. ICMP "to* to FTD is controlled separately via platform settings. Controlling traffic "through" the FTD is via the ACP rules.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 19:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887238#M1102741</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-07-18T19:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887683#M1102777</link>
      <description>&lt;P&gt;Great thanks again. Thats what I initially tried but it never applied given an error - had to just choose IPv4 networks as source.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 12:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887683#M1102777</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2023-07-19T12:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887972#M1102809</link>
      <description>&lt;P&gt;If I want to still be able to ping out the interface, you need to still do an allow because an implicit deny is applied to these platform policies correct? If I block code 0 (even tried 8), then add a permit any icmp after it, it does not disable ping replies but does allow pings out.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 18:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4887972#M1102809</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2023-07-19T18:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4888022#M1102815</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt;&amp;nbsp;If you configure any ICMP rule for an interface, an implicit deny ICMP rule is added to the end of the ICMP rule list, changing the default behavior. Thus, if you want to simply deny a few message types, you must include a permit any rule at the end of the ICMP rule list to allow the remaining message types.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/platform_settings_for_firepower_threat_defense.html?bookSearch=true#task_42BBA666CD604517ADA18B32CA162F62" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/platform_settings_for_firepower_threat_defense.html?bookSearch=true#task_42BBA666CD604517ADA18B32CA162F62&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 18:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4888022#M1102815</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-07-19T18:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4888040#M1102818</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nevermind looks like in running config the permit any is being processed first as opposed to how I see it in the FMC GUI&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 19:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/4888040#M1102818</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2023-07-19T19:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5121856#M1113183</link>
      <description>&lt;PRE&gt;icmp permit any time-exceeded &amp;lt;your outside interface name&amp;gt;
icmp permit any unreachable &amp;lt;your outside interface name&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;How did you enabled this in FDM can't find?&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 11:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5121856#M1113183</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2024-05-31T11:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5122148#M1113197</link>
      <description>&lt;P&gt;This can be done in FDM using a Flexconfig object and policy:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_0-1717170970780.png" style="width: 951px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219784i775487DEB6D4546B/image-dimensions/951x504?v=v2" width="951" height="504" role="button" title="MarvinRhoads_0-1717170970780.png" alt="MarvinRhoads_0-1717170970780.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 15:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5122148#M1113197</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-31T15:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5336877#M1123088</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sheralimamatkarimov_0-1759922525800.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/253303i1C3F45B1C66AE4AB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="sheralimamatkarimov_0-1759922525800.png" alt="sheralimamatkarimov_0-1759922525800.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sheralimamatkarimov_1-1759922534224.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/253304i97AD0CA6F80E732B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="sheralimamatkarimov_1-1759922534224.png" alt="sheralimamatkarimov_1-1759922534224.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;That error in FMC&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 11:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5336877#M1123088</guid>
      <dc:creator>sherali mamatkarimov</dc:creator>
      <dc:date>2025-10-08T11:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5336924#M1123095</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657874"&gt;@sherali mamatkarimov&lt;/a&gt;&amp;nbsp;FMC has included the feature to decrement TTL in the GUI natively since several releases ago. (My post mentioning using flexconfig for FMC was from 2019.) See Advanced Settings for your Access Control Policy and look under Threat Defense Service Policy. You add the ICMP rate limit and burst size settings in the platform policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 13:46:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd/m-p/5336924#M1123095</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-10-08T13:46:21Z</dc:date>
    </item>
  </channel>
</rss>

