<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD ICMP question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127060#M1113406</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1726559"&gt;@N3om&lt;/a&gt;&amp;nbsp;run packet tracer to simulate the traffic flow, this might reveal where the issue is, NAT rule or ACL.&lt;/P&gt;
&lt;P&gt;Or use the command "system support firewall-engine-debug" from the CLI of the FTD to capture real traffic (apply a filter to match specific traffic), this will confirm which rule traffic matches.&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jun 2024 11:32:16 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-06-07T11:32:16Z</dc:date>
    <item>
      <title>FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5126759#M1113389</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;To allow icmp to traverse a site to site VPN between 3rd party and us is it just the same as allowing TCP/UDP&amp;nbsp;&lt;/P&gt;&lt;P&gt;or do I have to do something different? I have created a static uni-directional identity nat rule also the traffic is to be initiated from 3rd party to us on ICMP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 19:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5126759#M1113389</guid>
      <dc:creator>N3om</dc:creator>
      <dc:date>2024-06-06T19:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5126790#M1113390</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1726559"&gt;@N3om&lt;/a&gt; In addition to the NAT exemption rule. The VPN topology needs to allow the traffic between the local/remote networks to establish the VPN tunnel and you need to configure the Access Control rules to explictly permit the ICMP traffic (and anything else). &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 20:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5126790#M1113390</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-06T20:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5126834#M1113396</link>
      <description>&lt;P&gt;Given that the VPN is setup correctly (i.e. Site to site is up, interesting traffic and NAT are defined correctly), then you only need to allow the traffic in the access rules (that is if you are NOT bypassing the outside interface ACL for VPN traffic).&lt;/P&gt;
&lt;P&gt;Other consideration if it is still not working is that the remote side also needs to allow for ICMP in the required direction (source --&amp;gt; destination).&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 01:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5126834#M1113396</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-06-07T01:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127059#M1113405</link>
      <description>&lt;P&gt;The VPN looks ok I see the correct SA's funny thing is I see the NAT rule counters incrementing and i see pkts encap and decap, but dont see anything in the logs for the source IP from the 3rd party, any ideas on this&lt;/P&gt;&lt;P&gt;Thanks guys&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 11:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127059#M1113405</guid>
      <dc:creator>N3om</dc:creator>
      <dc:date>2024-06-07T11:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127060#M1113406</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1726559"&gt;@N3om&lt;/a&gt;&amp;nbsp;run packet tracer to simulate the traffic flow, this might reveal where the issue is, NAT rule or ACL.&lt;/P&gt;
&lt;P&gt;Or use the command "system support firewall-engine-debug" from the CLI of the FTD to capture real traffic (apply a filter to match specific traffic), this will confirm which rule traffic matches.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 11:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127060#M1113406</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-07T11:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127153#M1113407</link>
      <description>&lt;P&gt;You use sysop vpn permit?&lt;/P&gt;
&lt;P&gt;If yes then you will not see log in evebt log&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to remove it and add ACL permit ip any any to make FTD detect the traffic and generate log&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 14:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127153#M1113407</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-07T14:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127271#M1113414</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sysopt is a global setting so cant change for one VPN&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 18:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127271#M1113414</guid>
      <dc:creator>N3om</dc:creator>
      <dc:date>2024-06-07T18:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127274#M1113415</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see nothing when I run&amp;nbsp;&lt;SPAN&gt;system support firewall-engine-debug, when I run packet tracer everything allowed, correct acl,nat etc, but it does say ipsec spoof detected which i have seen before on other vpns I dont think this is the issue do you ??&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 18:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127274#M1113415</guid>
      <dc:creator>N3om</dc:creator>
      <dc:date>2024-06-07T18:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127279#M1113416</link>
      <description>&lt;P&gt;In ASA it true but for ftd you can bypass or not the ACL for each s2s VPN&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/215470-site-to-site-vpn-configuration-on-ftd-ma.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/215470-site-to-site-vpn-configuration-on-ftd-ma.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Anyway' since sysop is run then the traffic bypass the ACL and no log you see.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 19:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127279#M1113416</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-07T19:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127388#M1113417</link>
      <description>&lt;P&gt;actually "&lt;SPAN class="qtr-margin-top"&gt;sysopt connection permit-vpn&lt;/SPAN&gt;" is global, not per S2SVPN, despite what the FMC says, there is an open enhancement for this. Regardless, bypassing the ACL is not really a recommended solution nowadays, it's much better to define rules to permit the traffic.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1726559"&gt;@N3om&lt;/a&gt; if nothing is displayed when using the command "support firewall-engine-debug" either no traffic was sent (you need to generate it) or the filter was incorrect. Please provide the output of packet-tracer.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2024 06:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127388#M1113417</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-08T06:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127966#M1113450</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sent the requested&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 11:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5127966#M1113450</guid>
      <dc:creator>N3om</dc:creator>
      <dc:date>2024-06-10T11:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5129512#M1113537</link>
      <description>&lt;P&gt;Sorry what was issue and what is solution of it?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2024 10:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5129512#M1113537</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-13T10:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5129515#M1113538</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Internal Routing issue which was a question asked by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;in DM after checking over IPSEC SA output.&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2024 10:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5129515#M1113538</guid>
      <dc:creator>N3om</dc:creator>
      <dc:date>2024-06-13T10:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD ICMP question</title>
      <link>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5129519#M1113541</link>
      <description>&lt;P&gt;And now you see it log after correct routing?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2024 10:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-icmp-question/m-p/5129519#M1113541</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-13T10:58:17Z</dc:date>
    </item>
  </channel>
</rss>

