<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ICMP thru Cisco Firepower - Inside to Outside devices in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5259835#M1119522</link>
    <description>&lt;P&gt;I want to be able to ping from switch 1&amp;nbsp; thru the inside interface to switch 2&amp;nbsp; connected to the outside interface and vice versa.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DSterling_0-1739385840123.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/239770i6F3BBD68CE8E7A8D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="DSterling_0-1739385840123.png" alt="DSterling_0-1739385840123.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is a very basic initial setup to check connectivity thru the FW (Firepower 2130).&amp;nbsp; The switches ( Cisco 3750s) &amp;nbsp;are &amp;nbsp;configured with just an IP on the g0/1 interface on SW1 and SW2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping from the inside FW interface ( 192.168.28.8) to SW1 (192.168.28.2) and from SW1 to the Inside interface.&lt;/P&gt;&lt;P&gt;I can ping from &amp;nbsp;the outside FW interface &amp;nbsp;(192.168.38.8) to SW2 (192.168.38.8) and from SW2 to the outside interface.&lt;/P&gt;&lt;P&gt;I can't ping thru the FW from the inside to SW2 or from the outside to SW1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI: I have static routing setup on the switches see below&lt;/P&gt;&lt;P&gt;SW1: config)# &amp;nbsp;ip route 192.168.38.0 255.255.255.0 192.168.28.8&lt;/P&gt;&lt;P&gt;SW2: config)# &amp;nbsp;ip route 192.168.28.0 255.255.255.0 192.168.38.8&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No NAT, it's a very basic setup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that I should be able to create a policy rule like this (see below) that would allow everything: I applied the below service policy rule:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source&amp;nbsp; &amp;nbsp; Networks&amp;nbsp; &amp;nbsp; &amp;nbsp;Ports&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Networks&amp;nbsp; &amp;nbsp; &amp;nbsp; Ports/Protocols&lt;BR /&gt;inside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;outside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;any&lt;BR /&gt;outside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; inside&lt;/P&gt;&lt;P&gt;No other policy rules are set up.&lt;/P&gt;&lt;P&gt;I still can't ping thru the FW.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to be able to icmp/ping from SW1 (192.168.28.2) to SW2 (192.168.38.3) and SW2 to SW1?&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like such a simple thing to do, but I haven't been able to get it to work. Does anyone have any ideas?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2025 19:13:13 GMT</pubDate>
    <dc:creator>DSterling</dc:creator>
    <dc:date>2025-02-12T19:13:13Z</dc:date>
    <item>
      <title>ICMP thru Cisco Firepower - Inside to Outside devices</title>
      <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5259835#M1119522</link>
      <description>&lt;P&gt;I want to be able to ping from switch 1&amp;nbsp; thru the inside interface to switch 2&amp;nbsp; connected to the outside interface and vice versa.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DSterling_0-1739385840123.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/239770i6F3BBD68CE8E7A8D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="DSterling_0-1739385840123.png" alt="DSterling_0-1739385840123.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is a very basic initial setup to check connectivity thru the FW (Firepower 2130).&amp;nbsp; The switches ( Cisco 3750s) &amp;nbsp;are &amp;nbsp;configured with just an IP on the g0/1 interface on SW1 and SW2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping from the inside FW interface ( 192.168.28.8) to SW1 (192.168.28.2) and from SW1 to the Inside interface.&lt;/P&gt;&lt;P&gt;I can ping from &amp;nbsp;the outside FW interface &amp;nbsp;(192.168.38.8) to SW2 (192.168.38.8) and from SW2 to the outside interface.&lt;/P&gt;&lt;P&gt;I can't ping thru the FW from the inside to SW2 or from the outside to SW1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI: I have static routing setup on the switches see below&lt;/P&gt;&lt;P&gt;SW1: config)# &amp;nbsp;ip route 192.168.38.0 255.255.255.0 192.168.28.8&lt;/P&gt;&lt;P&gt;SW2: config)# &amp;nbsp;ip route 192.168.28.0 255.255.255.0 192.168.38.8&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No NAT, it's a very basic setup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that I should be able to create a policy rule like this (see below) that would allow everything: I applied the below service policy rule:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source&amp;nbsp; &amp;nbsp; Networks&amp;nbsp; &amp;nbsp; &amp;nbsp;Ports&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Networks&amp;nbsp; &amp;nbsp; &amp;nbsp; Ports/Protocols&lt;BR /&gt;inside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;outside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;any&lt;BR /&gt;outside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; inside&lt;/P&gt;&lt;P&gt;No other policy rules are set up.&lt;/P&gt;&lt;P&gt;I still can't ping thru the FW.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to be able to icmp/ping from SW1 (192.168.28.2) to SW2 (192.168.38.3) and SW2 to SW1?&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like such a simple thing to do, but I haven't been able to get it to work. Does anyone have any ideas?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 19:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5259835#M1119522</guid>
      <dc:creator>DSterling</dc:creator>
      <dc:date>2025-02-12T19:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP thru Cisco Firepower - Inside to Outside devices</title>
      <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5259837#M1119523</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1459997"&gt;@DSterling&lt;/a&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1459997"&gt;@DSterling&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;SW1: config)# &amp;nbsp;ip route 192.168.38.0 255.255.255.0 192.168.28.8&lt;/P&gt;
&lt;P&gt;SW2: config)# &amp;nbsp;ip route 192.168.38.0 255.255.255.0 192.168.38.8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The static route on SW2 is incorrect, it should be 192.168.&lt;STRONG&gt;28&lt;/STRONG&gt;.0 not 38?&lt;/P&gt;
&lt;PRE&gt;SW2: config)# ip route 192.168.&lt;U&gt;&lt;STRONG&gt;2&lt;/STRONG&gt;&lt;/U&gt;8.0 255.255.255.0 192.168.38.8&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 18:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5259837#M1119523</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-12T18:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP thru Cisco Firepower - Inside to Outside devices</title>
      <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5259842#M1119524</link>
      <description>&lt;P&gt;Rob,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I made a mistake in the question, it is&amp;nbsp;&lt;SPAN&gt;ip route 192.168.28.0 255.255.255.0 192.168.38.8. Thank you for the correction I'll edit the question.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;v/r&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 20:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5259842#M1119524</guid>
      <dc:creator>DSterling</dc:creator>
      <dc:date>2025-02-12T20:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP thru Cisco Firepower - Inside to Outside devices</title>
      <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260122#M1119540</link>
      <description>&lt;P&gt;Please initiate ping from one side to another and do packet capture on both firewall interfaces and paste the capture for review.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 10:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260122#M1119540</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-02-13T10:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP thru Cisco Firepower - Inside to Outside devices</title>
      <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260127#M1119541</link>
      <description>&lt;P&gt;It not FTD issue'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It issue of SW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Config each SW with ""default gateway"" point to interface of ftd.&lt;/P&gt;
&lt;P&gt;That it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 10:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260127#M1119541</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-02-13T10:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP thru Cisco Firepower - Inside to Outside devices</title>
      <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260179#M1119544</link>
      <description>&lt;P&gt;Ok, I deleted the policy rule and created another one with allow an IP any any all the way across and now I can ping from switch to switch.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 13:41:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260179#M1119544</guid>
      <dc:creator>DSterling</dc:creator>
      <dc:date>2025-02-13T13:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP thru Cisco Firepower - Inside to Outside devices</title>
      <link>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260195#M1119547</link>
      <description>&lt;P&gt;Glad to know that all is working as expected now. Out of interest, did you just create the rule in the same exact way? or was the one you removed different from the one you recreated?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 14:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-thru-cisco-firepower-inside-to-outside-devices/m-p/5260195#M1119547</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-02-13T14:25:56Z</dc:date>
    </item>
  </channel>
</rss>

