<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306951#M1121686</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1895170"&gt;@Otvforte&lt;/a&gt;&amp;nbsp;the Access Control policy controls traffic routed "through" the FTD, not "to" the FTD itself.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Jul 2025 13:53:09 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-07-08T13:53:09Z</dc:date>
    <item>
      <title>FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306947#M1121684</link>
      <description>&lt;P&gt;I'm learning the basics of FTD (FP1010) and doing some tests. Using FDM, I&amp;nbsp;create an ACE Rule to block ICMP (any type, any network). It’s the first rule on top of other policies, setup as Block and log. I can see the rule being triggered if I try to ping an external destination like 8.8.8.8, but not if I ping the LAN address of FTD. The same way, this rule is ineffective to block pings from Outside to the WAN address of FTD.&lt;/P&gt;&lt;P&gt;I’ve read some Cisco documents, but I couldn't fully understand this behavior yet. Could explain ?&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 13:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306947#M1121684</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-07-08T13:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306950#M1121685</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1895170"&gt;@Otvforte&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;This behavior is expected with Cisco FTD ACE rules. The ACE policies apply only to traffic passing through the FTD, not to traffic destined to or originating from the FTD device interfaces themselves.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;When you ping an external IP (like 8.8.8.8), the traffic passes through the FTD, so the ACE rule blocks it as configured.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;However, pings directed to the FTD’s own LAN or WAN interface IP addresses are handled internally by the device’s management plane and are not subject to ACE policies.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;To control ICMP to the FTD interfaces, you need to configure ICMP filtering or management access controls within the FTD’s device management settings or platform configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 13:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306950#M1121685</guid>
      <dc:creator>wajidhassan</dc:creator>
      <dc:date>2025-07-08T13:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306951#M1121686</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1895170"&gt;@Otvforte&lt;/a&gt;&amp;nbsp;the Access Control policy controls traffic routed "through" the FTD, not "to" the FTD itself.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 13:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306951#M1121686</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-08T13:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306959#M1121687</link>
      <description>&lt;P&gt;To the box&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use ACL control plane&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221457-configure-control-plane-access-control-p.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221457-configure-control-plane-access-control-p.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Through the Box&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use ACL (what you config)&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 14:11:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306959#M1121687</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-08T14:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306976#M1121688</link>
      <description>&lt;P&gt;FYI, control plane ACL does &lt;U&gt;not&lt;/U&gt; filter ICMP traffic to the FTD/ASA's interface.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 14:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5306976#M1121688</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-08T14:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307007#M1121690</link>
      <description>&lt;P&gt;Understood, thanks for all answers. By this default behavior, I understand that blocking ICMP on Wan public interface is not a concern, right ?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 16:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307007#M1121690</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-07-08T16:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307011#M1121692</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1895170"&gt;@Otvforte&lt;/a&gt;&amp;nbsp;I don't think you can restrict ICMP to the FTD itself when using FDM, you can if using FMC for management under the Platform Settings. You may be able to apply the ASA equivalent commands "icmp deny x.x.x.x" using Flexconfig on FDM, I've never tried though and the command may be blocklisted.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it is a concern, apply an ACL in the router in front of the FTD and deny icmp to the FTD's WAN interface IP address and permit the rest of the traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 16:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307011#M1121692</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-08T16:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307017#M1121693</link>
      <description>&lt;P&gt;Use control plane&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If not work inform me I will share other solution&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 16:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307017#M1121693</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-08T16:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307022#M1121694</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Use control plane&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If not work inform me I will share other solution&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1751994048115.png" style="width: 680px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/247875i9F6513532305C7BF/image-dimensions/680x141?v=v2" width="680" height="141" role="button" title="RobIngram_0-1751994048115.png" alt="RobIngram_0-1751994048115.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 17:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307022#M1121694</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-08T17:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307029#M1121695</link>
      <description>&lt;P&gt;concern or not&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (274).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/247876i451A119E845C3BAA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (274).png" alt="Screenshot (274).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardening/threat_defense/Threat_Defense_Hardening_Guide_v76.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardening/threat_defense/Threat_Defense_Hardening_Guide_v76.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;there is huge different between FMC and FDM&amp;nbsp;&lt;BR /&gt;some feature need FMC&amp;nbsp;&lt;BR /&gt;check this guide how you harden the FTD&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 17:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307029#M1121695</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-08T17:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Rules</title>
      <link>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307055#M1121697</link>
      <description>&lt;P&gt;Thank you, I'll try learning / using&amp;nbsp;&lt;SPAN&gt;ACL control plane.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 18:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-rules/m-p/5307055#M1121697</guid>
      <dc:creator>Otvforte</dc:creator>
      <dc:date>2025-07-08T18:39:20Z</dc:date>
    </item>
  </channel>
</rss>

