<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTDv in AWS: no connectivity in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftdv-in-aws-no-connectivity/m-p/3047090#M43170</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I am hoping for some guidance on the FTDv on AWS image.&lt;/P&gt;
&lt;P&gt;I have managed to image the FMCv and FTDv and connect the sensor to the management center. I've added an Access Control rule-set which is very basic, allow any traffic from the inside network to my outside network and NAT it against the outside interface.&lt;/P&gt;
&lt;P&gt;However, when I redirect one of the Windows servers to use the FTDv as the default gateway, I can't make any connection through it, meaning that under Analysis &amp;gt; Connections &amp;gt; Events, I cannot see any connectivity event.&lt;/P&gt;
&lt;P&gt;When I do a&amp;nbsp;system support diagnostic-cli on the FTDv CLI, I can see the ARP entry of the Windows machine.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;firepower# show arp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt; Outside 10.222.100.1 0a8f.e05b.3de3 50&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt; Inside 10.222.10.1 0abd.ee7d.4f89 50&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt; Inside 10.222.10.101 0af2.4c59.af6f 2079&amp;nbsp; &amp;gt;&amp;gt;&amp;gt; Windows machine&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;firepower# sh route&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; E1 - OSPF external type 1, E2 - OSPF external type 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; o - ODR, P - periodic downloaded static route, + - replicated route&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Gateway of last resort is 10.222.100.1 to network 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 10.222.100.1, Outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;C 10.222.10.0 255.255.255.0 is directly connected, Inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;L 10.222.10.250 255.255.255.255 is directly connected, Inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;C 10.222.100.0 255.255.255.0 is directly connected, Outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;L 10.222.100.250 255.255.255.255 is directly connected, Outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;On the CLI, I can see that the connectivity is shown:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;UDP Inside: 10.222.10.101/49409 Outside: 8.8.8.8/53,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; flags h N, idle 1m50s, uptime 1m57s, timeout 2m0s, bytes 102, xlate id 0x7fbd8ad787c0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Judging from the flags, the connection is inspected by Snort, yet, the FMCv shows no connectivity events and my VM cannot connect.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;firepower# sh int ip brief&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Interface IP-Address OK? Method Status Protocol&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;GigabitEthernet0/0 10.222.100.184 YES manual up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;GigabitEthernet0/1 10.222.10.250 YES CONFIG up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Internal-Control0/0 127.0.1.1 YES unset up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Internal-Data0/0 unassigned YES unset up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Internal-Data0/0 unassigned YES unset up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Management0/0 unassigned YES DHCP up up&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Also, packet tracer is evaluating the traffic as allowed:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Result:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;output-interface: Outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;output-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Last but not least, I did the needful and have an allow-all security group on every NIC that is assigned to FTDv, and the source/dest IP checks have been disabled.&lt;/P&gt;
&lt;P&gt;Any help from those who use FTD on AWS is very much appreciated.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:46:04 GMT</pubDate>
    <dc:creator>Laszlo Stomp</dc:creator>
    <dc:date>2019-03-10T13:46:04Z</dc:date>
    <item>
      <title>FTDv in AWS: no connectivity</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-aws-no-connectivity/m-p/3047090#M43170</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I am hoping for some guidance on the FTDv on AWS image.&lt;/P&gt;
&lt;P&gt;I have managed to image the FMCv and FTDv and connect the sensor to the management center. I've added an Access Control rule-set which is very basic, allow any traffic from the inside network to my outside network and NAT it against the outside interface.&lt;/P&gt;
&lt;P&gt;However, when I redirect one of the Windows servers to use the FTDv as the default gateway, I can't make any connection through it, meaning that under Analysis &amp;gt; Connections &amp;gt; Events, I cannot see any connectivity event.&lt;/P&gt;
&lt;P&gt;When I do a&amp;nbsp;system support diagnostic-cli on the FTDv CLI, I can see the ARP entry of the Windows machine.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;firepower# show arp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt; Outside 10.222.100.1 0a8f.e05b.3de3 50&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt; Inside 10.222.10.1 0abd.ee7d.4f89 50&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt; Inside 10.222.10.101 0af2.4c59.af6f 2079&amp;nbsp; &amp;gt;&amp;gt;&amp;gt; Windows machine&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;firepower# sh route&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; E1 - OSPF external type 1, E2 - OSPF external type 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; o - ODR, P - periodic downloaded static route, + - replicated route&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Gateway of last resort is 10.222.100.1 to network 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 10.222.100.1, Outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;C 10.222.10.0 255.255.255.0 is directly connected, Inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;L 10.222.10.250 255.255.255.255 is directly connected, Inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;C 10.222.100.0 255.255.255.0 is directly connected, Outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;L 10.222.100.250 255.255.255.255 is directly connected, Outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;On the CLI, I can see that the connectivity is shown:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;UDP Inside: 10.222.10.101/49409 Outside: 8.8.8.8/53,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; flags h N, idle 1m50s, uptime 1m57s, timeout 2m0s, bytes 102, xlate id 0x7fbd8ad787c0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Judging from the flags, the connection is inspected by Snort, yet, the FMCv shows no connectivity events and my VM cannot connect.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;firepower# sh int ip brief&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Interface IP-Address OK? Method Status Protocol&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;GigabitEthernet0/0 10.222.100.184 YES manual up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;GigabitEthernet0/1 10.222.10.250 YES CONFIG up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Internal-Control0/0 127.0.1.1 YES unset up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Internal-Data0/0 unassigned YES unset up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Internal-Data0/0 unassigned YES unset up up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Management0/0 unassigned YES DHCP up up&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Also, packet tracer is evaluating the traffic as allowed:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Result:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;output-interface: Outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;output-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Last but not least, I did the needful and have an allow-all security group on every NIC that is assigned to FTDv, and the source/dest IP checks have been disabled.&lt;/P&gt;
&lt;P&gt;Any help from those who use FTD on AWS is very much appreciated.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-aws-no-connectivity/m-p/3047090#M43170</guid>
      <dc:creator>Laszlo Stomp</dc:creator>
      <dc:date>2019-03-10T13:46:04Z</dc:date>
    </item>
    <item>
      <title>Please see the below url for</title>
      <link>https://community.cisco.com/t5/network-security/ftdv-in-aws-no-connectivity/m-p/3047091#M43171</link>
      <description>&lt;P&gt;Please see the below url for quick guide which might be helpful.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/aws/ftdv-aws-qsg.html&lt;/P&gt;
&lt;P&gt;Hope to help.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 13:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftdv-in-aws-no-connectivity/m-p/3047091#M43171</guid>
      <dc:creator>syeda3</dc:creator>
      <dc:date>2017-02-09T13:48:09Z</dc:date>
    </item>
  </channel>
</rss>

