<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/3901625#M921657</link>
    <description>&lt;P&gt;hi all&lt;BR /&gt;we have dual homed internet in our Internet Edge firewall (firepower FTD FDM 6.2.3).&lt;BR /&gt;both of them running NAT publishing for different application, for example : application A (segment 0) and application B (segment 9), application A using nat via Provider A (ip public segment A), and application B using nat via provider B (ip public segment B).&lt;/P&gt;&lt;P&gt;We know the solution is using PBR, we try to input PBR config via flexconfig (the only one way to deploy the configuration).&lt;/P&gt;&lt;P&gt;here it is our config editor :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list AppA permit ip 192.168.0.0 0.0.0.255 any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list AppB permit ip 192.168.9.0 0.0.0.255 any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route-map PBR permit 10&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match ip address AppA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;set ip next-hop a.a.a.a&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route-map PBR permit 20 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match ip address AppB&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;set ip next-hop b.b.b.b&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route-map PBR permit 30&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet1/1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-route route-map PBR&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and we're using flexconfig object to make that config deployed. the config deployed with error.&amp;nbsp;&lt;/P&gt;&lt;P&gt;but the thing is, access-list object&amp;nbsp; doesnt appear on running configuration (although other object and command is appear) in Firepower. We check it via Console. So the traffic of all segment including dmz, outside, inside (segment A and segment B) etc can not be ping and access by each other. actually before connecting IP public B and do PBR, ip public A running well on Firepower machine. Since we deploy a new connection for ip public segment B (migration phase) and input those command, everything goes wrong.&lt;/P&gt;&lt;P&gt;is there any solution for my case? since we know that ACL object is not entered, but other object including interface pbr configuration seems like enforced to enter to my FP&lt;/P&gt;&lt;P&gt;is there a Firepower FDM limitation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please help me&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:21:48 GMT</pubDate>
    <dc:creator>Yuslivan</dc:creator>
    <dc:date>2020-02-21T17:21:48Z</dc:date>
    <item>
      <title>Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR</title>
      <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/3901625#M921657</link>
      <description>&lt;P&gt;hi all&lt;BR /&gt;we have dual homed internet in our Internet Edge firewall (firepower FTD FDM 6.2.3).&lt;BR /&gt;both of them running NAT publishing for different application, for example : application A (segment 0) and application B (segment 9), application A using nat via Provider A (ip public segment A), and application B using nat via provider B (ip public segment B).&lt;/P&gt;&lt;P&gt;We know the solution is using PBR, we try to input PBR config via flexconfig (the only one way to deploy the configuration).&lt;/P&gt;&lt;P&gt;here it is our config editor :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list AppA permit ip 192.168.0.0 0.0.0.255 any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list AppB permit ip 192.168.9.0 0.0.0.255 any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route-map PBR permit 10&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match ip address AppA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;set ip next-hop a.a.a.a&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route-map PBR permit 20 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match ip address AppB&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;set ip next-hop b.b.b.b&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route-map PBR permit 30&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet1/1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-route route-map PBR&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and we're using flexconfig object to make that config deployed. the config deployed with error.&amp;nbsp;&lt;/P&gt;&lt;P&gt;but the thing is, access-list object&amp;nbsp; doesnt appear on running configuration (although other object and command is appear) in Firepower. We check it via Console. So the traffic of all segment including dmz, outside, inside (segment A and segment B) etc can not be ping and access by each other. actually before connecting IP public B and do PBR, ip public A running well on Firepower machine. Since we deploy a new connection for ip public segment B (migration phase) and input those command, everything goes wrong.&lt;/P&gt;&lt;P&gt;is there any solution for my case? since we know that ACL object is not entered, but other object including interface pbr configuration seems like enforced to enter to my FP&lt;/P&gt;&lt;P&gt;is there a Firepower FDM limitation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please help me&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/3901625#M921657</guid>
      <dc:creator>Yuslivan</dc:creator>
      <dc:date>2020-02-21T17:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR</title>
      <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/3901658#M921658</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;
&lt;P&gt;It's not possible to configure PBR on FTD using FDM, the only option is if you are configuring using the FMC. Reference &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb19682/?rfs=iqvred" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 18:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/3901658#M921658</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-01T18:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR</title>
      <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898238#M1103221</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this still true?&amp;nbsp; I'm guessing it might be because I don't see "set IP" option in FlexConfig and I'm on&amp;nbsp; v7.3.&amp;nbsp; What about CDO?&amp;nbsp; I really don't want to have to setup an FMC just for PBR.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 13:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898238#M1103221</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2023-08-03T13:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR</title>
      <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898245#M1103222</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317180"&gt;@tato386&lt;/a&gt; unfortunately no, apparently not &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb19682" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb19682&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 13:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898245#M1103222</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-08-03T13:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR</title>
      <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898293#M1103225</link>
      <description>&lt;P&gt;I believe there is a CDO delivered FMC but I really don't want to deal with that for this box.&amp;nbsp; I believe you can configure FTD directly from CDO without FMC.&amp;nbsp; Does that count as FDM? Is there a chance CDO can do the required FlexConfig without FMC?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 15:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898293#M1103225</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2023-08-03T15:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR</title>
      <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898312#M1103227</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317180"&gt;@tato386&lt;/a&gt; native CDO (no cdFMC) basically relies on FDM, which unfortunately not going not going to help.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 15:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898312#M1103227</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-08-03T15:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dual Homed Firepowe FTD FDM 6.2.3 Running NAT using PBR</title>
      <link>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898388#M1103233</link>
      <description>&lt;P&gt;got it.&amp;nbsp; thank you sir!&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 18:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-homed-firepowe-ftd-fdm-6-2-3-running-nat-using-pbr/m-p/4898388#M1103233</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2023-08-03T18:57:34Z</dc:date>
    </item>
  </channel>
</rss>

