<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower FPR 1100 - Series firewall and routing without a router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-fpr-1100-series-firewall-and-routing-without-a-router/m-p/4024361#M925163</link>
    <description>&lt;P&gt;We are working with a Firepower FPR 1100 series firewall in the main office and a remote location with a layer 2 switch.&amp;nbsp; On port 2 of the firewall, we have a server with IP address 192.168.1.3.&amp;nbsp; At port 9 on the firewall we are connected to a switch at a remote site with ip address 10.174.241.20 on vlan 51.&amp;nbsp; Connected to that switch we have a camera at 11.174.246.30 on vlan 351.&amp;nbsp; From the firewall we can ping the switch and the camera.&amp;nbsp; From the switch at the remote location we can ping the interface ip address on the router, but cannot ping the server.&amp;nbsp; Please help with the best way to setup a route from the server to the camera and back.&amp;nbsp; We need the traffic from the camera to the server to pass UDP traffic.&amp;nbsp; Please help as this firewall is new a bit of a learning curve.&amp;nbsp; Below is an image with the basic needs.&amp;nbsp; Also we've pasted the running config below the picture. Thank you for your input!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="helpneededroutingonfirewall.png" style="width: 651px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66626i3C21F66910B6F5F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="helpneededroutingonfirewall.png" alt="helpneededroutingonfirewall.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show running-config&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: xxxxxxxx&lt;BR /&gt;: Hardware: FPR-1120, 5281 MB RAM, CPU Atom C3000 series 2000 MHz, 1 CPU (12 cores)&lt;BR /&gt;:&lt;BR /&gt;NGFW Version 6.4.0&lt;BR /&gt;!&lt;BR /&gt;hostname PAIN&lt;BR /&gt;enable password ***** encrypted&lt;BR /&gt;strong-encryption-disable&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.2.5 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;nameif server&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.99 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/9&lt;BR /&gt;nameif 96w&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/9.51&lt;BR /&gt;vlan 51&lt;BR /&gt;nameif 96switch&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.174.241.99 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/9.351&lt;BR /&gt;vlan 351&lt;BR /&gt;nameif mm96cssgw&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 11.174.246.99 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/10&lt;BR /&gt;nameif inside133e&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/10.71&lt;BR /&gt;vlan 71&lt;BR /&gt;nameif switch&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.173.241.24 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/10.271&lt;BR /&gt;vlan 271&lt;BR /&gt;nameif cam&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.173.245.24 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/11&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/12&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif diagnostic&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;ngips conn-match vlan-id&lt;BR /&gt;dns domain-lookup any&lt;BR /&gt;dns server-group CiscoUmbrellaDNSServerGroup&lt;BR /&gt;name-server 208.67.222.222&lt;BR /&gt;name-server 208.67.220.220&lt;BR /&gt;dns-group CiscoUmbrellaDNSServerGroup&lt;BR /&gt;object network any-ipv4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network any-ipv6&lt;BR /&gt;subnet ::/0&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust ip any any rule-id 1 event-log both&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list eventlog level informational class auth&lt;BR /&gt;logging list eventlog level debugging class bridge&lt;BR /&gt;logging list eventlog level warnings class config&lt;BR /&gt;logging list eventlog level errors class ha&lt;BR /&gt;logging list eventlog level emergencies class ids&lt;BR /&gt;logging list eventlog level critical class csd&lt;BR /&gt;logging list eventlog level notifications class eigrp&lt;BR /&gt;logging list eventlog level alerts class dap&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;mtu diagnostic 1500&lt;BR /&gt;mtu inside96w 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside133e 1500&lt;BR /&gt;mtu civicsmartserver 1500&lt;BR /&gt;mtu mm59wbcamera 1500&lt;BR /&gt;mtu pdue96 1500&lt;BR /&gt;mtu mm96eswitch 1500&lt;BR /&gt;mtu pdue133 1500&lt;BR /&gt;mtu mm133eswitch 1500&lt;BR /&gt;mtu cam133e 1500&lt;BR /&gt;mtu cam96e 1500&lt;BR /&gt;mtu mm96cssgw 1500&lt;BR /&gt;mtu mm59wbpdu 1500&lt;BR /&gt;mtu mm59wbswitch 1500&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface mm59wbcamera&lt;BR /&gt;monitor-interface pdue96&lt;BR /&gt;monitor-interface mm96eswitch&lt;BR /&gt;monitor-interface pdue133&lt;BR /&gt;monitor-interface mm133eswitch&lt;BR /&gt;monitor-interface cam133e&lt;BR /&gt;monitor-interface cam96e&lt;BR /&gt;monitor-interface mm96cssgw&lt;BR /&gt;monitor-interface mm59wbpdu&lt;BR /&gt;monitor-interface mm59wbswitch&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;ip-client mm96cssgw ipv6&lt;BR /&gt;ip-client mm96cssgw&lt;BR /&gt;ip-client mm59wbswitch ipv6&lt;BR /&gt;ip-client mm59wbswitch&lt;BR /&gt;ip-client mm59wbpdu ipv6&lt;BR /&gt;ip-client mm59wbpdu&lt;BR /&gt;ip-client cam96e ipv6&lt;BR /&gt;ip-client cam96e&lt;BR /&gt;ip-client cam133e ipv6&lt;BR /&gt;ip-client cam133e&lt;BR /&gt;ip-client mm133eswitch ipv6&lt;BR /&gt;ip-client mm133eswitch&lt;BR /&gt;ip-client pdue133 ipv6&lt;BR /&gt;ip-client pdue133&lt;BR /&gt;ip-client mm96eswitch ipv6&lt;BR /&gt;ip-client mm96eswitch&lt;BR /&gt;ip-client pdue96 ipv6&lt;BR /&gt;ip-client pdue96&lt;BR /&gt;ip-client mm59wbcamera ipv6&lt;BR /&gt;ip-client mm59wbcamera&lt;BR /&gt;ip-client civicsmartserver ipv6&lt;BR /&gt;ip-client civicsmartserver&lt;BR /&gt;ip-client inside133e ipv6&lt;BR /&gt;ip-client inside133e&lt;BR /&gt;ip-client outside ipv6&lt;BR /&gt;ip-client outside&lt;BR /&gt;ip-client inside96w ipv6&lt;BR /&gt;ip-client inside96w&lt;BR /&gt;ip-client diagnostic ipv6&lt;BR /&gt;ip-client diagnostic&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 0&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 100&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 160&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect ssl dtls none&lt;BR /&gt;anyconnect ssl rekey time 4&lt;BR /&gt;anyconnect ssl rekey method new-tunnel&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;app-agent heartbeat interval 1000 retry-count 3&lt;BR /&gt;snort preserve-connection&lt;BR /&gt;Cryptochecksum:97fd5b77f30adbeaaaa6c98a70e415fd&lt;BR /&gt;: end&lt;BR /&gt;&amp;gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:53:50 GMT</pubDate>
    <dc:creator>tbonetony1</dc:creator>
    <dc:date>2020-02-21T17:53:50Z</dc:date>
    <item>
      <title>Firepower FPR 1100 - Series firewall and routing without a router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-fpr-1100-series-firewall-and-routing-without-a-router/m-p/4024361#M925163</link>
      <description>&lt;P&gt;We are working with a Firepower FPR 1100 series firewall in the main office and a remote location with a layer 2 switch.&amp;nbsp; On port 2 of the firewall, we have a server with IP address 192.168.1.3.&amp;nbsp; At port 9 on the firewall we are connected to a switch at a remote site with ip address 10.174.241.20 on vlan 51.&amp;nbsp; Connected to that switch we have a camera at 11.174.246.30 on vlan 351.&amp;nbsp; From the firewall we can ping the switch and the camera.&amp;nbsp; From the switch at the remote location we can ping the interface ip address on the router, but cannot ping the server.&amp;nbsp; Please help with the best way to setup a route from the server to the camera and back.&amp;nbsp; We need the traffic from the camera to the server to pass UDP traffic.&amp;nbsp; Please help as this firewall is new a bit of a learning curve.&amp;nbsp; Below is an image with the basic needs.&amp;nbsp; Also we've pasted the running config below the picture. Thank you for your input!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="helpneededroutingonfirewall.png" style="width: 651px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66626i3C21F66910B6F5F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="helpneededroutingonfirewall.png" alt="helpneededroutingonfirewall.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show running-config&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: xxxxxxxx&lt;BR /&gt;: Hardware: FPR-1120, 5281 MB RAM, CPU Atom C3000 series 2000 MHz, 1 CPU (12 cores)&lt;BR /&gt;:&lt;BR /&gt;NGFW Version 6.4.0&lt;BR /&gt;!&lt;BR /&gt;hostname PAIN&lt;BR /&gt;enable password ***** encrypted&lt;BR /&gt;strong-encryption-disable&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.2.5 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;nameif server&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.99 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/9&lt;BR /&gt;nameif 96w&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/9.51&lt;BR /&gt;vlan 51&lt;BR /&gt;nameif 96switch&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.174.241.99 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/9.351&lt;BR /&gt;vlan 351&lt;BR /&gt;nameif mm96cssgw&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 11.174.246.99 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/10&lt;BR /&gt;nameif inside133e&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/10.71&lt;BR /&gt;vlan 71&lt;BR /&gt;nameif switch&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.173.241.24 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/10.271&lt;BR /&gt;vlan 271&lt;BR /&gt;nameif cam&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.173.245.24 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/11&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/12&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif diagnostic&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;ngips conn-match vlan-id&lt;BR /&gt;dns domain-lookup any&lt;BR /&gt;dns server-group CiscoUmbrellaDNSServerGroup&lt;BR /&gt;name-server 208.67.222.222&lt;BR /&gt;name-server 208.67.220.220&lt;BR /&gt;dns-group CiscoUmbrellaDNSServerGroup&lt;BR /&gt;object network any-ipv4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network any-ipv6&lt;BR /&gt;subnet ::/0&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust ip any any rule-id 1 event-log both&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list eventlog level informational class auth&lt;BR /&gt;logging list eventlog level debugging class bridge&lt;BR /&gt;logging list eventlog level warnings class config&lt;BR /&gt;logging list eventlog level errors class ha&lt;BR /&gt;logging list eventlog level emergencies class ids&lt;BR /&gt;logging list eventlog level critical class csd&lt;BR /&gt;logging list eventlog level notifications class eigrp&lt;BR /&gt;logging list eventlog level alerts class dap&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;mtu diagnostic 1500&lt;BR /&gt;mtu inside96w 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside133e 1500&lt;BR /&gt;mtu civicsmartserver 1500&lt;BR /&gt;mtu mm59wbcamera 1500&lt;BR /&gt;mtu pdue96 1500&lt;BR /&gt;mtu mm96eswitch 1500&lt;BR /&gt;mtu pdue133 1500&lt;BR /&gt;mtu mm133eswitch 1500&lt;BR /&gt;mtu cam133e 1500&lt;BR /&gt;mtu cam96e 1500&lt;BR /&gt;mtu mm96cssgw 1500&lt;BR /&gt;mtu mm59wbpdu 1500&lt;BR /&gt;mtu mm59wbswitch 1500&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface mm59wbcamera&lt;BR /&gt;monitor-interface pdue96&lt;BR /&gt;monitor-interface mm96eswitch&lt;BR /&gt;monitor-interface pdue133&lt;BR /&gt;monitor-interface mm133eswitch&lt;BR /&gt;monitor-interface cam133e&lt;BR /&gt;monitor-interface cam96e&lt;BR /&gt;monitor-interface mm96cssgw&lt;BR /&gt;monitor-interface mm59wbpdu&lt;BR /&gt;monitor-interface mm59wbswitch&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;ip-client mm96cssgw ipv6&lt;BR /&gt;ip-client mm96cssgw&lt;BR /&gt;ip-client mm59wbswitch ipv6&lt;BR /&gt;ip-client mm59wbswitch&lt;BR /&gt;ip-client mm59wbpdu ipv6&lt;BR /&gt;ip-client mm59wbpdu&lt;BR /&gt;ip-client cam96e ipv6&lt;BR /&gt;ip-client cam96e&lt;BR /&gt;ip-client cam133e ipv6&lt;BR /&gt;ip-client cam133e&lt;BR /&gt;ip-client mm133eswitch ipv6&lt;BR /&gt;ip-client mm133eswitch&lt;BR /&gt;ip-client pdue133 ipv6&lt;BR /&gt;ip-client pdue133&lt;BR /&gt;ip-client mm96eswitch ipv6&lt;BR /&gt;ip-client mm96eswitch&lt;BR /&gt;ip-client pdue96 ipv6&lt;BR /&gt;ip-client pdue96&lt;BR /&gt;ip-client mm59wbcamera ipv6&lt;BR /&gt;ip-client mm59wbcamera&lt;BR /&gt;ip-client civicsmartserver ipv6&lt;BR /&gt;ip-client civicsmartserver&lt;BR /&gt;ip-client inside133e ipv6&lt;BR /&gt;ip-client inside133e&lt;BR /&gt;ip-client outside ipv6&lt;BR /&gt;ip-client outside&lt;BR /&gt;ip-client inside96w ipv6&lt;BR /&gt;ip-client inside96w&lt;BR /&gt;ip-client diagnostic ipv6&lt;BR /&gt;ip-client diagnostic&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 0&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 100&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 160&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect ssl dtls none&lt;BR /&gt;anyconnect ssl rekey time 4&lt;BR /&gt;anyconnect ssl rekey method new-tunnel&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;app-agent heartbeat interval 1000 retry-count 3&lt;BR /&gt;snort preserve-connection&lt;BR /&gt;Cryptochecksum:97fd5b77f30adbeaaaa6c98a70e415fd&lt;BR /&gt;: end&lt;BR /&gt;&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-fpr-1100-series-firewall-and-routing-without-a-router/m-p/4024361#M925163</guid>
      <dc:creator>tbonetony1</dc:creator>
      <dc:date>2020-02-21T17:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FPR 1100 - Series firewall and routing without a router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-fpr-1100-series-firewall-and-routing-without-a-router/m-p/4024647#M925172</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;What do you mean but the switch can ping the ip address of the router? Are you pinging the firewall ip sitting on the same vlan of the server (192.168.1.99)?&lt;BR /&gt;&lt;BR /&gt;what is the default gateway of your server?&lt;BR /&gt;I see an acl doing trust any any which means it shouldn't block any traffic.&lt;BR /&gt;Based on the config, i believe you're using fdm gui, am I right?&lt;BR /&gt;Have you checked on the connection monitoring page if you see the traffic and if it's allowed?</description>
      <pubDate>Thu, 06 Feb 2020 04:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-fpr-1100-series-firewall-and-routing-without-a-router/m-p/4024647#M925172</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-02-06T04:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FPR 1100 - Series firewall and routing without a router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-fpr-1100-series-firewall-and-routing-without-a-router/m-p/4031861#M925178</link>
      <description>&lt;P&gt;I really need to delete this entire question and start over.&amp;nbsp; Thank you for your input as it was spot on with the gateway question.&amp;nbsp; We've done a lot of configuration since this last post and will need to update it completely (will start a new thread.)&amp;nbsp; Thanks again!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 22:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-fpr-1100-series-firewall-and-routing-without-a-router/m-p/4031861#M925178</guid>
      <dc:creator>tbonetony1</dc:creator>
      <dc:date>2020-02-18T22:38:59Z</dc:date>
    </item>
  </channel>
</rss>

