<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FMC access list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-access-list/m-p/3228114#M926332</link>
    <description>&lt;P&gt;hi &lt;BR /&gt;&lt;BR /&gt;I'running Cisco FMC on VMware, what I did was in the GUI in the The Access List,&lt;BR /&gt;removed any, replaced with my LAN ip subnet as source for:&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443 (HTTPS)—Used for web interface access.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 (SSH)—Used for command line access. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;"By default, access is not restricted. To operate in a more secure environment, consider adding access for specific IP addresses and then deleting the default any option. "&lt;BR /&gt;&lt;BR /&gt;I did that!&lt;BR /&gt;&lt;BR /&gt;Now I can't get access via my LAN to tcp:443 og tcp:22, I only have console access in VMware, I can login to Cisco Fire Linux prompt, admin@firepower:$&lt;BR /&gt;&lt;BR /&gt;But how do I insert an any rule to get my ssh/https access back again ?&lt;/P&gt;
&lt;P&gt;How do I get out of Linux mode $ to configure access rule ?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 14:55:01 GMT</pubDate>
    <dc:creator>dkcowboy</dc:creator>
    <dc:date>2020-02-21T14:55:01Z</dc:date>
    <item>
      <title>FMC access list</title>
      <link>https://community.cisco.com/t5/network-security/fmc-access-list/m-p/3228114#M926332</link>
      <description>&lt;P&gt;hi &lt;BR /&gt;&lt;BR /&gt;I'running Cisco FMC on VMware, what I did was in the GUI in the The Access List,&lt;BR /&gt;removed any, replaced with my LAN ip subnet as source for:&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443 (HTTPS)—Used for web interface access.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 (SSH)—Used for command line access. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;"By default, access is not restricted. To operate in a more secure environment, consider adding access for specific IP addresses and then deleting the default any option. "&lt;BR /&gt;&lt;BR /&gt;I did that!&lt;BR /&gt;&lt;BR /&gt;Now I can't get access via my LAN to tcp:443 og tcp:22, I only have console access in VMware, I can login to Cisco Fire Linux prompt, admin@firepower:$&lt;BR /&gt;&lt;BR /&gt;But how do I insert an any rule to get my ssh/https access back again ?&lt;/P&gt;
&lt;P&gt;How do I get out of Linux mode $ to configure access rule ?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:55:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-access-list/m-p/3228114#M926332</guid>
      <dc:creator>dkcowboy</dc:creator>
      <dc:date>2020-02-21T14:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: FMC access list</title>
      <link>https://community.cisco.com/t5/network-security/fmc-access-list/m-p/3790161#M926333</link>
      <description>&lt;P&gt;iptables will need to be corrected from the cli access.&lt;/P&gt;
&lt;P&gt;Please contact TAC to fix the issue and do not attempt to make any change to iptables.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 09:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-access-list/m-p/3790161#M926333</guid>
      <dc:creator>pagrawa2</dc:creator>
      <dc:date>2019-01-29T09:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: FMC access list</title>
      <link>https://community.cisco.com/t5/network-security/fmc-access-list/m-p/3822347#M926334</link>
      <description>&lt;P&gt;I know it's a bit late but recently I've had a similar problem. This was my fix:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1) Initially I deleted all the contents in "/etc/sysconfig/iptables" and reloaded the FMC just for testing purposes. Outputs below but yours would have included some info.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;admin@FMC-1:~$ sudo iptables-save&lt;BR /&gt;Password:&lt;BR /&gt;# Generated by iptables-save v1.4.20 on Tue Mar 19 20:06:58 2019&lt;BR /&gt;*filter&lt;BR /&gt;:INPUT ACCEPT [317006:200566441]&lt;BR /&gt;:FORWARD ACCEPT [0:0]&lt;BR /&gt;:OUTPUT ACCEPT [316311:174050600]&lt;BR /&gt;COMMIT&lt;BR /&gt;# Completed on Tue Mar 19 20:06:58 2019&lt;BR /&gt;admin@FMC-1:~$ sudo -i&lt;BR /&gt;root@FMC-1:~# cat /etc/sysconfig/iptables&lt;BR /&gt;****nothing here, It's all empty****&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thankfully it boots up with "INPUT ACCEPT" otherwise we'd have no access. &lt;BR /&gt;In order to fix this, I needed to restore the "/etc/sysconfig/iptables" config. &lt;BR /&gt;Making changes via the web UI will do nothing to fix this issue. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Locate original files and copy to "/etc/sysconfig/iptables".&lt;/P&gt;
&lt;P&gt;locate iptables | more&lt;BR /&gt;/var/log/sf/Cisco_Firepower_Mgmt_Center_Upgrade-6.3.0/etc.before/sysconfig/iptables&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;note: You might need to run "updatedb" before you use the "locate" command.&lt;BR /&gt;note: We are looking for "etc.before/sysconfig/iptables" as this is the original file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am are running version 6.3.0 so this is the correct file path and file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) cp /var/log/sf/Cisco_Firepower_Mgmt_Center_Upgrade-6.3.0/etc.before/sysconfig/iptables /etc/sysconfig/iptables&lt;/P&gt;
&lt;P&gt;4) restore default config: iptables-restore &amp;lt; /etc/sysconfig/iptables&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;note: This is a live command so ensure your "INPUT" chain commands would allow access to TCP/22 with any source IP at a minimum. The default config includes this so shouldn't be a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;5) Now you can go into your web UI, Add a single /32 IP which will then populate the entire iptables config and restore to however you want it. Run "iptables -nvL" to check the output or "iptables-save" to get a print out of the live iptables config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;6) Rebooted FMC in the lab and iptables are restored on startup.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 20:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-access-list/m-p/3822347#M926334</guid>
      <dc:creator>nehmaan123</dc:creator>
      <dc:date>2019-03-19T20:44:30Z</dc:date>
    </item>
  </channel>
</rss>

