<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Traceroute through FTD running 6.3 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd-running-6-3/m-p/3817583#M947237</link>
    <description>&lt;P&gt;I upgraded my FTD firewalls to 6.3 and the old configuration for getting traceroute to work is no longer valid.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know how to get traceroute working on 6.3+ code?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:55:55 GMT</pubDate>
    <dc:creator>Colin Higgins</dc:creator>
    <dc:date>2020-02-21T16:55:55Z</dc:date>
    <item>
      <title>Traceroute through FTD running 6.3</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd-running-6-3/m-p/3817583#M947237</link>
      <description>&lt;P&gt;I upgraded my FTD firewalls to 6.3 and the old configuration for getting traceroute to work is no longer valid.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know how to get traceroute working on 6.3+ code?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd-running-6-3/m-p/3817583#M947237</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2020-02-21T16:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through FTD running 6.3</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-ftd-running-6-3/m-p/3817782#M947243</link>
      <description>&lt;P&gt;It's working fine for me. Here's the output from a host in my lab using an FTDv as the gateway:&lt;/P&gt;
&lt;PRE&gt;C:\Users\Administrator.DC&amp;gt;tracert www.cisco.com

Tracing route to e2867.dsca.akamaiedge.net [23.51.50.219]
over a maximum of 30 hops:

  1     1 ms    &amp;lt;1 ms    &amp;lt;1 ms  172.31.1.1
  2    15 ms     5 ms     4 ms  192.168.0.1
  3    33 ms    17 ms    16 ms  175.139.71.254
  4    19 ms    16 ms    11 ms  10.55.49.21
  5    27 ms    28 ms    26 ms  a23-51-50-219.deploy.static.akamaitechnologies.com [23.51.50.219]

Trace complete.

C:\Users\Administrator.DC&amp;gt;&lt;/PRE&gt;
&lt;PRE&gt;Last login: Mon Mar 11 14:38:23 UTC 2019 from jumpserver.ccielab.mrneteng.com on pts/0

Copyright 2004-2018, Cisco and/or its affiliates. All rights reserved. 
Cisco is a registered trademark of Cisco Systems, Inc. 
All other trademarks are property of their respective owners.

Cisco Fire Linux OS v6.3.0 (build 21)
Cisco &lt;STRONG&gt;Firepower Threat Defense for VMWare v6.3.0.1&lt;/STRONG&gt; (build 85)

&amp;gt; 
&amp;gt; show ip address
System IP Addresses:
Interface                Name                   IP address      Subnet mask     Method 
GigabitEthernet0/0       Inside-Lab             172.31.1.1      255.255.255.0   CONFIG
GigabitEthernet0/1       Outside-Home           192.168.0.204   255.255.255.0   CONFIG
Management0/0            diagnostic             172.31.4.2      255.255.255.0   manual
Current IP Addresses:
Interface                Name                   IP address      Subnet mask     Method 
GigabitEthernet0/0       Inside-Lab             172.31.1.1      255.255.255.0   CONFIG
GigabitEthernet0/1       Outside-Home           192.168.0.204   255.255.255.0   CONFIG
Management0/0            diagnostic             172.31.4.2      255.255.255.0   manual
&amp;gt; show running-config service-policy
service-policy global_policy global
service-policy policy_map_Inside-Lab interface Inside-Lab
&amp;gt; show running-config policy-map
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
  no tcp-inspection
policy-map type inspect ip-options UM_STATIC_IP_OPTIONS_MAP
 parameters
  eool action allow
  nop action allow
  router-alert action allow
policy-map policy_map_Inside-Lab
 match flow-rule qos 268435460
  police output 1000000 31250
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
  inspect icmp error 
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
  set connection decrement-ttl
!
&amp;gt; show running-config class-map
!
class-map inspection_default
 match default-inspection-traffic
!
&amp;gt; &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-ftd-running-6-3/m-p/3817782#M947243</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-12T04:02:14Z</dc:date>
    </item>
  </channel>
</rss>

