I am working on a new install including 2 - FPR4120 and Firepower Management Center (FMC) 6.0.1. I have the devices connected to the FMC and have one of the devices connected with monitor interfaces, so I see data populating my dashboard. Since this is a new product to me I am finding it challenging to setup a basic block access control policy.
The setup is a FPR4120 in each of our data centers. Both FPR4120s have 2 port-channels with sub-interfaces and and IP address configured on the sub-interfaces. Each have a management/diagnostics interface with a static IP and default static route for SNMP, Logging, etc. In data center ONE I have it configured with the monitoring interfaces. In the other data center TWO I have a default static route for one of the sub-interfaces and can ping that interface from anywhere on the network. With a basic level of connectivity established at data center TWO I created an Access Control Policy for testing to block all ICMP, see below. This policy is not working, so is there something I am missing.
All help would be greatly appreciated.
The policy I am using for testing is Main Policy TierPoint:
In the Main Policy Tierpoint I have the block rule.