cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2064
Views
2
Helpful
34
Replies

access rules firepower 1010

BornJames
Level 1
Level 1

Hi team,

have a question regarding access rules.

how come if any any eveyrhting works fine.

however when i want to allow lets say connect to facebook, and everything else disable 

so i put source(inside) network(any-ipv4) ports(any) destination(outside_zone) network(FQDN facebook.com) ports (any)

so now I should have connection only to facebook, however no connection at all.

 

34 Replies 34

That is interesting. When you type system support and then you type ? does it show you the diagnostic-cli option?

nah, nothing happens, it doenst allow me to push enter, it just sits there 

Would you mind sharing the screenshot?

so there is issue with DNS 
first point to clear here is 
DNS for data different than DNS for mgmt 
you run FPR 1010 with ASA image or FTD image ?
FPR mgmt by FDM or FMC ?

Thank you for the reply.

I have got default DNS group which consists of 8.8.8.8 8.8.4.4 and is used for Vlan 1 and for management 

BornJames_0-1688980115000.png

but I also I have got this configured, so the PCs could get this DNS

BornJames_1-1688980765679.png

 

are you saying that it is not how it is suppose to be ?

you run FPR 1010 with ASA image or FTD image ?
FPR mgmt by FDM or FMC ?

how would I check that ?

it is just out of box

 

thank you 

 

Client -> FPR -> 8.8.8.8 this need ACL config in FPR allow INside subnet to ANY UDP port 53 and as normal you need NATing INside to OUTside public IP

FPR -> 8.8.8.8 this need change the source of DNS from mgmt to INside Or keep mgmt as source of DNS but NATing the mgmt interface to OUTside interface.

Yeh, I do have that rle allowing from inside to outside port 53 for tcp and udp, also NATing is in place as the everything is working fine when I have any to any rule configured.

dont understand the second part that I need to change for management... 

 

OK, when you use FQDN in ACL instead of IP, here the FPR will resolve the FQDN into IP 
so here the DNS is mgmt not data, 
FPR will send DNS request using mgmt as source IP and 8.8.8.8 as destination BUT 
are 8.8.8.8 know FPR mgmt private IP ? sure NO, so you need IP that can access internet and hence you can use data interface INside as source for DNS mgmt traffic. 
hope this help you friend. 
thanks 
MHM

Hello MHM,

I have access to the internet via Vlan 1 it is working, what would this rule look like ?

"so you need IP that can access internet and hence you can use data interface INside as source for DNS mgmt traffic. "

thank you for the help

Yes but you use dedicate mgmt interface not use data interface as mgmt interface. 
anyway 
only add mgmt interface to NATing, make mgmt subnet NATing to OUTside public IP.

I dont understand.

you mean like this ?

BornJames_1-1689160179726.png

 

 

 

Correct'

Do that 

Then config your acl with fqdn and check deny/permit traffic 

nah, lost internet connection 

this is the rule I have just for a test. but no internet connection after the NAT chang

BornJames_0-1689286714866.png

 

Ca  I see all NAT you config in fpr

this is the only NAT rule I have

BornJames_1-1689379911470.png

 

Review Cisco Networking for a $25 gift card