ā07-06-2022 11:17 AM
We recently implemented a firepower 1140 running 7.0.1-84. We would like to allow host on our inside network to ping & tracert a host on our DMZ, and vice versa. Our DMZ and inside network have dedicated interface on the firepower. when I create an ACL to allow this traffic, ICMP, echo, and TTL are not listed.
How can I make these available to allow icmp to specific host on these interfaces?
thank you.
Solved! Go to Solution.
ā07-06-2022 11:28 AM
@PhilipTalavera7329 how are you managing these devices? If using FMC, you need to configure a service policy, from there you can decrement the TTL. https://www.cisco.com/c/en/us/td/docs/security/firepower/670/configuration/guide/fpmc-config-guide-v67/threat_defense_service_policies.html#id_71048
Here is a guide to configure ICMP/Traceroute through FTD.
ā07-06-2022 11:28 AM
@PhilipTalavera7329 how are you managing these devices? If using FMC, you need to configure a service policy, from there you can decrement the TTL. https://www.cisco.com/c/en/us/td/docs/security/firepower/670/configuration/guide/fpmc-config-guide-v67/threat_defense_service_policies.html#id_71048
Here is a guide to configure ICMP/Traceroute through FTD.
ā07-06-2022 04:05 PM
thank you. issue resolved
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide