cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2706
Views
10
Helpful
12
Replies

FDM Routing Between Networks on Different Interfaces

I have a firepower 1010 managed with FDM.  I have a default config with routed interfaces.  Shouldnt the interfaces route between each other by default if they are in the same security zone?  The only think i can think of is that I have my fiber modem in passthru mode and it assigns the WAN ip by DHCP but its a WAN gateway so it cant route my internal IPV4?

1 Accepted Solution

Accepted Solutions

@thediscountgeeks correct, the router would behave differently and would allow the ping. You have a security device, both the FTD or ASA will not allow the ping through the device to one of it's local interfaces.

 

You inital issue is resolved now?

View solution in original post

12 Replies 12

Marvin Rhoads
Hall of Fame
Hall of Fame

Your default ACP rule is to block. So unless the traffic is explicitly allowed in an earlier rule it will not be allowed.

You didn't share the interface-one mapping but the rules you have do not appear at first glance to cover all of the many interfaces you have configured.

You can always confirm a given flow's behavior from the cli using the packet-tracer command.

I'm still scratching my head, I thought this worked out of the box.  I have attached my config if you can take a look.  im just trying to get from 192.168.1.0/24 to 192.168.2.0/24

@thediscountgeeks are both interfaces in the inside_zone? - if not the traffic won't match your ACP rules. You'll probably need a Twice NAT/NAT exemption rule between those networks to ensure the traffic is not unintentially translated. As previously suggested you can run packet-tracer to determine more information about the traffic flow.

yes, they are all in the inside zone together.  I think this Firepower 1010 is fried because now the ports wont even light up after letting it boot overnight.  I reset it and still nothing.  This all transpired a few hours after I upgraded the software to the latest version, lesson learned.  Additionally, packet tracer does not work on this unit.

@thediscountgeeks so what error do you get when you run packet-tracer from the cli?

You've enabled the interfaces in fdm?

 

 

I was getting something like command not supported, the unit is down ATM
otherwise I would screenshot.

Yes the interfaces were enabled and giving out IP's

@thediscountgeeks so if the interfaces are giving out ips, the interfaces are working?....just no lights?

 

Regardless you'll probably need a NAT exemption rule as previously mentioned, to ensure traffic is not unintentially franslated.

 

The command starts "packet-tracer", its always been available in FTD image.

no, after the lights stopped working, its also stopped giving out IP's with
my old config or the factory reset configuration. I opened a TAC case so I
will see how that turns out.

Ill read up on the NAT exemption

Ill send you that packet tracer command if I get it again

This is the strange behavior im seeing, why can I ping a host on a sperate network and not the gateway that host resides on?  I have also put them in the same zone.

ping no ping.PNG

 

 

@thediscountgeeks I assume the computer running that ping was on a different network....that won't work.

 

You can only ping the local FTD interface your device is connected to. You cannot ping through the FTD to one of the FTD's far interfaces, that is by design, you cannot bypass this. The only exception is if connected via VPN.

Yes, it’s on a different network. I see, this OSS a firewall design but not
this way on a dedicated router right?

@thediscountgeeks correct, the router would behave differently and would allow the ping. You have a security device, both the FTD or ASA will not allow the ping through the device to one of it's local interfaces.

 

You inital issue is resolved now?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: