01-18-2022 08:29 PM
I have a firepower 1010 managed with FDM. I have a default config with routed interfaces. Shouldnt the interfaces route between each other by default if they are in the same security zone? The only think i can think of is that I have my fiber modem in passthru mode and it assigns the WAN ip by DHCP but its a WAN gateway so it cant route my internal IPV4?
Solved! Go to Solution.
01-24-2022 02:24 AM - edited 01-24-2022 02:27 AM
@thediscountgeeks correct, the router would behave differently and would allow the ping. You have a security device, both the FTD or ASA will not allow the ping through the device to one of it's local interfaces.
You inital issue is resolved now?
01-19-2022 12:04 AM
Your default ACP rule is to block. So unless the traffic is explicitly allowed in an earlier rule it will not be allowed.
You didn't share the interface-one mapping but the rules you have do not appear at first glance to cover all of the many interfaces you have configured.
You can always confirm a given flow's behavior from the cli using the packet-tracer command.
01-20-2022 03:52 PM
I'm still scratching my head, I thought this worked out of the box. I have attached my config if you can take a look. im just trying to get from 192.168.1.0/24 to 192.168.2.0/24
01-21-2022 12:25 AM
@thediscountgeeks are both interfaces in the inside_zone? - if not the traffic won't match your ACP rules. You'll probably need a Twice NAT/NAT exemption rule between those networks to ensure the traffic is not unintentially translated. As previously suggested you can run packet-tracer to determine more information about the traffic flow.
01-21-2022 12:47 PM
yes, they are all in the inside zone together. I think this Firepower 1010 is fried because now the ports wont even light up after letting it boot overnight. I reset it and still nothing. This all transpired a few hours after I upgraded the software to the latest version, lesson learned. Additionally, packet tracer does not work on this unit.
01-21-2022 12:59 PM
@thediscountgeeks so what error do you get when you run packet-tracer from the cli?
You've enabled the interfaces in fdm?
01-21-2022 01:03 PM
01-21-2022 01:13 PM
@thediscountgeeks so if the interfaces are giving out ips, the interfaces are working?....just no lights?
Regardless you'll probably need a NAT exemption rule as previously mentioned, to ensure traffic is not unintentially franslated.
The command starts "packet-tracer", its always been available in FTD image.
01-21-2022 01:22 PM
01-23-2022 07:38 PM
This is the strange behavior im seeing, why can I ping a host on a sperate network and not the gateway that host resides on? I have also put them in the same zone.
01-24-2022 12:13 AM
@thediscountgeeks I assume the computer running that ping was on a different network....that won't work.
You can only ping the local FTD interface your device is connected to. You cannot ping through the FTD to one of the FTD's far interfaces, that is by design, you cannot bypass this. The only exception is if connected via VPN.
01-24-2022 02:19 AM
01-24-2022 02:24 AM - edited 01-24-2022 02:27 AM
@thediscountgeeks correct, the router would behave differently and would allow the ping. You have a security device, both the FTD or ASA will not allow the ping through the device to one of it's local interfaces.
You inital issue is resolved now?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide