12-17-2024 12:57 AM
Hi Guys
I am trying to troubleshoot an issue with LDAP from my FTD, I have the ftd onboarded to the cloud cdFMC for management.
I have done a packet capture and I can see the requests are coming from 169.254.1.3 rather than the inside interface IP.
How do we change / fix this behaviour?
Many thanks
12-17-2024 01:56 AM
This IP address means some interface is configured for DHCP and is not receiving IP address and It using APIPA address
12-17-2024 02:00 AM
Hi @carl_townshend, as shown in this other post, your firewall seems not to have the data interfaces configured yet, this would explain why is showing nothing when you click on the interfaces drop down menu.
12-17-2024 04:30 AM
Hi
The inside and outside interfaces are both configured with IP addresses and zones, I can also ping them both fine.
12-17-2024 04:42 AM
when you integration LDAP with FTD try select interface that reachable from LDAP
I think OUTside is Good
MHM
12-17-2024 04:47 AM
It's weird then why it's showing empty in the interfaces drop down menu. Have you managed to configure the management interface with the right IP as well?
12-17-2024 08:31 AM
The behavior you're observing—LDAP requests originating from 169.254.1.3 on your Cisco Firepower Threat Defense (FTD) device—is due to the diagnostic interface being used as the source for system-generated traffic, including LDAP queries. This is common for scenarios where the source interface for such traffic is not explicitly defined.
12-17-2024 09:48 AM
Hi, is there some sort of bug then?
I managed to get around it by creating a Nat rule for from the 169 address to the inside interface ip.
also, the other issue was the firewall not doing dns lookups when testing the ldap connection, even though I had internal dns servers configured on my platform settings and I could ping when using the ftd cli, when I did an ldap test I never saw any dns lookups coming from the ftd, to fix this I had to go onto the ftd itself and configure the network dns to an internal server, the ldap then worked, the only issue I have now is that it won’t apply the LDAP configuration to the ftd, the deployment fails validation and days contact Cisco TAC, something to do with not accepting the ldap username.
maybe I need flexconfig for this?
12-18-2024 03:46 AM - edited 12-18-2024 03:46 AM
Hi All
For ref, please see the below from the CDO instructions, you can see it does create a NAT for (outside) by default for the internal management interface traffic, I had to add a rule manually for the (inside) interface
Troubleshoot Management Connectivity on a Data Interface
12-18-2024 04:28 AM
Thanks for sharing this.
12-18-2024 04:35 AM
Why make long steps
Instead use outside as interface connect to ldap instead of using inside and NAT to outside.
MHM
12-18-2024 04:45 AM
Hi, my LDAP servers are on the inside not outside, so they need to point this way
12-18-2024 04:59 AM
If that SO why you NAT to outside?.?
Anyway goodluck
Thanks
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide