12-27-2017 09:38 PM - edited 02-21-2020 07:02 AM
I'm configuring interfaces by GUI in Cisco 5506x but i'm unable to configure security level for specific interface. I have two interfaces in up/up states and both are configured with security level 0. I just want to configure my inside interface with security level 100 so my internet traffic will be passed by default from higher to lower security level.
I have no command in CLI to configure security level but when i hit show running-config or show nameif so these commands are shown me required information with security level 0 but i'm unable to configure even through GUI.
I'm running FTD 6.1.0 Build 330 and this commands are accessible after (firepower login:)
12-27-2017 11:34 PM
FTD doesn't use security level as ASA does, but rather it uses security zones. When you issue the show nameif command you should see that all interfaces have security-level 0. This is because this is the most restrictive level and all other access should manually be configured.
12-28-2017 04:53 AM
Alright i got it. But, i have configured manually the NAT and ACL policy but my internet traffic isn't pass through firewall. I had removed ACL entry and only configured NAT rule because initial traffic is allowed by default. Also i created two security zones 1. Inside 2. outside but i'm unable to allow my internet traffic and i'm doing all of this task by using GUI.
Can you please give an example about how to allow internet traffic using my firepower.
12-28-2017 05:01 AM
of course you are using GUI since Firepower doesn't allow configuration from CLI. But are you using FMC or ASDM?
So, you are just trying to get traffic from inside to outside (internet)? are you able to ping 8.8.8.8 from the FTD?
You need the following to get this to work:
12-28-2017 09:10 PM
I'm configuring my firewall using FDM (Firepower Device Manager) by typing my management IP address in browser https://MgmtIP
And yes, i'm able to ping 8.8.8.8 from my firewall i test by taking SSH.
I have configured a default route which is pointing towards ISP
I have configured NAT rule which is translating my inside IP addresses to outside
I have configured ACL which is allowing inside interface traffic to any destination.
12-28-2017 11:39 PM
have you checked the log events?
You could also ssh to the FTD and run system support firewall-engine-debug between your PC inside IP and an external IP (client and server). and see if there is a drop action being performed.
from CLI if you issue the command show running-config policy-map, is inspect icmp configured there?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide