The issue is documented in Cisco bug ID CSCsd35775.
The problem occurs after an upgrade from PIX Firewall software 6.3.4 to 6.3.5(105). The DNS replies are blocked by the outbound ACL for Domain Name System (DNS) queries initiated from outside to inside. The ACL does not have explicit access control entries to allow DNS replies from theDNS server back to the client.
For a workaround, explicitly permit the traffic from source UDP port 53 and the address of the inside DNS server in the ACL.
Hello,I have a working remote access SSL VPN solution using a pair of FTDs on 6.4. The current SSL certificate is RSA based but we've been asked to upgrade to ECDSA for suite B. The documentation states 'Only RSA based certificates are supporte...
Hello, I have Firepower 2110, which is not passing traffice from the Inside interface to the Outside interface. I have run the packet tracer tool and it states that traffic should be passing normally. I have a static route. I am new to Firepower, and...
Get more with Firepower 6.6.1 – Cisco’s latest suggested release
The latest suggested release for Firepower delivers a Modernized UI, faster eventing, improved usability, and compatibility with the Cisco SecureX platform
In September 2020, Cisco of...