03-02-2025 10:18 AM - edited 03-02-2025 10:24 AM
Hi experts,
I have the a quite simple setup but there is an annoying issue which keeps me busy since days. Basically the setup is working. PC1 can access the Internet and can ping other hosts on CBS350. So this is fine.
But the issue is that PC 1 can not access PC 2. Oddly PC 2 can access PC 1.
I hope you can help with this issue. I'm running out of ideas...
For your orientation please find the following map:
What I've tested:
Direction: Firewall to Switch
Direction: Switch to Firewall
So I investigated the issue by using SPAN on the CBS350. I did a wireshark on P23 when PC1 was pinging PC2.
As the firewall is routing back the ping-reply to P23 there seems no issue on FPR-side.
In a next step I did the same on P13 when PC 1 was pinging PC 2.
The ping request is sent but the reply is not routed back to PC1.
I think the ping-reply is lost on the CBS350 during routing from P23 to P13. - But what could be the reason and how can I fix it?
Thank you in advance.
03-02-2025 12:20 PM - edited 03-02-2025 12:22 PM
High level, when you mentioned not being able to communicate (ping, or any other application)
First, I check Windows Firewall (disable and test it)
other side check inter-vlan routing :
https://www.youtube.com/watch?v=g1NMbrnJfvg
Also make sure you have FTD routing enabled, how to reach each other's subnets
What zone PC2? Inside or same zone? (check on FTD logs)
03-02-2025 01:51 PM - edited 03-02-2025 01:52 PM
Some more clarifications:
FTD configuration:
Routing on FTD is enabled:
Static route is set:
ACL on FTD (not sure if necessary)
03-03-2025 02:34 AM - edited 03-03-2025 02:36 AM
Hello @christian85
You say:
So, possible to wireshark on PC-2 when you attempt http(s) or ping from PC-1 to PC-2 ?
Also, on FTD possible to "tcpdump" on port 4 and port 6 during your attempt also ?
03-03-2025 10:11 AM
Hi M02@rt37,
I did a packet capture on my FTD.
> capture CAPI interface INSIDE match icmp host 192.168.0.23 host 192.168.95.7
> capture CAPO interface INSIDE match icmp host 192.168.95.7 host 192.168.0.23
> show capture CAPI
4 packets captured
1: 17:46:10.632245 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
2: 17:46:15.309828 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
3: 17:46:20.311522 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
4: 17:46:25.317244 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
4 packets shown
> show capture CAPO
4 packets captured
1: 17:46:10.632245 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
2: 17:46:15.309828 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
3: 17:46:20.311522 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
4: 17:46:25.317244 802.1Q vlan#1 P0 192.168.95.7 > 192.168.0.23 icmp: echo reply
4 packets shown
This is identical to what I recorded with wireshark:
During the http request from PC 1 to PC 2 I captured the following traffic:
> capture CAPI interface INSIDE match icmp host 192.168.0.23 host 192.168.95.1
> capture CAPO interface INSIDE match icmp host 192.168.95.1 host 192.168.0.23
> show capture CAPI
8 packets captured
1: 17:48:11.838839 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
2: 17:48:11.839174 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
3: 17:48:12.865571 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
4: 17:48:12.865876 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
5: 17:48:13.892226 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
6: 17:48:13.892593 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
7: 17:48:14.934140 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
8: 17:48:14.934506 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
8 packets shown
> show capture CAPO
8 packets captured
1: 17:48:11.838839 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
2: 17:48:11.839174 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
3: 17:48:12.865571 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
4: 17:48:12.865876 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
5: 17:48:13.892226 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
6: 17:48:13.892593 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
7: 17:48:14.934140 802.1Q vlan#1 P0 192.168.0.23 > 192.168.95.1 icmp: echo request
8: 17:48:14.934506 802.1Q vlan#1 P0 192.168.95.1 > 192.168.0.23 icmp: echo reply
8 packets shown
What I find interesting is that the ping from PC 1 to FTD (Port 4) captured both - response and request.
In contrast to the ping from PC 1 to PC 2 where the request is missing and just the reply was captured. But is this something to worry about?
BR
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide