My windows computer instances are connected to my FTD instances interfaces but cannot ping the FTD interface IP addresses. The windows computers are on the same subnet as my FTD instance.

1

I have two windows computer instances, one setup on the outside subnet and one setup on the inside subnet of my VPC network. I set up my FTD instance on the same VPC as the windows computers and on the same outside subnet and inside subnet. The outside subnet is 10.100.3.0/24, and the inside subnet is 10.100.2.0/24.

The windows computers cannot ping the interfaces on the FTD instance. I wanted to use the windows computer connected to the inside subnet as a reference to confirm access control policy rules are working and allowing or blocking traffic as per the assigned ACP rules applied to the FTD and the inside computer. Why is the inside computer not able to ping the FTD inside interface? It seems the inside computer is not on the same subnet. Can anyone help, thank you.

  • Have you been able to resolve your issue? If so, would you select an answer that matched your issue to close out the thread?

TDrakes
asked 7 months ago274 views
2 Answers
0

I have to blur out a portion of it out, but do you see the rule I'm adding includes the SG itself as the source of traffic instead of a CIDR range?

Enter image description here

This means that anything that has this SG connected to it can talk to anything else that has this same SG attached.

AWS
LondonX
answered 7 months ago
  • Hello LondonX, I am not sure if the only rule in the security group inbound rules should be the example rule you posted. I do not want to lose connection to instances. I added the rule you posted referencing my instance security group. Now I have two rules in my security group and I still cannot ping from my inside Windows server on the same subnet as the FTD interface. Window server cannot ping FTD interface, both devices are on the same subnet. Note: the Windows server mgmt IP can ping the FTD mgmt interface. Should I only have the rule referencing the security group in the inbound rule

  • Security groups can only contain allow statements, so there's no way for them to conflict with each other. You can leave both statements. Did you attach the same SG for both the inside windows server and FTD, or are they different SGs? Perhaps you could post a screenshot.

  • Screenshot not pasting. Both Windows inside server and FTD are using the same security group. My security group is shown below: – sgr-0 IPv4 All traffic All All 0.0.0.0/0 Test_Network_Security_Group_Rule1

    – sgr-0 – All traffic All All sg-0ebc / test_network_security_group Test_Network_Security_Group_Rule2

  • Your SG configuration looks to be intact. The possible reasons for connectivity issues would go as follows (not in any particular order):

    • FTD interfaces were placed in different subnets than your windows instances (by accident no doubt) and you could be using non default NACLs in those subnets which require you to specify communications in both directions (otherwise all traffic is dropped): PING and REPLY. NACLs affect communications between subnets but not within the same subnet.
    • FTD is not configured correctly, either not configured to reply to ICMP, the interface is turned off somehow inside the appliance or the instance itself is shutdown.
    • Unlikely, but perhaps your Windows firewall is dropping the reply. May want to check on that.
  • Ran packet-tracer on the inside interface, found a NACL dropping icmp reply packets by configured implicit deny. Put in allow all before the implicit deny, icmp reply is still blocked Config: Implicit Rule Forward Flow based lookup yields rule: in id=0x14c465f53430, priority=501, domain=permit, deny=true hits=54, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=10.100.2.50, mask=255.255.255.255, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,, dscp=0x0, nsg_id=none input_ifc=TEST-NETWORK_INSIDE(vrfid:0), output_ifc=any

0

One of two things:

  1. FTD is not configured to respond to ping.
  2. Security group on the FTD network interfaces does not permit incoming ICMP.

If you have the windows server and the FTD interfaces in the same security group, the security group must reference itself in order to permit traffic between members of the SG.

AWS
LondonX
answered 7 months ago
  • LondonX, the FTD and windows servers are configured to allow all inbound and outbound traffic from the security group temporarily and when my setup starts working I will filter the access. I do not understand the statement about the security group must reference itself in order to permit traffic between members of the Security Group. Can you provide an example on how to config this security group traffic between SG members?

  • LondonX, I set all traffiic to allow all on my secuiry group and NACL and AWS still has an ACl on the FTD interface that I do not have access to, to allow all trafiic before the implicit deny. I will continue without a reference PC to confirm if ACP applied rules are being applied and affecting the PC. thank you for your help. but nothing is working.

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions