I have a problem with traffic in two DMZs. Let's call them DMZ10 and DMZ20. DMZ10 has a security level of 40 and dmz20 has a security level of 90. By default, the higher sec level is able to access, the lower sec level, but if you want the lower sec level to access the higher one, you need to create an access rule. Using the Packet tracert, my highest sec level,in this case DMZ20, can't ping any device in DMZ10. Packet tracert shows that the interface of the DMZ20 drop the packet, i tried to add and access to explicitely permit dmz10 that didn't change a thing. I add a simular rule of dmz10 with no success result.
Can someone help me shed some light on this issue?
Can you please post a copy of your config? We would need to see the ACLs and NAT rules that apply to these interfaces. Also, the full packet-tracer output may help as well (i.e. what step was the packet being dropped on?).
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...