Introduction
This document describes how events are displayed when deploying FTD in transparent mode with different types of inline sets.
Objective
To clarify the behaviour of connection events in the FMC when the FTD is deployed in transparent mode with an inline-set configuration.
Topology
![Topology](/c/dam/en/us/support/docs/security/firepower-management-center-2600/222651-understanding-events-in-firepower-deploy-00.png)
Components Used
- PC-Virtual machine
- C9200L-48P-4X-E (L3 Switch)
- Firepower 4125 | 7.6
- FMCv | 7.6
- ASA 5508
- ISR4451-2 (Router)
Base Scenario
When one Inline-set configuration on Firepower 4125 contains two selected interface pairs
Ethernet 1/3 ( INSIDE-1)
Ethernet 1/5 (EXTERNAL1)
Ethernet 1/4 (INSIDE-2)
Ethernet 1/6 (EXTERNAL2)
![Interface Detail](/c/dam/en/us/support/docs/security/firepower-management-center-2600/222651-understanding-events-in-firepower-deploy-01.png)
![Inline Sets](/c/dam/en/us/support/docs/security/firepower-management-center-2600/222651-understanding-events-in-firepower-deploy-02.png)
Configuration overview
L3 Switch
Port-channel 2 ( Gig 1/0/45-46)
ASA 5508
Port-channel 2 (Gig 1/3-4)
ASA is deployed in One arm mode which means the traffic enters and exits the ASA through same port-channel which is port-channel 2.
Port-channel is configured on ASA and switch to load balance the traffic between the two.
Firepower 4125 is registered to FMCv.
FMCv
Configure
Prefilter-policy:
Pre-filter rule internal-external with action Fastpath.
Source interface object : INTERNAL_1 Destination interface object : EXTERNAL_1.
![Prefilter Rule](/c/dam/en/us/support/docs/security/firepower-management-center-2600/222651-understanding-events-in-firepower-deploy-03.png)
Access Control policy is configured with allow all any-any.
Observed Behaviour
Scenario 1
ICMP Traffic generated from VM-PC destined to ISR4451-2(Router) :
ICMP traffic takes the path:
VM-PC ------ L3Switch ------- FPR4125 ------- ASA 5508 ------FPR4125 ------ L3 Switch ---- ISR Router.
Only one connection event is seen in the FMC connection event because the ICMP traffic ingresses and egresses through the same inline pair (INSIDE-2 >>EXTERNAL2) on the FPR 4125.
Policy-Based Routing (PBR) is configured on the switch interfaces connected to the firewall and router. This was necessary because, when a PC tries to communicate with the ISR router's IP address, it does not send traffic to the FTD or ASA by default since the router is directly connected to the switch. According to the switch's routing table, the PC and router communicate directly with each other.
To meet our requirement of inspecting the traffic through the FTD, we needed to configure PBR to re-direct the traffic (both requests and responses) via the FTD. Therefore, we configured PBR on the switch interfaces connected to the PC and router.
Scenario 2
ICMP Traffic generated from VM-PC destined to ISR4451-2(Router) :
ICMP traffic takes the path:
VM-PC ------ L3Switch ------- FPR4125 ------- ASA 5508 ------FPR4125 ------ L3 Switch ---- ISR Router.
![Inline Sets](/c/dam/en/us/support/docs/security/firepower-management-center-2600/222651-understanding-events-in-firepower-deploy-04.png)
When we separate the inline pair configuration in to two different Inline-sets as shown in the figure above. The traffic egresses the FTD thorugh INSIDE-1 and ingresses through EXTERNAL2.
Hence two inline-sets are utilized .
When observing the connection events on the FMC we see two connection events , one for the outgoing traffic and one for the incoming.
The reason behind such behaviour is whenever traffic on FTD utilises two different inline-pairs for the same traffic , we always see two connection events on the FMC.