<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 1010 Port Forward Struggle in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5154474#M591016</link>
    <description>&lt;P&gt;Which solution you use 1 or 2?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Thu, 01 Aug 2024 10:28:25 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-08-01T10:28:25Z</dc:date>
    <item>
      <title>Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152455#M590889</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I have been struggling on this for days, I have a nginx web app running on my server(192.168.10.5) that I am trying to port forward it to be accessible on the internet. I was able to do a port forward easily if I were to do a direct connection from my computer -&amp;gt; switch -&amp;gt; ISP modem.&lt;/P&gt;&lt;P&gt;But if I put it behind the firewall (Firepower 1010 Series) I am struggling it always says that my port is closed.&lt;/P&gt;&lt;P&gt;The network diagram look like this(with only the vlan10 that is shown):&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-07-28 213405.png" style="width: 234px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224691iE810249A75877F78/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-07-28 213405.png" alt="Screenshot 2024-07-28 213405.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;this is the route table:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="route.png" style="width: 390px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224687iEE934DDF7B6E099C/image-size/large?v=v2&amp;amp;px=999" role="button" title="route.png" alt="route.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Access-list:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acl .png" style="width: 957px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224689i3D224F2BAB7ACE31/image-size/large?v=v2&amp;amp;px=999" role="button" title="acl .png" alt="acl .png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;NAT:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nat.png" style="width: 966px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224690i2749F9D8E13BCB36/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat.png" alt="nat.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I also encountered something that might be a factor on the problem, is that when I ping the firewall outside interface(192.168.1.8) from my server (192.168.10.5)&amp;nbsp; it result me in time out but I can ping the gateway(192.168.1.1) and other device that are connected on the ISP modem.&lt;/P&gt;&lt;P&gt;If I ping inside the firewall cli, I can ping everything all right.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 13:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152455#M590889</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-28T13:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152461#M590890</link>
      <description>&lt;P&gt;Can you run packet tracer for this traffic and share it here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 14:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152461#M590890</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-28T14:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152465#M590891</link>
      <description>&lt;P&gt;I tried packet-tracer on both the tcp and icmp protoctol but result into command execution failed. but I did a packet tracer on udp:&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 36270 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 192.168.1.8 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6858 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435459 ifc inside any any rule-id 268435459 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435459: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435459: L7 RULE: block sites&lt;BR /&gt;object-group service |acSvcg-268435459&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x1497286f8de0, priority=12, domain=permit, deny=false&lt;BR /&gt;hits=11724, user_data=0x14971ac33880, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=inside(vrfid:0)&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6858 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.10.5/12345 to 192.168.1.8/12345&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x1497286c35c0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=1634724, user_data=0x1497292fbb40, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6858 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14972637f010, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=1572321, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6858 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x149727e1cb80, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=2544125, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 23250 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x149728bd41d0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1633023, user_data=0x149728eba240, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 86952 ns&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed, Drop-location: frame 0x000055719d08fc89 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 14:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152465#M590891</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-28T14:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152495#M590893</link>
      <description>&lt;P&gt;Remove static NAT&lt;/P&gt;
&lt;P&gt;And add below&lt;/P&gt;
&lt;P&gt;Source interface:- IN&lt;/P&gt;
&lt;P&gt;Destiantion interface:- OUT&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Real&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Source IP :- server private IP&lt;/P&gt;
&lt;P&gt;Destiantion IP :- Any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source Port :- http&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Mapped&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source IP :- server public IP&lt;/P&gt;
&lt;P&gt;Destiantion IP :- ANY&lt;/P&gt;
&lt;P&gt;Source Port :- http&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 17:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152495#M590893</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-28T17:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152549#M590897</link>
      <description>&lt;P&gt;Thank you for this, but I tried it still not working, I am still encountering this connection log whenever I try to access my web app through my public ip.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hmm.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224705i9D4582A33320BAC8/image-size/large?v=v2&amp;amp;px=999" role="button" title="hmm.png" alt="hmm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 22:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152549#M590897</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-28T22:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152551#M590898</link>
      <description>&lt;P&gt;Share last NAT&lt;/P&gt;
&lt;P&gt;And packet tracer (it direction must be from outside to inside)&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 22:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152551#M590898</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-28T22:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152553#M590899</link>
      <description>&lt;P&gt;&lt;STRONG&gt;show nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Manual NAT Policies Implicit (Section 0)&lt;BR /&gt;1 (nlp_int_tap) to (inside) source static nlp_server__http_0.0.0.0_intf3 interface destination static 0_0.0.0.0_12 0_0.0.0.0_12 service tcp https https&lt;BR /&gt;translate_hits = 13905, untranslate_hits = 13910&lt;BR /&gt;2 (nlp_int_tap) to (inside) source static nlp_server__ssh_0.0.0.0_intf3 interface destination static 0_0.0.0.0_13 0_0.0.0.0_13 service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (nlp_int_tap) to (inside) source static nlp_server__ssh_::_intf3 interface ipv6 destination static 0_::_14 0_::_14 service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (nlp_int_tap) to (inside) source dynamic nlp_client_0_0.0.0.0_6proto22_intf3 interface destination static nlp_client_0_ipv4_14 nlp_client_0_ipv4_14 service nlp_client_0_6svc22_13 nlp_client_0_6svc22_13&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (nlp_int_tap) to (inside) source dynamic nlp_client_0_ipv6_::_6proto22_intf3 interface ipv6 destination static nlp_client_0_ipv6_16 nlp_client_0_ipv6_16 service nlp_client_0_6svc22_15 nlp_client_0_6svc22_15&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static server-ip public-ip service _|NatOrigSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2 _|NatMappedSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (nlp_int_tap) to (diagnostic) source dynamic nlp_client_0_intf2 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (nlp_int_tap) to (inside) source dynamic nlp_client_0_intf3 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (nlp_int_tap) to (outside) source dynamic nlp_client_0_intf4 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (nlp_int_tap) to (diagnostic) source dynamic nlp_client_0_ipv6_intf2 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (nlp_int_tap) to (inside) source dynamic nlp_client_0_ipv6_intf3 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;6 (nlp_int_tap) to (outside) source dynamic nlp_client_0_ipv6_intf4 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (inside) to (outside) source dynamic any-ipv4 interface&lt;BR /&gt;translate_hits = 1659656, untranslate_hits = 7197&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside udp 192.168.1.8 80 192.168.10.5 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 35340 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.95.5 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 9300 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 44640 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000055719d087fbe flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 22:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152553#M590899</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-28T22:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152555#M590900</link>
      <description>&lt;P&gt;Sorry&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share NAT table from fmc(or fdm) not from cli&lt;/P&gt;
&lt;P&gt;Also packet tracer do you use server real IP or mapped IP?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 22:48:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152555#M590900</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-28T22:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152564#M590901</link>
      <description>&lt;P&gt;FDM nat table&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="natt.png" style="width: 957px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224708i5CED3AEDE0797FF0/image-size/large?v=v2&amp;amp;px=999" role="button" title="natt.png" alt="natt.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;here is the packet tracer, using my mapped IP.&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 119.93.x.x 80 192.168.10.5 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 36270 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.95.5 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8680 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit ip any any rule-id 1 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8680 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8680 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 31155 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 93465 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000055719d090230 flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 23:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152564#M590901</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-28T23:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152567#M590902</link>
      <description>&lt;P&gt;&lt;SPAN&gt;packet-tracer input outside &lt;STRONG&gt;tcp&lt;/STRONG&gt; 119.93.x.x 12345 192.168.10.5 80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You need to use tcp not udp for http traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;192.168.10.5 this server mapped IP?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 00:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152567#M590902</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-29T00:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152569#M590903</link>
      <description>&lt;P&gt;yes that's the server mapped IP.&lt;/P&gt;&lt;P&gt;this is the packet tracer result:&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 119.93.x.x 12345 192.168.10.5 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 32085 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.95.5 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8525 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit ip any any rule-id 1 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8525 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8525 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 33015 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static server-ip public-ip service _|NatOrigSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2 _|NatMappedSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 90675 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000055719d090230 flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 00:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152569#M590903</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-29T00:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152572#M590904</link>
      <description>&lt;P&gt;&lt;SPAN&gt;packet-tracer input inside&amp;nbsp;&lt;STRONG&gt;tcp&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;192.168.10.5 80&amp;nbsp;119.93.x.x 12345 &amp;lt;&amp;lt;- share this please&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 00:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152572#M590904</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-29T00:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152582#M590906</link>
      <description>&lt;P&gt;thanks here it is:&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input inside tcp 192.168.10.5 80 119.93.x.x 12345&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 20460 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 20925 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.1.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8137 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435459 ifc inside any any rule-id 268435459 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435459: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435459: L7 RULE: block sites&lt;BR /&gt;object-group service |acSvcg-268435459&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8137 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static server-ip public-ip service _|NatOrigSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2 _|NatMappedSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.10.5/80 to 119.93.252.113/80&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8137 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8137 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 27435 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static server-ip public-ip service _|NatOrigSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2 _|NatMappedSvc_4e505803-4d2d-11ef-8c7b-4d569e326dc2&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 101368 ns&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed, Drop-location: frame 0x000055719d08fc89 flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 02:07:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152582#M590906</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-29T02:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152954#M590935</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (798).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224757i9FC52698A150BAFB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (798).png" alt="Screenshot (798).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 17:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152954#M590935</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-29T17:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152974#M590936</link>
      <description>&lt;P&gt;192.168.10.5(server private ip) belongs to the VLAN 10 network that I have created on the switch, where the 1st port of the sw is being trunked(vlan1). and the 2nd port(access/vlan10) is connected to the firewall(eth1/2), and in the firewall the eth1/2 belongs to the default vlan1 interface where the eth1/2 is being trunked. below are the configuration I have on my fdm.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="routing.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224760i2F98A3899371CAA0/image-size/large?v=v2&amp;amp;px=999" role="button" title="routing.png" alt="routing.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vlan.png" style="width: 956px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224759i211CB37A157DD741/image-size/large?v=v2&amp;amp;px=999" role="button" title="vlan.png" alt="vlan.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="interface.png" style="width: 950px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224761iB03DFC552903ECB2/image-size/large?v=v2&amp;amp;px=999" role="button" title="interface.png" alt="interface.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 18:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5152974#M590936</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-29T18:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153059#M590947</link>
      <description>&lt;P&gt;so the real server IP is 192.168.10.5 and it must mapped to 192.168.1.5 ?&lt;BR /&gt;if that config then it correct&amp;nbsp;&lt;BR /&gt;but I think you swap IP because I ask if 192.168.10.5 is mapped ip you mention Yes !!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 01:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153059#M590947</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-30T01:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153841#M590977</link>
      <description>&lt;P&gt;I&amp;nbsp; see,&lt;/P&gt;&lt;P&gt;when I added this NAT.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="add-nat.png" style="width: 904px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224972i78B5DB844412527F/image-size/large?v=v2&amp;amp;px=999" role="button" title="add-nat.png" alt="add-nat.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;and did a&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.10.5 80 119.93.x.x 80&lt;/P&gt;&lt;P&gt;it was successful&lt;/P&gt;&lt;P&gt;but when I packet trace outside it resulted on this&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 119.93.x.x 80 192.168.10.5 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 40455 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.95.5 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7672 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435464 ifc outside any ifc inside any rule-id 268435464 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435464: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435464: L5 RULE: allow-http-to-server&lt;BR /&gt;object-group service |acSvcg-268435464&lt;BR /&gt;service-object tcp source eq www destination eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7672 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source static public-ip server-ip service _|NatOrigSvc_c384fbb1-4eee-11ef-8c7b-8bb6b4c8733d _|NatMappedSvc_c384fbb1-4eee-11ef-8c7b-8bb6b4c8733d&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 119.93.x.x/80 to 192.168.10.5/80&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7672 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 7672 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 27435 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source static public-ip server-ip service _|NatOrigSvc_c384fbb1-4eee-11ef-8c7b-8bb6b4c8733d _|NatMappedSvc_c384fbb1-4eee-11ef-8c7b-8bb6b4c8733d&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 98578 ns&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed, Drop-location: frame 0x000055719d08fc89 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 04:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153841#M590977</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-31T04:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153866#M590979</link>
      <description>&lt;P&gt;Based on your diagram and the dynamic NAT config on the FTD, it looks like the public IP address is assigned to the ISP modem, and you're doing port forwarding there as well to make this chain work?&lt;/P&gt;
&lt;P&gt;If so, what is the port-forwarding setup in the ISP modem, is that public IP -&amp;gt; 192.168.10.5?&lt;BR /&gt;If so, assuming that the ISP modem has a route for 192.168.10.0/24 -&amp;gt; 192.168.1.8, the only NAT you would need on the FTD device would be a static NAT from 192.168.10.5 &amp;lt;-&amp;gt; 192.168.10.5 (since the dynamic NAT is going to cover everything else)&lt;/P&gt;
&lt;P&gt;If the ISP modem does not have a route for 192.168.10.0/24, the config on the FTD should be NAT from 192.168.10.5 -&amp;gt; 192.168.1.x, either the interface address or any other address on that network, and that address should then be represented in the port forwarding config in the ISP modem.&lt;/P&gt;
&lt;P&gt;Unless you can get the public IP (119.93.x.x) routed from the ISP modem and down to the FTD device. you would not be referencing the public IP on the FTD device.&lt;/P&gt;
&lt;P&gt;So if you can clarify this part of the setup it would help in seeing which config is needed for this to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 06:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153866#M590979</guid>
      <dc:creator>Jonatan Jonasson</dc:creator>
      <dc:date>2024-07-31T06:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153928#M590980</link>
      <description>&lt;P&gt;Hi Jonathan, yes the port forwarding that is setup on the ISP modem is this&lt;/P&gt;&lt;P&gt;Public: 119.93.x.x port 80&amp;nbsp; -&amp;gt; Private: 192.168.1.8 port 80 (Firewall Outside Interface IP)&amp;nbsp;&lt;/P&gt;&lt;P&gt;since the ISP modem does not have a route for 192.168.10.0/24&lt;/P&gt;&lt;P&gt;the problem I have is that when I ping from my server (192.168.10.5) to 192.168.1.8, it timed me out. I tried to create an inside,outside NAT for 192.168.10.5 -&amp;gt; 192.168.1.8 but the deployment failed it says that it overlaps with outside interface address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 09:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153928#M590980</guid>
      <dc:creator>Edgieace</dc:creator>
      <dc:date>2024-07-31T09:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Port Forward Struggle</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153961#M590981</link>
      <description>&lt;P&gt;friend&amp;nbsp;&lt;BR /&gt;FYI in your case the real IP of server 192.168.10.5&lt;BR /&gt;mapped IP of server is interface (only port 80 for server)&lt;BR /&gt;do below config it will work&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD NAT issue.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/225002iD4F11F7077CA66DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD NAT issue.png" alt="FTD NAT issue.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 10:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-1010-port-forward-struggle/m-p/5153961#M590981</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-31T10:13:32Z</dc:date>
    </item>
  </channel>
</rss>

