<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FirePower publish internal webserver in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3899094#M1005947</link>
    <description>&lt;P&gt;Hi Roy Lee,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you share the Nat configuration you have done on FTD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jul 2019 08:46:21 GMT</pubDate>
    <dc:creator>Netplace Support</dc:creator>
    <dc:date>2019-07-29T08:46:21Z</dc:date>
    <item>
      <title>FirePower publish internal webserver</title>
      <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3672845#M1005644</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I am new to FirePower, and now migrating ASA 5520 to FirePower 2110 (FTD 6.2.2).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have finished initial setup of FirePower 2110 by FirePower Device Manager (FDM), specified the outside interface with 113.x.x.2/24, inside interface with 192.168.1.2&amp;nbsp;for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have 64 public IP addresses.&lt;/P&gt;
&lt;P&gt;I am going to publish internal webserver to internet by FDM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Followed the cisco document to create &lt;STRONG&gt;Providing Access to an Inside Web Server (Static Auto NAT).&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font: 400 21px/26.25px CiscoSans, Arial, sans-serif; text-align: left; color: rgb(57, 57, 59); text-transform: none; text-indent: 0px; letter-spacing: normal; text-decoration: none; word-spacing: 0px; float: none; display: inline !important; white-space: normal; -ms-word-wrap: break-word; orphans: 2; font-size-adjust: none; font-stretch: normal; background-color: transparent; -webkit-text-stroke-width: 0px;"&gt;&lt;FONT face="Arial"&gt;&lt;FONT size="3"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/fdm/fptd-fdm-config-guide-622/fptd-fdm-nat.html#task_3FA99245557D4DA4860FE90BCEF771A1" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/622/fdm/fptd-fdm-config-guide-622/fptd-fdm-nat.html#task_3FA99245557D4DA4860FE90BCEF771A1&lt;/A&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font: 400 21px/26.25px CiscoSans, Arial, sans-serif; text-align: left; color: rgb(57, 57, 59); text-transform: none; text-indent: 0px; letter-spacing: normal; text-decoration: none; word-spacing: 0px; float: none; display: inline !important; white-space: normal; -ms-word-wrap: break-word; orphans: 2; font-size-adjust: none; font-stretch: normal; background-color: transparent; -webkit-text-stroke-width: 0px;"&gt;&lt;FONT face="Arial"&gt;&lt;FONT size="3"&gt;&lt;SPAN style="font: 400 21px/26.25px CiscoSans, Arial, sans-serif; text-align: left; color: rgb(57, 57, 59); text-transform: none; text-indent: 0px; letter-spacing: normal; text-decoration: none; word-spacing: 0px; float: none; display: inline !important; white-space: normal; -ms-word-wrap: break-word; orphans: 2; font-size-adjust: none; font-stretch: normal; background-color: transparent; -webkit-text-stroke-width: 0px;"&gt;&lt;FONT face="Arial"&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT.JPG" style="width: 802px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/15005i0AB87F655F1FADDA/image-size/large?v=v2&amp;amp;px=999" role="button" title="NAT.JPG" alt="NAT.JPG" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Where HKCitrixIT01Internal is the internal address 192.168.1.5 for example. And HKCitrixIT01Ext is the public address 113.x.x.5 for example.&lt;/P&gt;
&lt;P&gt;I can't find reference about the Access Control rule for the web server publishing, so simply create a Access Control rule to allow any service.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/15006iDE0D6B60BFAF84FF/image-size/large?v=v2&amp;amp;px=999" role="button" title="ACL.JPG" alt="ACL.JPG" /&gt;&lt;/span&gt;However it's failed.&lt;/P&gt;
&lt;P&gt;I can ping the outside interface publish IP 113.x.x.2 from internet, but&amp;nbsp;ping to the 113.x.x.5 is failed.&lt;/P&gt;
&lt;P&gt;And I check the Policies hit from Monitoring page, hit is zero .....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advise?&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;Notmen&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3672845#M1005644</guid>
      <dc:creator>Roy Lee</dc:creator>
      <dc:date>2019-03-12T13:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower publish internal webserver</title>
      <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3673763#M1005648</link>
      <description>&lt;P&gt;Change the Access rule destination network to&amp;nbsp;&lt;SPAN&gt;HKCitrixIT01Internal. The Firepower (and ASA) Access rules should reference the internal server ip address.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdm-access.html#ID-2124-00000055" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdm-access.html#ID-2124-00000055&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Access rules always use the real IP addresses when determining an access rule match, even if you configure NAT. For example, if you configure NAT for an inside server, 10.1.1.5, so that it has a publicly routable IP address on the outside, 209.165.201.5, then the access rule to allow the outside traffic to access the inside server needs to reference the server’s real IP address (10.1.1.5), and not the mapped address (209.165.201.5).&lt;/PRE&gt;</description>
      <pubDate>Tue, 24 Jul 2018 23:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3673763#M1005648</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-07-24T23:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower publish internal webserver</title>
      <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3673999#M1005942</link>
      <description>&lt;P&gt;Dear Rahul,&lt;/P&gt;
&lt;P&gt;Tried the destination network to HKCitrixIT01Internal but no luck.&lt;/P&gt;
&lt;P&gt;Also changed the destination zone to inside_zone, no luck.&lt;/P&gt;
&lt;P&gt;The Policy hit still keep zero. Seems no packet arrive the outside interface?&lt;BR /&gt;Is ping allowed by default? I can ping the outside internet IP 113.x.x.2 only.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Notmen&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 08:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3673999#M1005942</guid>
      <dc:creator>Roy Lee</dc:creator>
      <dc:date>2018-07-25T08:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower publish internal webserver</title>
      <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3674403#M1005943</link>
      <description>&lt;P&gt;Hello Roy,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I ran into a similar issue when I was first using FDM.&amp;nbsp;I think the&amp;nbsp;issue that I ran into is that if you accept the default NAT policies configured when you first load FDM, the (any,outside) PAT statement&amp;nbsp;has precedence over the&amp;nbsp;other policies.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2018-07-25 08.52.47.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/15272iABA0F872C1577AC9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2018-07-25 08.52.47.png" alt="Screenshot 2018-07-25 08.52.47.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Edit this policy and change the source interface to inside (Or whatever the nameif of your segment is).&lt;/P&gt;
&lt;P&gt;Try a packet tracer to&amp;nbsp;your internal server from an internet address before and after your change and you should see a change in the behavior of your NAT processing in the packet-tracer output.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2018-07-25 08.57.07.png" style="width: 958px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/15274i8CA855E97E69340F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2018-07-25 08.57.07.png" alt="Screenshot 2018-07-25 08.57.07.png" /&gt;&lt;/span&gt;Hope that helps!&lt;/P&gt;
&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 14:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3674403#M1005943</guid>
      <dc:creator>aaron.hackney</dc:creator>
      <dc:date>2018-07-25T14:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower publish internal webserver</title>
      <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3674919#M1005945</link>
      <description>&lt;P&gt;Dear Aaron,&lt;/P&gt;
&lt;P&gt;Thank You very much!! You save my days!&lt;/P&gt;
&lt;P&gt;It should be very helpful for other newbies to FirePower device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW, your FDM interface is more advanced to mine. What is your FTD version?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 00:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3674919#M1005945</guid>
      <dc:creator>Roy Lee</dc:creator>
      <dc:date>2018-07-26T00:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower publish internal webserver</title>
      <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3675369#M1005946</link>
      <description>&lt;P&gt;Whoops, sorry I think that screen shot was from the 6.3 beta.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 13:39:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3675369#M1005946</guid>
      <dc:creator>aaron.hackney</dc:creator>
      <dc:date>2018-07-26T13:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: FirePower publish internal webserver</title>
      <link>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3899094#M1005947</link>
      <description>&lt;P&gt;Hi Roy Lee,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you share the Nat configuration you have done on FTD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 08:46:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-publish-internal-webserver/m-p/3899094#M1005947</guid>
      <dc:creator>Netplace Support</dc:creator>
      <dc:date>2019-07-29T08:46:21Z</dc:date>
    </item>
  </channel>
</rss>

