<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC/FTD NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4285544#M1078088</link>
    <description>&lt;P&gt;What is your end-goal with NATing the WLC to 16666/16667/ETHIP(97) ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you NATing the source or the destination IP?&lt;/P&gt;
&lt;P&gt;Are you trying to access the WLC over these ports or is it a requirement that the WLC connects to an external host with those ports as destination?&lt;/P&gt;</description>
    <pubDate>Wed, 03 Feb 2021 19:49:41 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2021-02-03T19:49:41Z</dc:date>
    <item>
      <title>FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4285530#M1078084</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Does anyone have any suggestions on why I am getting NAT failures on FTD I have configured a rule allowing WLC inside to outside on ports 16666/16667 and ETHIP(97)&amp;nbsp;&lt;/P&gt;&lt;P&gt;the WLC is part of a NAT rule Natting all rfc1918 to an address.???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 19:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4285530#M1078084</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-02-03T19:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4285544#M1078088</link>
      <description>&lt;P&gt;What is your end-goal with NATing the WLC to 16666/16667/ETHIP(97) ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you NATing the source or the destination IP?&lt;/P&gt;
&lt;P&gt;Are you trying to access the WLC over these ports or is it a requirement that the WLC connects to an external host with those ports as destination?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 19:49:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4285544#M1078088</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-03T19:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4287838#M1078240</link>
      <description>&lt;P&gt;Hi Marius&lt;/P&gt;&lt;P&gt;Im trying to bring a tunnel up between our WLC and a 3rd party WLC where an FTD sits in the middle, the NATing is there due to the WLC having a private address, so i have confiured the new member in the mobility group on the WLC but was getting xlate failed messages on FTD.??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 09:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4287838#M1078240</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-02-08T09:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4287934#M1078247</link>
      <description>Hi, from FTD CLISH share the output of show nat interface (source_inter)&lt;BR /&gt;det. ALso, make sure that in NAT config you don't use no-proxy or route&lt;BR /&gt;options.&lt;BR /&gt;&lt;BR /&gt;NAT should work as one-to-one for mobility. PAT won't work as you know.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Feb 2021 11:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4287934#M1078247</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-02-08T11:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4287943#M1078248</link>
      <description>&lt;P&gt;I would assume that this is bi-directional traffic, meaning the 3rd party WLC will also be initiating traffic towards your WLC.&amp;nbsp; If this is the case then I agree with Mohammed that you need a static 1to1 NAT for this connection. If you still get the error after the change, then please post the exact error message you are getting along with&amp;nbsp; a full running config (remember to remove any public IPs, usernames and passwords), and show nat output.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 12:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4287943#M1078248</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-08T12:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4288083#M1078261</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I thought that was the issue i will try later, one more thing can I use the same IP address for my static nat rule that is also being used in a pat rule.??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 15:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4288083#M1078261</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-02-08T15:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4288086#M1078264</link>
      <description>&lt;P&gt;Hi Marius&lt;/P&gt;&lt;P&gt;I thought that was the issue i will try later, one more thing can I use the same IP address for my static nat rule that is also being used in a pat rule.??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 15:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4288086#M1078264</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-02-08T15:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4288094#M1078268</link>
      <description>ASA used to allow it with warning but FTD/FMC won't accept it.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Feb 2021 16:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4288094#M1078268</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-02-08T16:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289256#M1078337</link>
      <description>&lt;P class="yiv1423850127MsoNormal"&gt;Hi&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;Ive got a bit further with this but getting an rpf drop can anyone advise why and where to troubleshoot this.??&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Phase: 14&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Subtype: rpf-check&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;nat (inside,outside) source static WLC-TEST NAT-WLC-to-NHSP-WLC destination static NHSP-WLC NHSP-WLC&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;out id=0xfe8c571a30, priority=6, domain=nat-reverse, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19, user_data=0xffa9818ba0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=x.x.x.x, mask=255.255.255.255, port=0, tag=any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=x.x.x.x, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=-outside, output_ifc=inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;output-interface: inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000000aab9cad0ec flow (nat-rpf-failed)/snp_sp_action_cb:1140&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 09:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289256#M1078337</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-02-10T09:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289258#M1078338</link>
      <description>&lt;P class="yiv1423850127MsoNormal"&gt;Hi&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;Ive got a bit further with this but getting an rpf drop can anyone advise why and where to troubleshoot this.??&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Phase: 14&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Subtype: rpf-check&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;nat (inside,outside) source static WLC-TEST NAT-WLC-to-NHSP-WLC destination static NHSP-WLC NHSP-WLC&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;out id=0xfe8c571a30, priority=6, domain=nat-reverse, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19, user_data=0xffa9818ba0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=x.x.x.x, mask=255.255.255.255, port=0, tag=any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=x.x.x.x, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=-outside, output_ifc=inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;output-interface: inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;SPAN&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1423850127MsoNormal"&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000000aab9cad0ec flow (nat-rpf-failed)/snp_sp_action_cb:1140&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 09:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289258#M1078338</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-02-10T09:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289268#M1078339</link>
      <description>&lt;P&gt;Often this message in packet-tracer is because the wrong use of source destination IPs in packet-tracer or wrong input interface.&amp;nbsp; Could you post the packet-tracer command you used as well as the objects used in the NAT statement...If there are public IPs please x out the first 3 octets.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 09:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289268#M1078339</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-10T09:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289331#M1078343</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&lt;SPAN&gt;&amp;gt; packet-tracer input outside udp 10.138.192.65 16666 192.168.2.200 16666 detailed&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&lt;SPAN&gt;nat (inside,outside) source static WLC-TEST NAT-WLC-to-NHSP-WLC destination static NHSP-WLC NHSP-WLC&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&lt;SPAN&gt;3rd party NAT address&amp;nbsp;&lt;STRONG&gt;10.138.192.65&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;our internal WLC address&amp;nbsp;&lt;STRONG&gt;192.168.2.200&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&lt;SPAN&gt;The NAT address is &lt;STRONG&gt;10.157.228.45&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="yiv1193518145MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 12:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4289331#M1078343</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-02-10T12:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4290391#M1078421</link>
      <description>&lt;P&gt;since you are NATing your internal IP then your packet-tracer from the outside towards the inside should specify your NAT IP&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;gt; packet-tracer input outside udp 10.138.192.65 16666 10.157.228.45 16666 detailed&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 21:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-nat/m-p/4290391#M1078421</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-11T21:12:05Z</dc:date>
    </item>
  </channel>
</rss>

