<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 1140 not passing traffic to internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4511209#M1085479</link>
    <description>&lt;P&gt;No I have not resolved this issue I have a rule from inside to outside using the zones not working for the vlans. The only static route I could create is listed below everything else gives me the error message also listed bellow. If the FP knows the route exist I don't understand why its not passing the traffic.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="inside out rule.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138329i4050F3E0190EC6CB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="inside out rule.JPG" alt="inside out rule.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Static route.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138330iE41670C845F02395/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Static route.JPG" alt="Static route.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="error.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138331iBE7A2E74B09FA519/image-size/medium?v=v2&amp;amp;px=400" role="button" title="error.JPG" alt="error.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Wed, 01 Dec 2021 14:21:10 GMT</pubDate>
    <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
    <dc:date>2021-12-01T14:21:10Z</dc:date>
    <item>
      <title>Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510243#M1085458</link>
      <description>&lt;P&gt;I am a problem with my Firepower 1140 using only the FDM. I am new to Firepower devices, I have static routes from my switch to the Firepower can ping both end points from the devices. But my switch cannot get to the internet I tried an auto NAT rule using my inside address to the outside port but did not work. See bellow for some config information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco 9300 Switch&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.2.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S* 0.0.0.0/0 [1/0] via 192.168.2.1&lt;BR /&gt;20.0.0.0/8 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 20.20.20.0/24 is directly connected, Loopback1&lt;BR /&gt;L 20.20.20.20/32 is directly connected, Loopback1&lt;BR /&gt;192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.1.0/24 is directly connected, Vlan1&lt;BR /&gt;L 192.168.1.22/32 is directly connected, Vlan1&lt;BR /&gt;192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.2.0/24 is directly connected, GigabitEthernet1/0/4&lt;BR /&gt;L 192.168.2.2/32 is directly connected, GigabitEthernet1/0/4&lt;BR /&gt;192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.10.0/24 is directly connected, Vlan10&lt;BR /&gt;L 192.168.10.2/32 is directly connected, Vlan10&lt;BR /&gt;192.168.40.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.40.0/24 is directly connected, Vlan40&lt;BR /&gt;L 192.168.40.2/32 is directly connected, Vlan40&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FirePower 1140&lt;/P&gt;&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via X.X.174.153, outside&lt;BR /&gt;C X.X.174.152 255.255.255.248 is directly connected, outside&lt;/P&gt;&lt;P&gt;L X.X.174.154 255.255.255.255 is directly connected, outside&lt;BR /&gt;C 192.168.1.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;L 192.168.1.1 255.255.255.255 is directly connected, inside&lt;BR /&gt;C 192.168.2.0 255.255.255.0 is directly connected, inside2&lt;BR /&gt;L 192.168.2.1 255.255.255.255 is directly connected, inside2&lt;BR /&gt;C 192.168.10.0 255.255.255.0 is directly connected, vlan10&lt;BR /&gt;L 192.168.10.3 255.255.255.255 is directly connected, vlan10&lt;BR /&gt;C 192.168.40.0 255.255.255.0 is directly connected, vlan40&lt;BR /&gt;L 192.168.40.3 255.255.255.255 is directly connected, vlan40&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface Ethernet1/1 "outside", is up, line protocol is up&lt;BR /&gt;Hardware is EtherSVI, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;MAC address e069.ba02.bf24, MTU 1500&lt;BR /&gt;IP address X.X.174.154, subnet mask 255.255.255.248&lt;BR /&gt;Traffic Statistics for "outside":&lt;BR /&gt;13648294 packets input, 14779630428 bytes&lt;BR /&gt;8109453 packets output, 1093238895 bytes&lt;BR /&gt;551909 packets dropped&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Interface Ethernet1/4 "inside2", is up, line protocol is up&lt;BR /&gt;Hardware is EtherSVI, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;MAC address e069.ba02.bf27, MTU 1500&lt;BR /&gt;IP address 192.168.2.1, subnet mask 255.255.255.0&lt;BR /&gt;Traffic Statistics for "inside2":&lt;BR /&gt;1051147 packets input, 52419537 bytes&lt;BR /&gt;912 packets output, 56983 bytes&lt;BR /&gt;315608 packets dropped&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (nlp_int_tap) to (inside) source static nlp_server_0_http_intf9 interface service tcp https https&lt;BR /&gt;translate_hits = 0, untranslate_hits = 22746&lt;BR /&gt;2 (nlp_int_tap) to (inside) source static nlp_server_0_ssh_intf9 interface service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 3&lt;BR /&gt;3 (nlp_int_tap) to (inside) source static nlp_server_0_ssh_ipv6_intf9 interface ipv6 service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;7 (nlp_int_tap) to (diagnostic) source dynamic nlp_client_0_intf2 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;8 (nlp_int_tap) to (outside) source dynamic nlp_client_0_intf3 interface&lt;BR /&gt;translate_hits = 105808, untranslate_hits = 749&lt;BR /&gt;9 (nlp_int_tap) to (outside_main) source dynamic nlp_client_0_intf4 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;10 (nlp_int_tap) to (inside2) source dynamic nlp_client_0_intf5 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;14 (nlp_int_tap) to (inside) source dynamic nlp_client_0_intf9 interface&lt;BR /&gt;translate_hits = 295, untranslate_hits = 0&lt;BR /&gt;15 (inside2) to (outside) source dynamic CorwSW interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 23:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510243#M1085458</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2021-11-29T23:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510381#M1085461</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; hard to tell, run packet-tracer from the CLI and provide the output for review. Example:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;packet-tracer input inside2 tcp &amp;lt;inside2 src ip&amp;gt; 3000 &amp;lt;8.8.8.8&amp;gt; 80&lt;/PRE&gt;
&lt;P&gt;Do you have an ACP rule configured to permit at least dns, http and https outbound from the inside2 networks?&lt;/P&gt;
&lt;P&gt;Provide the output of "show nat detail".&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 07:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510381#M1085461</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-11-30T07:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510650#M1085464</link>
      <description>&lt;P&gt;&lt;BR /&gt;So it looks like something is blocking the next hop from core switch the only denied rules are for geo locations and outbound defaults for threat URL's and applications we don't want used. Not sure were another rule would be blocking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inside2 is part of the inside zone, bellow I have also attached an overview of the current AC rules.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Port on FP as next hop from core&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;CLI Console&lt;BR /&gt;&amp;gt; packet-tracer input inside2 tcp 192.168.2.1 3000 8.8.8.8 80&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop X.X.174.153 using egress ifc outside(vrfid:0)&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside2(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005576e034f2b0 flow (NA)/NA&lt;BR /&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To static port on core switch side&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input inside2 tcp 192.168.2.2 3000 8.8.8.8 80&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop X.X.174.153 using egress ifc outside(vrfid:0)&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435468 ifc inside2 any ifc outside any rule-id 268435468 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435468: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435468: L7 RULE: Block_Outbound&lt;BR /&gt;object-group service |acSvcg-268435468&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 409335, packet dispatched to next module&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Firewall: starting AC rule matching, zone 1 -&amp;gt; 2, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 184, icmpCode 80&lt;BR /&gt;Packet: TCP, SYN, seq 1602900594&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: starting AC rule matching, zone 1 -&amp;gt; 2, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;Firewall: pending rule-matching, id 268435468, pending AppID&lt;BR /&gt;Snort id 5, NAP id 3, IPS id 0, Verdict PASS&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop X.X.174.153 using egress ifc outside(vrfid:0)&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop X.X.174.153 on interface outside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address X.X.d1cb hits 2 reference 13&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside2(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To Core Switch&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;CLI Console&lt;BR /&gt;&amp;gt; packet-tracer input inside2 tcp 192.168.1.22 3000 8.8.8.8 80&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop X.X.174.153 using egress ifc outside(vrfid:0)&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435468 ifc inside2 any ifc outside any rule-id 268435468 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435468: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435468: L7 RULE: Block_Outbound&lt;BR /&gt;object-group service |acSvcg-268435468&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network CorwSW&lt;BR /&gt;nat (inside2,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.22/3000 to X.X.174.154/3000&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 409244, packet dispatched to next module&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Firewall: starting AC rule matching, zone 1 -&amp;gt; 2, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 184, icmpCode 80&lt;BR /&gt;Packet: TCP, SYN, seq 1119678248&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: starting AC rule matching, zone 1 -&amp;gt; 2, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;Firewall: pending rule-matching, id 268435468, pending AppID&lt;BR /&gt;Snort id 3, NAP id 3, IPS id 0, Verdict PASS&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop X.X.174.153 using egress ifc outside(vrfid:0)&lt;BR /&gt;Phase: 12&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop X.X.174.153 on interface outside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address X.X.d1cb hits 0 reference 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AC rules.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138268iC101F7D09B43855F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AC rules.JPG" alt="AC rules.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 16:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510650#M1085464</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2021-11-30T16:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510657#M1085465</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; I don't see you permitting outbound DNS in any of those rules (from inside to outside), are there other rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If DNS is not the issue, can you run "system support firewall-engine-debug" filter on the source IP address and generate some consistent traffic. Provide a screenshot of the output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FYI, I don't think your first rule "Block_Outbound" will do what you intend. It will match application &lt;U&gt;and&lt;/U&gt; URL, not application or URL. Not sure if that was your intention?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 16:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510657#M1085465</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-11-30T16:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510731#M1085467</link>
      <description>&lt;P&gt;So I have main traffic flowing now I didn't have a route from FP to inside network. But all traffic seems to be flowing both directions now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only issue now is getting my Vlans to route out. Will these need there own rules for routing out of the FP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 19:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510731#M1085467</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2021-11-30T19:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510753#M1085470</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; you can either create network objects for those networks (vlans) and add the objects to the ACP rules to permit the traffic. Alternatively just use the "inside_zone" in the ACP rules, as long as the interface is a member of the "inside_zone" security zone the traffic will be permitted, obviously the FTD will need to have routes to those internal VLANs.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 19:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4510753#M1085470</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-11-30T19:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4511209#M1085479</link>
      <description>&lt;P&gt;No I have not resolved this issue I have a rule from inside to outside using the zones not working for the vlans. The only static route I could create is listed below everything else gives me the error message also listed bellow. If the FP knows the route exist I don't understand why its not passing the traffic.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="inside out rule.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138329i4050F3E0190EC6CB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="inside out rule.JPG" alt="inside out rule.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Static route.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138330iE41670C845F02395/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Static route.JPG" alt="Static route.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="error.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138331iBE7A2E74B09FA519/image-size/medium?v=v2&amp;amp;px=400" role="button" title="error.JPG" alt="error.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 14:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4511209#M1085479</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2021-12-01T14:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4511214#M1085480</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; those routes are incorrect, why are you routing all traffic (0.0.0.0/0) via the inside interface? You initial configuration above had the default route via the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your configuration also indicates that the VLANs are directly connected to the firewall, so therefore no statics should be required. Are you trunking the VLANs between the switch and the FTD? Is the default gateway for the clients the FTD?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Dec 2021 14:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4511214#M1085480</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-12-01T14:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512163#M1085501</link>
      <description>&lt;P&gt;I have attached full clips of the rules to everything can be seen I added the inside rule yesterday in an attempt to route traffic inside has not been working.&lt;/P&gt;&lt;P&gt;GigabitEthernet1/0/3&amp;nbsp; 192.168.2.2 /24&amp;nbsp; &amp;nbsp;is static port on Core switch&lt;/P&gt;&lt;P&gt;E 1/4&amp;nbsp; &amp;nbsp;192.168.2.1 /24&amp;nbsp; &amp;nbsp; port on FP device&amp;nbsp; part of&amp;nbsp; inside zone&lt;/P&gt;&lt;P&gt;E1/1 &amp;amp; 1/3 are ISP connections&amp;nbsp; &amp;nbsp;in Outside Zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a route that is static from core to the FP port I can ping it From Core cannot reach past it normal traffic or VLAN.&lt;/P&gt;&lt;P&gt;FP device can reach all devices on inside network threw core switch.&amp;nbsp; I have configured access rules and NAT that I feel should allow traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am just missing something small but not sure what it is at this point......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="routes.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138469iCD33AF1DCDFA8B47/image-size/medium?v=v2&amp;amp;px=400" role="button" title="routes.JPG" alt="routes.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138470i81002717CF383689/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ACL.JPG" alt="ACL.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Core 2 FP.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138474i6A256E3C40DA2E39/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Core 2 FP.JPG" alt="Core 2 FP.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138472i6E6E406CD995C620/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NAT.JPG" alt="NAT.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ping FP.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/138473i41DA53DC128C4338/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ping FP.JPG" alt="ping FP.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 20:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512163#M1085501</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2021-12-02T20:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512175#M1085502</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; this information contradicts the information in your first post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gateway of last resort is &lt;STRONG&gt;192.168.2.1 to network 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;S* 0.0.0.0/0 [1/0] via 192.168.2.1&lt;BR /&gt;C 192.168.2.0/24 is directly connected, GigabitEthernet1/0/4&lt;BR /&gt;&lt;STRONG&gt;L 192.168.2.2/32 is directly connected, GigabitEthernet1/0/4&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FirePower 1140&lt;/P&gt;
&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via X.X.174.153, outside&lt;BR /&gt;C X.X.174.152 255.255.255.248 is directly connected, outside&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;C 192.168.2.0 255.255.255.0 is directly connected, inside2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;L 192.168.2.1 255.255.255.255 is directly connected, inside2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your default route on the switch is via 192.168.&lt;STRONG&gt;2&lt;/STRONG&gt;.1 which is interface &lt;STRONG&gt;inside2&lt;/STRONG&gt; on the FTD. Your Auto NAT rule is for &lt;STRONG&gt;inside&lt;/STRONG&gt; not &lt;STRONG&gt;inside2&lt;/STRONG&gt;. Create another Auto NAT rule for &lt;STRONG&gt;inside2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that doesn't work run packet-tracer - &lt;STRONG&gt;packet-tracer inside2 input icmp 192.168.2.2 8 0 8.8.8.8&lt;/STRONG&gt; and provide the output.&lt;/P&gt;
&lt;P&gt;Provide "show run", "show route" and "show nat detail" from the FTD and "show run" and "show ip route" from the switch.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 20:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512175#M1085502</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-12-02T20:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512261#M1085503</link>
      <description>&lt;P&gt;So that worked cant believe I over looked that. So now only thing not transmitting is the vlans, I have the gateway set on L3 Switch that is now routing traffic out of the FP. DO you set an IP on sub-interface on the FP? or just make the port aware of vlan like I have now? I have attached what should be all the useful information&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;hostname WH01-C93K-1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vrf definition Mgmt-vrf&lt;BR /&gt;!&lt;BR /&gt;address-family ipv4&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;address-family ipv6&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone CST -4 0&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;switch 1 provision c9300-48p&lt;BR /&gt;switch 2 provision c9300-48p&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip routing&lt;BR /&gt;!&lt;BR /&gt;ip host et-svr-01 192.168.1.238&lt;BR /&gt;ip name-server 192.168.1.238&lt;BR /&gt;ip domain name etech.local&lt;BR /&gt;ip dhcp relay information option&lt;BR /&gt;ip dhcp relay information policy keep&lt;BR /&gt;ip dhcp relay information trust-all&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;login on-success log&lt;BR /&gt;ipv6 unicast-routing&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vtp domain xxxxxxxxxxx.com&lt;BR /&gt;vtp mode off&lt;BR /&gt;no device-tracking logging theft&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode rapid-pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;transceiver type all&lt;BR /&gt;monitoring&lt;BR /&gt;!&lt;BR /&gt;vlan 10,20,30,40,50,60,70,80,90,100,120,150&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Loopback1&lt;BR /&gt;ip address 20.20.20.20 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;vrf forwarding Mgmt-vrf&lt;BR /&gt;ip address x.x.x.x x.x.x.x&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;description Truck to FP 1.1&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;ip dhcp relay information trusted&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;description Truck to WH01-A92K-1&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;ip dhcp relay information trusted&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;description Routing port to FP&lt;BR /&gt;no switchport&lt;BR /&gt;ip dhcp relay information trusted&lt;BR /&gt;ip address 192.168.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;ip dhcp relay information trusted&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/13&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/14&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport mode access&lt;BR /&gt;ip dhcp relay information trusted&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt;switchport access vlan 30&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;ip address 192.168.1.22 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;description Maintenance&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;ip helper-address 192.168.1.238&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;description Marketing - Media&lt;BR /&gt;ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;ip helper-address 192.168.1.238&lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;description Sales Floor&lt;BR /&gt;ip address 192.168.30.1 255.255.255.0&lt;BR /&gt;ip helper-address 192.168.1.238&lt;BR /&gt;!&lt;BR /&gt;router rip&lt;BR /&gt;version 2&lt;BR /&gt;network 192.168.0.0&lt;BR /&gt;no auto-summary&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.2.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list standard 10&lt;BR /&gt;10 permit 192.168.2.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;service-policy input system-cpp-policy&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Gateway of last resort is 192.168.2.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S* 0.0.0.0/0 [1/0] via 192.168.2.1&lt;BR /&gt;20.0.0.0/8 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 20.20.20.0/24 is directly connected, Loopback1&lt;BR /&gt;L 20.20.20.20/32 is directly connected, Loopback1&lt;BR /&gt;192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.1.0/24 is directly connected, Vlan1&lt;BR /&gt;L 192.168.1.22/32 is directly connected, Vlan1&lt;BR /&gt;192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.2.0/24 is directly connected, GigabitEthernet1/0/3&lt;BR /&gt;L 192.168.2.2/32 is directly connected, GigabitEthernet1/0/3&lt;BR /&gt;192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.10.0/24 is directly connected, Vlan10&lt;BR /&gt;L 192.168.10.1/32 is directly connected, Vlan10&lt;BR /&gt;192.168.20.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.20.0/24 is directly connected, Vlan20&lt;BR /&gt;L 192.168.20.1/32 is directly connected, Vlan20&lt;BR /&gt;192.168.30.0/24 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C 192.168.30.0/24 is directly connected, Vlan30&lt;BR /&gt;L 192.168.30.1/32 is directly connected, Vlan30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;####################################################################&lt;BR /&gt;#######################################################################&lt;/P&gt;&lt;P&gt;FP Device&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt; show nat detail&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside2) to (outside) source static Internal_Apache_Vendor_Web_Server interface service _|NatOrigSvc_18c7d892-4172-11ec-ae7f-41e287ee508d _|NatMappedSvc_18c7d892-4172-11ec-ae7f-41e287ee508d&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 192.168.1.248/32, Translated: X.X.174.154/29&lt;BR /&gt;Service - Origin: tcp source eq 9090 , Translated: tcp source eq 9090&lt;BR /&gt;2 (inside2) to (outside) source static Internal_Apache_Vendor_Web_Server interface service _|NatOrigSvc_dc093aef-4311-11ec-afdb-0d6b9a1be6b3 _|NatMappedSvc_dc093aef-4311-11ec-afdb-0d6b9a1be6b3&lt;BR /&gt;translate_hits = 2, untranslate_hits = 2&lt;BR /&gt;Source - Origin: 192.168.1.248/32, Translated: X.X.174.154/29&lt;BR /&gt;Service - Origin: tcp source eq www , Translated: tcp source eq www&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (nlp_int_tap) to (inside) source static nlp_server_0_http_intf8 interface service tcp https https&lt;BR /&gt;translate_hits = 0, untranslate_hits = 596&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 192.168.1.1/24&lt;BR /&gt;Service - Protocol: tcp Real: https Mapped: https&lt;BR /&gt;2 (nlp_int_tap) to (inside) source static nlp_server_0_ssh_intf8 interface service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 192.168.1.1/24&lt;BR /&gt;Service - Protocol: tcp Real: ssh Mapped: ssh&lt;BR /&gt;3 (nlp_int_tap) to (inside) source static nlp_server_0_ssh_ipv6_intf8 interface ipv6 service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;Service - Protocol: tcp Real: ssh Mapped: ssh&lt;BR /&gt;4 (outside) to (inside2) source dynamic OutsideIPv4Gateway interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: X.X.174.153/32, Translated: 192.168.2.1/24&lt;BR /&gt;5 (nlp_int_tap) to (vlan20) source dynamic nlp_client_0_intf10 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;6 (nlp_int_tap) to (vlan30) source dynamic nlp_client_0_intf11 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;7 (nlp_int_tap) to (vlan1) source dynamic nlp_client_0_intf12 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;8 (nlp_int_tap) to (diagnostic) source dynamic nlp_client_0_intf2 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;9 (nlp_int_tap) to (outside_main) source dynamic nlp_client_0_intf3 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: X.X.88.125/24&lt;BR /&gt;10 (nlp_int_tap) to (outside) source dynamic nlp_client_0_intf4 interface&lt;BR /&gt;translate_hits = 576, untranslate_hits = 3&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: X.X.174.154/29&lt;BR /&gt;11 (nlp_int_tap) to (brdg2) source dynamic nlp_client_0_intf5 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;12 (nlp_int_tap) to (brdg1) source dynamic nlp_client_0_intf6 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;13 (nlp_int_tap) to (inside2) source dynamic nlp_client_0_intf7 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 192.168.2.1/24&lt;BR /&gt;14 (nlp_int_tap) to (inside) source dynamic nlp_client_0_intf8 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 192.168.1.1/24&lt;BR /&gt;15 (nlp_int_tap) to (vlan10) source dynamic nlp_client_0_intf9 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;16 (inside2) to (outside) source dynamic any-ipv4 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 0.0.0.0/0, Translated: X.X.174.154/29&lt;BR /&gt;17 (nlp_int_tap) to (vlan20) source dynamic nlp_client_0_ipv6_intf10 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;18 (nlp_int_tap) to (vlan30) source dynamic nlp_client_0_ipv6_intf11 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;19 (nlp_int_tap) to (vlan1) source dynamic nlp_client_0_ipv6_intf12 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;20 (nlp_int_tap) to (diagnostic) source dynamic nlp_client_0_ipv6_intf2 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;21 (nlp_int_tap) to (outside_main) source dynamic nlp_client_0_ipv6_intf3 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;22 (nlp_int_tap) to (outside) source dynamic nlp_client_0_ipv6_intf4 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;23 (nlp_int_tap) to (brdg2) source dynamic nlp_client_0_ipv6_intf5 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;24 (nlp_int_tap) to (brdg1) source dynamic nlp_client_0_ipv6_intf6 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;25 (nlp_int_tap) to (inside2) source dynamic nlp_client_0_ipv6_intf7 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;26 (nlp_int_tap) to (inside) source dynamic nlp_client_0_ipv6_intf8 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;27 (nlp_int_tap) to (vlan10) source dynamic nlp_client_0_ipv6_intf9 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gateway of last resort is X.X.174.153 to network 0.0.0.0&lt;BR /&gt;S* 0.0.0.0 0.0.0.0 [1/0] via X.X.174.153, outside&lt;BR /&gt;C X.X.174.152 255.255.255.248 is directly connected, outside&lt;BR /&gt;L X.X.174.154 255.255.255.255 is directly connected, outside&lt;BR /&gt;C 192.168.2.0 255.255.255.0 is directly connected, inside2&lt;BR /&gt;L 192.168.2.1 255.255.255.255 is directly connected, inside2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;NGFW Version 6.6.1&lt;BR /&gt;!&lt;BR /&gt;vrf to10group&lt;BR /&gt;vrf Vlan10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.174.154 255.255.255.248&lt;BR /&gt;ospf cost 20&lt;BR /&gt;ospf authentication null&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;vrf forwarding Vlan10&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;nameif outside_main&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.88.125 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4&lt;BR /&gt;nameif inside2&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ospf cost 65&lt;BR /&gt;ospf authentication null&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4.1&lt;BR /&gt;vlan 1&lt;BR /&gt;nameif vlan1&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4.10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif vlan10&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif vlan20&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4.30&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif vlan30&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif diagnostic&lt;BR /&gt;cts manual&lt;BR /&gt;propagate sgt preserve-untag&lt;BR /&gt;policy static sgt disabled trusted&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;ngips conn-match vlan-id&lt;BR /&gt;dns domain-lookup outside_main&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside2&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group CiscoUmbrellaDNSServerGroup&lt;BR /&gt;name-server 208.67.222.222&lt;BR /&gt;name-server 208.67.220.220&lt;BR /&gt;dns-group CiscoUmbrellaDNSServerGroup&lt;BR /&gt;object network any-ipv4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network any-ipv6&lt;BR /&gt;subnet ::/0&lt;BR /&gt;object network OutsideIPv4DefaultRoute&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network XXXXXXXX_Inside&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network BDC_Gateway&lt;BR /&gt;host X.X.X.38&lt;BR /&gt;object network BDC_Inside_Network&lt;BR /&gt;subnet X.X.0.0 255.255.255.0&lt;BR /&gt;object network BDC_Server&lt;BR /&gt;host X.X.0.X&lt;BR /&gt;object network Fonality_Server&lt;BR /&gt;host 192.168.1.251&lt;BR /&gt;object network OutsideIPv4Gateway&lt;BR /&gt;host X.X.174.153&lt;BR /&gt;object network Outside_Main_Gateway&lt;BR /&gt;host X.X.88.1&lt;BR /&gt;object network ET-SVR-01&lt;BR /&gt;host 192.168.1.238&lt;BR /&gt;object network Prelude&lt;BR /&gt;host 192.168.1.228&lt;BR /&gt;object network Internal_Apache_Vendor_Web_Server&lt;BR /&gt;host 192.168.1.248&lt;BR /&gt;object network 10group&lt;BR /&gt;subnet 10.10.1.0 255.255.255.0&lt;BR /&gt;object network 10netgateway&lt;BR /&gt;host 10.10.1.1&lt;BR /&gt;object network CorwSW&lt;BR /&gt;host 192.168.1.22&lt;BR /&gt;object network 21_network&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network 22Gateway&lt;BR /&gt;host 192.168.1.22&lt;BR /&gt;object service _|NatOrigSvc_18c7d892-4172-11ec-ae7f-41e287ee508d&lt;BR /&gt;service tcp source eq 9090&lt;BR /&gt;object service _|NatMappedSvc_18c7d892-4172-11ec-ae7f-41e287ee508d&lt;BR /&gt;service tcp source eq 9090&lt;BR /&gt;object service _|NatOrigSvc_dc093aef-4311-11ec-afdb-0d6b9a1be6b3&lt;BR /&gt;service tcp source eq www&lt;BR /&gt;object service _|NatMappedSvc_dc093aef-4311-11ec-afdb-0d6b9a1be6b3&lt;BR /&gt;service tcp source eq www&lt;BR /&gt;object-group service |acSvcg-268435457&lt;BR /&gt;service-object ip&lt;BR /&gt;object-group service |acSvcg-268435462&lt;BR /&gt;service-object ip&lt;BR /&gt;object-group service |acSvcg-268435471&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;object-group service |acSvcg-268435470&lt;BR /&gt;service-object tcp destination eq 9090&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L7 RULE: Inside_Outside_Rule&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435457 ifc inside object any-ipv4 ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435457 ifc inside object any-ipv4 ifc outside_main any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435457 ifc inside2 object any-ipv4 ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435457 ifc inside2 object any-ipv4 ifc outside_main any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435462: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435462: L7 RULE: Outside to Inside&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435462 ifc outside object any-ipv4 ifc inside any rule-id 268435462 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435462 ifc outside object any-ipv4 ifc inside2 any rule-id 268435462 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435462 ifc outside_main object any-ipv4 ifc inside any rule-id 268435462 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435462 ifc outside_main object any-ipv4 ifc inside2 any rule-id 268435462 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435471: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435471: L7 RULE: Vendor_Portal_http&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435471 ifc outside object any-ipv4 ifc inside object Internal_Apache_Vendor_Web_Server rule-id 268435471 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435471 ifc outside object any-ipv4 ifc inside2 object Internal_Apache_Vendor_Web_Server rule-id 268435471 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435471 ifc outside_main object any-ipv4 ifc inside object Internal_Apache_Vendor_Web_Server rule-id 268435471 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435471 ifc outside_main object any-ipv4 ifc inside2 object Internal_Apache_Vendor_Web_Server rule-id 268435471 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435470: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435470: L7 RULE: Vendor_Portal_2_Inside&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435470 ifc outside object any-ipv4 ifc inside object Internal_Apache_Vendor_Web_Server rule-id 268435470 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435470 ifc outside object any-ipv4 ifc inside2 object Internal_Apache_Vendor_Web_Server rule-id 268435470 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435470 ifc outside_main object any-ipv4 ifc inside object Internal_Apache_Vendor_Web_Server rule-id 268435470 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435470 ifc outside_main object any-ipv4 ifc inside2 object Internal_Apache_Vendor_Web_Server rule-id 268435470 event-log flow-end&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L7 RULE: DefaultActionRule&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit ip any any rule-id 1 event-log flow-end&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;mtu diagnostic 1500&lt;BR /&gt;mtu outside_main 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu brdg2 1500&lt;BR /&gt;mtu brdg1 1500&lt;BR /&gt;mtu inside2 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu vlan10 1500&lt;BR /&gt;mtu vlan20 1500&lt;BR /&gt;mtu vlan30 1500&lt;BR /&gt;mtu vlan1 1500&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface vlan10&lt;BR /&gt;monitor-interface vlan20&lt;BR /&gt;monitor-interface vlan30&lt;BR /&gt;monitor-interface vlan1&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (inside2,outside) source static Internal_Apache_Vendor_Web_Server interface service _|NatOrigSvc_18c7d892-4172-11ec-ae7f-41e287ee508d _|NatMappedSvc_18c7d892-4172-11ec-ae7f-41e287ee508d&lt;BR /&gt;nat (inside2,outside) source static Internal_Apache_Vendor_Web_Server interface service _|NatOrigSvc_dc093aef-4311-11ec-afdb-0d6b9a1be6b3 _|NatMappedSvc_dc093aef-4311-11ec-afdb-0d6b9a1be6b3&lt;BR /&gt;!&lt;BR /&gt;object network any-ipv4&lt;BR /&gt;nat (inside2,outside) dynamic interface&lt;BR /&gt;object network OutsideIPv4Gateway&lt;BR /&gt;nat (outside,inside2) dynamic interface&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;!&lt;BR /&gt;router ospf 20&lt;BR /&gt;timers throttle lsa 0 5000 5000&lt;BR /&gt;log-adj-changes detail&lt;BR /&gt;!&lt;BR /&gt;router bgp 10&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp router-id vrf auto-assign&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;no auto-summary&lt;BR /&gt;no synchronization&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.174.153 1 track 1&lt;BR /&gt;route outside_main 0.0.0.0 0.0.0.0 X.X.88.1 2&lt;BR /&gt;route inside2 0.0.0.0 0.0.0.0 192.168.1.22 3&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http ::/0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ip-client vlan1 ipv6&lt;BR /&gt;ip-client vlan1&lt;BR /&gt;ip-client vlan30 ipv6&lt;BR /&gt;ip-client vlan30&lt;BR /&gt;ip-client vlan20 ipv6&lt;BR /&gt;ip-client vlan20&lt;BR /&gt;ip-client vlan10 ipv6&lt;BR /&gt;ip-client vlan10&lt;BR /&gt;ip-client inside ipv6&lt;BR /&gt;ip-client inside&lt;BR /&gt;ip-client inside2 ipv6&lt;BR /&gt;ip-client inside2&lt;BR /&gt;ip-client brdg1 ipv6&lt;BR /&gt;ip-client brdg1&lt;BR /&gt;ip-client brdg2 ipv6&lt;BR /&gt;ip-client brdg2&lt;BR /&gt;ip-client outside ipv6&lt;BR /&gt;ip-client outside&lt;BR /&gt;ip-client outside_main ipv6&lt;BR /&gt;ip-client outside_main&lt;BR /&gt;ip-client diagnostic ipv6&lt;BR /&gt;ip-client diagnostic&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 0&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 2116304084 reachability&lt;BR /&gt;!&lt;BR /&gt;track 2 rtr 1808469510 reachability&lt;BR /&gt;!&lt;BR /&gt;track 3 rtr 1785869986 reachability&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh ::/0 inside&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 208.67.222.222 208.67.220.220&lt;BR /&gt;dhcpd auto_config inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect ssl dtls none&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;inspect snmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;app-agent heartbeat interval 1000 retry-count 3&lt;BR /&gt;snort preserve-connection&lt;BR /&gt;Cryptochecksum:3800b305c27942290d31f627e9d6dac3&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 22:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512261#M1085503</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2021-12-02T22:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512459#M1085512</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; you are not trunking the VLANs, you've got a routed port between the switch and the FTD. So remove the sub interfaces from the FTD and create static routes on the FTD for each of the switches VLAN via the "inside2" interface with a next hop of 192.168.2.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will need to ensure you have NAT configured for these VLANs and permitting traffic via an AC rule.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 08:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512459#M1085512</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-12-03T08:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1140 not passing traffic to internet</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512739#M1085533</link>
      <description>&lt;P&gt;That's what I was afraid of having to do, when I attempted to do a trunk port to the FP device traffic wouldn't flow and I didn't see a setting for trucking on it.&amp;nbsp; That is why i went with a static route.&lt;/P&gt;&lt;P&gt;Thanks for the assistance now that I know the proper settings I can tweak it a little and see if I can sort this out.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 14:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1140-not-passing-traffic-to-internet/m-p/4512739#M1085533</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2021-12-03T14:01:06Z</dc:date>
    </item>
  </channel>
</rss>

