<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT to Web Server on Firepower not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547649#M1087173</link>
    <description>&lt;P&gt;Your access list ACL is incorrect&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Feb 2022 17:41:08 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2022-02-08T17:41:08Z</dc:date>
    <item>
      <title>NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547030#M1087145</link>
      <description>&lt;P&gt;Need help with a NAT configuration on a Firepower 1140. I have a NAT rule in place when using&amp;nbsp; 'sho nat translate' I get the following output:&amp;nbsp;&lt;/P&gt;&lt;P&gt;show nat translate 192.168.x.x&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;3 (inside) to (outside_spectrum) source static ET-SVR ET-SVR service _|NatOrigSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795 _|NatMappedSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795&lt;BR /&gt;translate_hits = 2, untranslate_hits = 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NAT rule is as follows&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT web.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/143259iB61FA11A056FF631/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NAT web.JPG" alt="NAT web.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;packet-tracer input outside_spectrum tcp 8.8.8.8 80 192.168.x.x 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside_spectrum) source static ET-SVR ET-SVR service _|NatOrigSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795 _|NatMappedSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate 192.168.x.x/80 to 192.168.x.x/80&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435468 ifc outside_spectrum any ifc inside any rule-id 268435468 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435468: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435468: L5 RULE: Geo_Block&lt;BR /&gt;object-group service |acSvcg-268435468&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside_spectrum) source static ET-SVR ET-SVR service _|NatOrigSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795 _|NatMappedSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 8.8.8.8/80 to 8.8.8.8/80&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside_spectrum) source static ET-SVR ET-SVR service _|NatOrigSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795 _|NatMappedSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2940303, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;MidRecovery data queried. Got session type 2 rule id: 268435457, rule_action:2, rev id:2905255074, ruleMatch flag:0x5&lt;BR /&gt;00:00:00:00:00:00 -&amp;gt; E0:69:BA:02:BF:26 0800&lt;BR /&gt;8.8.8.8:80 -&amp;gt; 192.168.x.x:80 proto 6 AS=0 ID=3 GR=1-1&lt;BR /&gt;Packet 147681: TCP ******S*, 02/08-01:16:32.086467, seq 1100754902, dsize 0&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service: (0), client: (0), payload: (0), misc: (0)&lt;BR /&gt;Firewall: starting rule matching, zone 2 -&amp;gt; 1, geo 0(0) -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999999, no url or host, no xff&lt;BR /&gt;Firewall: allow rule, id 268435464, allow&lt;BR /&gt;Policies: Network 0, Inspection 0, Detection 3&lt;BR /&gt;Verdict: pass&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.x.x using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 192.168.x.x on interface inside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 2c27.d745.543a hits 2 reference 7&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside_spectrum(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 01:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547030#M1087145</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-02-08T01:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547157#M1087151</link>
      <description>&lt;P&gt;Nat rules look fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when you do a packet tracer do you put the firewall outside IP address?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input outside_spectrum tcp 8.8.8.8 80 outside-firewall-ip 80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you show the packet tracer with outside IP address and also could you show command show Nat detail.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 06:47:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547157#M1087151</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-08T06:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547590#M1087170</link>
      <description>&lt;P&gt;So when I do that I get an ACL drop see bellow. I do have an ACL maybe in wrong spot or something facing incorrectly?? I have pic pasted bellow.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;packet-tracer input outside_spectrum tcp 8.8.8.8 80 X.X.X.155 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 98.6.174.155 using egress ifc identity(vrfid:0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside_spectrum(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000559234c43156 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL Webserver.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/143340i42188B0E59844B1C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ACL Webserver.JPG" alt="ACL Webserver.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WEB Order.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/143341i5FE41C20CBC4809B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WEB Order.JPG" alt="WEB Order.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 16:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547590#M1087170</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-02-08T16:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547636#M1087172</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; you ACP rule is incorrect, the &lt;U&gt;source&lt;/U&gt; ports will be dynamic not http and https - so remove them, leave as "any".&lt;/P&gt;
&lt;P&gt;Are you intending to NAT behind the outside interface? If so amend your NAT rule for the translated packet source address to "interface".&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 17:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547636#M1087172</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-08T17:34:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547649#M1087173</link>
      <description>&lt;P&gt;Your access list ACL is incorrect&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 17:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547649#M1087173</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-08T17:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547657#M1087174</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt;&amp;nbsp; find this document for you hope it will help you to put in right direction&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212702-configure-and-verify-nat-on-ftd.html" target="_self"&gt;here&lt;/A&gt; and &lt;A href="https://ccnpsecuritywannabe.blogspot.com/2019/10/configuring-cisco-ftd-nat-access-rules.html" target="_self"&gt;here&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 17:52:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547657#M1087174</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-08T17:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547679#M1087175</link>
      <description>&lt;P&gt;I dont have access to firewall but your access-list should be like this&lt;/P&gt;
&lt;DIV id="tinyMceEditor_7ce8d6d9b6f156SherazSalim_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;access-list outside_in exter permit ip any host ET-SVR eq https&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/143349iC0DA3CCC71F110B3/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD1.PNG" alt="FTD1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you also show your nat statment please.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 18:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547679#M1087175</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-08T18:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547821#M1087182</link>
      <description>&lt;P&gt;Not sure what happened but I made the changes and applied them Now my AnyConnect's isn't working LOL.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 20:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547821#M1087182</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-02-08T20:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547832#M1087184</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; hard to tell, what did you change?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you connect to the VPN? If you can connect, it could be the Access Control rules are blocking your traffic or the NAT exemption rule is not working. Double check that config. From the CLI you can also run "system support firewall-engine-debug", filter on the IP address, generate some traffic and confirm what rule is being hit.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 20:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547832#M1087184</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-08T20:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547879#M1087186</link>
      <description>&lt;P&gt;It booted all connected users out, I could not connect I had added an additional&amp;nbsp; rule for Vlans to access the internet and that worked but killed the VPN. I removed it and VPN is back up but now my vlans dont have internet access LOL. See bellow for order and the rule config it was number 5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When doing this the change for the webpage access didn't change but might of been because of the rule that killed the VPN cannot test again till after hours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="After removed rule.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/143374iE8A8B4A38E77F683/image-size/medium?v=v2&amp;amp;px=400" role="button" title="After removed rule.JPG" alt="After removed rule.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="in 2 out 2 removed.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/143375iA60D2B8078E6FD62/image-size/medium?v=v2&amp;amp;px=400" role="button" title="in 2 out 2 removed.JPG" alt="in 2 out 2 removed.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 21:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547879#M1087186</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-02-08T21:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547889#M1087187</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt;&amp;nbsp;ACP rules and NAT rules apply for traffic through the firewall, they aren't going to kick off users from a vpn. So I am still unclear what happened. You appear to have 2 outside interfaces, how are you routing? Provide more information if you need help troubleshooting.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 21:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547889#M1087187</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-08T21:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547945#M1087191</link>
      <description>&lt;P&gt;After making the above changes to the NAT this is now the output from 'show nat' it receives hits but is not translating still.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3 (inside) to (outside_spectrum) source static ET-SVR interface service _|NatOrigSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795 _|NatMappedSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795&lt;BR /&gt;translate_hits = 21, untranslate_hits = 21&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 23:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547945#M1087191</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-02-08T23:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547993#M1087193</link>
      <description>&lt;P&gt;Current tracing shows allowed still no access to webpage from the internet....&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WH01-FP-1# packet-tracer input outside_spectrum tcp X.X.1.248 80 X.X.88.1 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop X.X.X.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit ip any any rule-id 1 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L7 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,outside) source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate X.X.1.248/80 to X.X.X.125/37160&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,outside) source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 79500, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;00:00:00:00:00:00 -&amp;gt; E0:69:BA:02:BF:26 0800&lt;BR /&gt;X.X.1.248:80 -&amp;gt; X.X.X.1:80 proto 6 AS=0 ID=0 GR=1-1&lt;BR /&gt;Packet 211213: TCP ******S*, 02/09-02:03:02.665126, seq 1396909633, dsize 0&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service: (0), client: (0), payload: (0), misc: (0)&lt;BR /&gt;Firewall: allow rule, id 1, allow&lt;BR /&gt;Policies: Network 0, Inspection 0, Detection 3&lt;BR /&gt;Verdict: pass&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop X.X.X.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop X.X.X.1 on interface outside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 40a6.7746.a7c1 hits 45665 reference 406&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside_spectrum(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"sho nat"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static ET-SVR ET-SVR service _|NatOrigSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795 _|NatMappedSvc_4211a90c-77cc-11ec-bf90-9f23f6c58795&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (outside) to (any) source static ET-SVR ET-SVR&lt;BR /&gt;translate_hits = 4, untranslate_hits = 7&lt;BR /&gt;3 (inside) to (outside) source static ET-SVR-01 ET-SVR-01 destination static VPN_Network VPN_Network&lt;BR /&gt;translate_hits = 3, untranslate_hits = 3&lt;BR /&gt;4 (inside) to (outside_spectrum) source static ET-SVR-01 ET-SVR-01 destination static VPN_Network VPN_Network&lt;BR /&gt;translate_hits = 2584, untranslate_hits = 2584&lt;BR /&gt;5 (inside) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 29776, untranslate_hits = 624&lt;BR /&gt;6 (any) to (outside) source dynamic any-ipv4 interface&lt;BR /&gt;translate_hits = 285, untranslate_hits = 7&lt;BR /&gt;7 (outside) to (inside) source static VPN_Network VPN_Network destination static Inside_Network Inside_Network no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;8 (outside_spectrum) to (inside) source static VPN_Network VPN_Network destination static Inside_Network Inside_Network&lt;BR /&gt;translate_hits = 64, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 02:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4547993#M1087193</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-02-09T02:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4548078#M1087199</link>
      <description>&lt;P&gt;Looking into your output. your packet tracer is mating the NAT rule which is defined in your NAT configuration rule number 6.&lt;/P&gt;
&lt;PRE&gt;6 (any) to (outside) source dynamic any-ipv4 interface
translate_hits = 285, untranslate_hits = 7&lt;/PRE&gt;
&lt;P&gt;as looking in to your packet trace packet coming from outside interface source X.X.1.248 80 and destination X.X.88.1 80 (which is your firewall IP outside interface address).&lt;/P&gt;
&lt;PRE&gt; packet-tracer input outside_spectrum tcp X.X.1.248 80 X.X.88.1 80

Phase: 4
Type: NAT
Subtype:
Result: ALLOW
Config:
&lt;STRONG&gt;nat (any,outside) source dynamic any-ipv4 interface&lt;/STRONG&gt;
Additional Information:
Dynamic translate X.X.1.248/80 to X.X.X.125/37160


Phase: 7
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
&lt;STRONG&gt;nat (any,outside) source dynamic any-ipv4 interface&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 06:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4548078#M1087199</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-09T06:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: NAT to Web Server on Firepower not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4560295#M1087724</link>
      <description>&lt;P&gt;Hopefully someone is still looking at this. I am still stuck trying to get this web server working. Bellow are the following rules in place and packet trace. I know its being dropped because of an ACL just need someone to point me in the right direction for the configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks In advance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco ACL.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/144840i5E6111F37DC358EF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Cisco ACL.JPG" alt="Cisco ACL.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco NAT.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/144841i1D037880513CFFB6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Cisco NAT.JPG" alt="Cisco NAT.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;WH01-FP-1# packet-tracer input outside tcp 192.X.X.248 80 X.X.X.125 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop X.X.X.125 using egress ifc identity(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000558bf7033156 flow (NA)/NA&lt;/P&gt;&lt;P&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;/P&gt;&lt;P&gt;WH01-FP-1# packet-tracer input outside tcp X.X.X.125 80 X.X.X.248 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop X.X.X.248 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000558bf7033156 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Feb 2022 23:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-to-web-server-on-firepower-not-working/m-p/4560295#M1087724</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-02-26T23:10:05Z</dc:date>
    </item>
  </channel>
</rss>

