<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: STATIC NAT/PAT Using on firepower 2130 using FDM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559928#M1087709</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/133745"&gt;@cm&lt;/a&gt; you need to permit the inbound traffic in the ACP (Access Control Policy), you obviously need this in addition to the static nat rule to translate the traffic from public to private IP address.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Feb 2022 20:49:02 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-02-25T20:49:02Z</dc:date>
    <item>
      <title>STATIC NAT/PAT Using on firepower 2130 using FDM</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559878#M1087701</link>
      <description>&lt;P&gt;inside 192.168.1.1/24------FTD-----Outside -71.x.x.2/24 ------71.x.x.1 (Gw)&lt;/P&gt;&lt;P&gt;Mail - 192.168.1.2 -----------------71.x.x.3/24(Public)&lt;BR /&gt;ns2 - 192.168.1.3 -----------------71.x.x.4/24(Public)&lt;BR /&gt;www - 192.168.1.4 -----------------71.x.x.5/24(Public)&lt;/P&gt;&lt;P&gt;I m having challenge recreating this Scenario. I Wish to Protect Servers using Firepower&lt;BR /&gt;I m using FDM to configure. I have tried Setting the above but having issues.&lt;BR /&gt;I have setup Auto-Nat(2) to go out and working ok. I have configured STATIC NAT (1) above&lt;BR /&gt;auto-nat for the My servers. I can see the translations are ok on FTD from inside to Out ... Show conn&lt;BR /&gt;The problem is when I m coming from the Internet ... I can not ping the servers... what am I doing wrong.&lt;BR /&gt;the Ip address are all active ...&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 19:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559878#M1087701</guid>
      <dc:creator>cm</dc:creator>
      <dc:date>2022-02-25T19:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: STATIC NAT/PAT Using on firepower 2130 using FDM</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559879#M1087702</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/133745"&gt;@cm&lt;/a&gt; hard to tell without seeing your configuration.&lt;/P&gt;
&lt;P&gt;Please provide screenshot of your NAT rules and the ACP rule that permits the inbound icmp.&lt;/P&gt;
&lt;P&gt;You could also run packet-tracer from the CLI to simulate the traffic flow, provide the output for review.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 19:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559879#M1087702</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-25T19:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: STATIC NAT/PAT Using on firepower 2130 using FDM</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559911#M1087705</link>
      <description>&lt;P&gt;Please check&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 20:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559911#M1087705</guid>
      <dc:creator>cm</dc:creator>
      <dc:date>2022-02-25T20:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: STATIC NAT/PAT Using on firepower 2130 using FDM</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559917#M1087706</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/133745"&gt;@cm&lt;/a&gt; you don't have an inbound rule from the internet, you've only got one outbound rule from inside to outside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 20:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559917#M1087706</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-25T20:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: STATIC NAT/PAT Using on firepower 2130 using FDM</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559926#M1087708</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;is the inbound for ACP or NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 20:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559926#M1087708</guid>
      <dc:creator>cm</dc:creator>
      <dc:date>2022-02-25T20:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: STATIC NAT/PAT Using on firepower 2130 using FDM</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559928#M1087709</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/133745"&gt;@cm&lt;/a&gt; you need to permit the inbound traffic in the ACP (Access Control Policy), you obviously need this in addition to the static nat rule to translate the traffic from public to private IP address.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 20:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-pat-using-on-firepower-2130-using-fdm/m-p/4559928#M1087709</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-25T20:49:02Z</dc:date>
    </item>
  </channel>
</rss>

