<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pat is not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4659134#M1092231</link>
    <description>&lt;P&gt;The packet-tracer you posted in that screenshot would test access from the inside network to the outside network, The reverse would test access from the outside network to the inside network.&amp;nbsp; I am sure that the packet-tracer from the outside network is failing due to a syntax error.&amp;nbsp; In any case, glad this is working now.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jul 2022 07:24:11 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2022-07-28T07:24:11Z</dc:date>
    <item>
      <title>Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655626#M1092071</link>
      <description>&lt;P&gt;Hello Community.&lt;/P&gt;&lt;P&gt;I have recent converted my Asa5516-x from Asa to FTD code and running it from a FMC&lt;/P&gt;&lt;P&gt;I have figured everything out, except the PAT part.&lt;/P&gt;&lt;P&gt;It was working on the ASA code, but I was not able to use the migtation tool, so I've started from scratch.&lt;/P&gt;&lt;P&gt;Currently there is a dynamic NAT rule, for many to one IP translation-&amp;gt; internet access for the client net.&lt;/P&gt;&lt;P&gt;Then I have a FTP server (Kasperstore) on 192.168.2.82 on the inside-security-zone, configuret to recieve sftp on tcp port 20000, from the outside-if on 192.168.0.254&lt;/P&gt;&lt;P&gt;When I run a packet-tracer I get the output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Last login: Fri Jul 22 16:02:45 UTC 2022 from 192.168.3.198 on pts/0

Copyright 2004-2022, Cisco and/or its affiliates. All rights reserved. 
Cisco is a registered trademark of Cisco Systems, Inc. 
All other trademarks are property of their respective owners.

Cisco Firepower Extensible Operating System (FX-OS) v2.10.1 (build 192)
Cisco ASA5516-X Threat Defense v7.0.2 (build 88)

&amp;gt; packet-tracer input Outside_if 
esp     gre     icmp    ipip    rawip   sctp    tcp     udp     vlan-id 
&amp;gt; packet-tracer input Outside_if tcp 192.168.0.254 20000 192.168.2.82 20000 detailed

Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e878da70, priority=13, domain=capture, deny=false
        hits=4558667, user_data=0x1512f18a7b70, cs_id=0x0, l3_type=0x0
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0000.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1688160, priority=1, domain=permit, deny=false
        hits=353698495, user_data=0x0, cs_id=0x0, l3_type=0x8
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0100.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 3
Type: ROUTE-LOOKUP
Subtype: No ECMP load balancing
Result: ALLOW
Config:
Additional Information:
Destination is locally connected. No ECMP load balancing.
Found next-hop 192.168.0.254 using egress ifc  identity(vrfid:0)

Phase: 4
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
object network Area51-outside-if
 nat (any,any) static Kasperstore service tcp 20000 20000 
Additional Information:
NAT divert to egress interface identity(vrfid:0)
Untranslate 192.168.2.82/20000 to 192.168.0.254/20000

Phase: 5
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e84ca950, priority=501, domain=permit, deny=true
        hits=0, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=192.168.0.254, mask=255.255.255.255, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=any

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
output-interface: NP Identity Ifc
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf402bb flow (NA)/NA&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;question is, what is the access-list that is dropping the packet?&lt;/P&gt;&lt;P&gt;I have made an extended access-list under objects&lt;/P&gt;&lt;P&gt;Br. Kasper&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 18:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655626#M1092071</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-22T18:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655636#M1092072</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1298050"&gt;@Kasper Elsborg&lt;/a&gt; you need to configure the access in the Access Control Policy (ACP) not an extended ACL. The source port is likely dynamic , so use "any" not 20000. The destination port will obviously be static, so you can use 20000 for the destination port in the ACP.&lt;/P&gt;
&lt;P&gt;Ideally your NAT rule interfaces should be more specific rather than "any". I.e. - nat (inside,Outside_if) ......&lt;/P&gt;
&lt;P&gt;Your packet tracer source should be a random IP address, the destination IP address will be the NAT IP address, not the real IP address.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 18:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655636#M1092072</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-22T18:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655639#M1092073</link>
      <description>&lt;P&gt;if I am right route-lookup must add to this NAT.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 19:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655639#M1092073</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-07-22T19:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655666#M1092074</link>
      <description>&lt;P&gt;@&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036" target="_self"&gt;&lt;SPAN class=""&gt;Rob Ingram&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;thanks for taking the time&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I think I have the ACP in place? my intention was to keep it as wide a possible due to troubleshooting?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;maybe I did it wrong?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Br. Kasper&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 20:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655666#M1092074</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-22T20:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655667#M1092075</link>
      <description>&lt;P&gt;Hi, seems like this option is ruled out?&lt;/P&gt;&lt;P&gt;Br. Kasper&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 21:02:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655667#M1092075</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-22T21:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655669#M1092076</link>
      <description>&lt;P&gt;same NAT but make the type&lt;/P&gt;&lt;P&gt;NAT auto before&lt;BR /&gt;and enable route-lookup&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 21:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655669#M1092076</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-07-22T21:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655672#M1092077</link>
      <description>&lt;P&gt;Your packet-tracer is not correct. It should look something like this:&lt;/P&gt;
&lt;P&gt;packet-tracer input Outside_if tcp 8.8.8.8 20000 192.168.0.254 20000 detailed&lt;/P&gt;
&lt;P&gt;You are simulating a packet passing through the firewall so the first IP is the source IP that you are testing from (if this is a specific IP then exchange 8.8.8.8 with the correct IP) and the destination is the NATed IP of the FTP server.&amp;nbsp; You should then see a correct packet tracer which will give you more information on if the packet really is denied, allowed, etc.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 21:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655672#M1092077</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-07-22T21:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655772#M1092081</link>
      <description>&lt;P&gt;Seems like I don't have that option?&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 08:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655772#M1092081</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-23T08:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655773#M1092082</link>
      <description>&lt;P&gt;Hi, and thanks for replying.&lt;/P&gt;&lt;P&gt;I am aware and I did change it after, but i dosn't change anything.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;gt; packet-tracer input Outside_if tcp 8.8.8.8 20000 192.168.0.254 20000 detailed

Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e878da70, priority=13, domain=capture, deny=false
        hits=586897569, user_data=0x1512f18a7b70, cs_id=0x0, l3_type=0x0
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0000.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1688160, priority=1, domain=permit, deny=false
        hits=644850555, user_data=0x0, cs_id=0x0, l3_type=0x8
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0100.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 3
Type: ROUTE-LOOKUP
Subtype: No ECMP load balancing
Result: ALLOW
Config:
Additional Information:
Destination is locally connected. No ECMP load balancing.
Found next-hop 192.168.0.254 using egress ifc  identity(vrfid:0)

Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f142f8b0, priority=0, domain=nat-per-session, deny=false
        hits=757857, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=any, output_ifc=any

Phase: 5
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1689550, priority=0, domain=permit, deny=true
        hits=191254, user_data=0xb, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=any

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf402bb flow (NA)/NA&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 08:23:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655773#M1092082</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-23T08:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655774#M1092083</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1298050"&gt;@Kasper Elsborg&lt;/a&gt; are you sure the source port is going to be port 20000? Usually it will be dynamic. Traffic would probably not hit the first rule, but rule #7.&lt;/P&gt;
&lt;P&gt;Run "system support firewall-engine-debug" from the CLI of the FTD, filter on the destination IP address. Then generate traffic and observe the traffic flow and determine the source port and which rule it matches.&lt;/P&gt;
&lt;P&gt;Provide the output of "show nat detail"&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 08:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655774#M1092083</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-23T08:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655775#M1092084</link>
      <description>&lt;P&gt;I've tried to make a manual nat-&amp;gt;before&lt;/P&gt;&lt;P&gt;but I still don't have that option. also I don't know if I made the manual nat rule correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 08:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655775#M1092084</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-23T08:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655780#M1092085</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; Yes I saw the error so I've change the source port to Any. but it didn't change anything. I will try and do your suggestions.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 08:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655780#M1092085</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-23T08:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655782#M1092086</link>
      <description>&lt;P&gt;okay so I've tried the "system support forewall-engine-debug" with various option. I can get it to generate traffic if server is 192.168.2.82, which it the sftp server, among many services. however there is no traffic from the outside_if from my sftp client 192.168.0.232. and if I change&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt; system support firewall-engine-debug&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Please specify an IP protocol:
Please specify a client IP address: 192.168.0.232
Please specify a client port:
Please specify a server IP address:
Please specify a server port:
Monitoring firewall engine debug messages&lt;/LI-CODE&gt;&lt;P&gt;There is no output at all?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;gt; show nat detail 

Manual NAT Policies (Section 1)
1 (any) to (any) source static Area51-outside-if Kasperstore  service SVC_30064936305 SVC_30064936305 unidirectional
    translate_hits = 0, untranslate_hits = 0
    Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32
    Service - Origin: tcp destination eq 20000 , Translated: tcp destination eq 20000 

Auto NAT Policies (Section 2)
1 (any) to (any) source static Area51-outside-if Kasperstore  service tcp 20000 20000 
    translate_hits = 0, untranslate_hits = 5
    Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32
    Service - Protocol: tcp Real: 20000 Mapped: 20000 
2 (Inside_if) to (Outside_if) source dynamic Area51_inside_nets interface 
    translate_hits = 381178, untranslate_hits = 9243
    Source - Origin: 192.168.2.0-192.168.3.255, Translated: 192.168.0.254/24&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 09:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655782#M1092086</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-23T09:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655945#M1092091</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I've made a test ACP, with no rules other than a trust all. tested it, but no luck. still the same block. So I can pretty much rule out the the ACP rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;gt; system support firewall-engine-debug

Please specify an IP protocol: icmp
Please specify a client IP address: 192.168.3.198
Please specify a server IP address: 

Monitoring firewall engine debug messages


192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 New firewall session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 app event with app id changed, url no change, tls host no change, bits 0x5
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 MidRecovery data sent for rule id: 268438533, rule_action:3, rev id:3304971106, rule_match flag:0x0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 using HW or preset rule order 1, 'test', action Trust and prefilter rule 0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 fastpath action
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Got end of flow event from hardware with flags 00000000
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Rule Match Data: rule_id 268438533, rule_action 3 rev_id 3304971106, rule_flags 3
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Received EOF, deleting the snort session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Deleting Firewall session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 New firewall session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 app event with app id changed, url no change, tls host no change, bits 0x5
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 MidRecovery data sent for rule id: 268438533, rule_action:3, rev id:3304971106, rule_match flag:0x0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 using HW or preset rule order 1, 'test', action Trust and prefilter rule 0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 fastpath action
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Got end of flow event from hardware with flags 00000000
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Rule Match Data: rule_id 268438533, rule_action 3 rev_id 3304971106, rule_flags 3
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Received EOF, deleting the snort session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Deleting Firewall session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 New firewall session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 app event with app id changed, url no change, tls host no change, bits 0x5
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 MidRecovery data sent for rule id: 268438533, rule_action:3, rev id:3304971106, rule_match flag:0x0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 using HW or preset rule order 1, 'test', action Trust and prefilter rule 0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 fastpath action
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Got end of flow event from hardware with flags 00000000
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Rule Match Data: rule_id 268438533, rule_action 3 rev_id 3304971106, rule_flags 3
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Received EOF, deleting the snort session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Deleting Firewall session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 New firewall session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 app event with app id changed, url no change, tls host no change, bits 0x5
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 MidRecovery data sent for rule id: 268438533, rule_action:3, rev id:3304971106, rule_match flag:0x0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 using HW or preset rule order 1, 'test', action Trust and prefilter rule 0
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 fastpath action
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Got end of flow event from hardware with flags 00000000
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Rule Match Data: rule_id 268438533, rule_action 3 rev_id 3304971106, rule_flags 3
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Received EOF, deleting the snort session
192.168.3.198 8 -&amp;gt; 192.168.0.232 0 1 AS=0 ID=1 GR=1-1 Deleting Firewall session
^C
Caught interrupt signal
Exiting.

&amp;gt; packet-tracer input Outside_if tcp 8.8.8.8 20000 192.168.0.254 20000 detailed

Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e878da70, priority=13, domain=capture, deny=false
        hits=591050297, user_data=0x1512f18a7b70, cs_id=0x0, l3_type=0x0
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0000.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1688160, priority=1, domain=permit, deny=false
        hits=646912185, user_data=0x0, cs_id=0x0, l3_type=0x8
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0100.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 3
Type: ROUTE-LOOKUP
Subtype: No ECMP load balancing
Result: ALLOW
Config:
Additional Information:
Destination is locally connected. No ECMP load balancing.
Found next-hop 192.168.0.254 using egress ifc  identity(vrfid:0)

Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f142f8b0, priority=0, domain=nat-per-session, deny=false
        hits=782289, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=any, output_ifc=any

Phase: 5
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1689550, priority=0, domain=permit, deny=true
        hits=198553, user_data=0xb, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=any

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf402bb flow (NA)/NA&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Any suggestions?&lt;/P&gt;&lt;P&gt;Br. Kasper&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 14:16:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655945#M1092091</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-23T14:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655977#M1092093</link>
      <description>&lt;P&gt;I've got a bit further. It seems like the NAT rule was not created right. So i made a static manual NAT rule which I now can get a hit on in the packet-tracer. I also did a Packet capture from the FMC, that might help identify the problem, however I'm still stuck, so any suggestions are welcome.&lt;/P&gt;&lt;P&gt;NAT rule is attached&lt;/P&gt;&lt;P&gt;packet-tracer&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;gt; packet-tracer input Outside_if tcp 8.8.8.8 20000 192.168.2.82 20000 detailed

Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e878da70, priority=13, domain=capture, deny=false
        hits=594666507, user_data=0x1512f18a7b70, cs_id=0x0, l3_type=0x0
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0000.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1688160, priority=1, domain=permit, deny=false
        hits=648705869, user_data=0x0, cs_id=0x0, l3_type=0x8
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0100.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 3
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (Inside_if,Outside_if) source static Area51-outside-if Kasperstore service SVC_30064977916 SVC_30064977916
Additional Information:
NAT divert to egress interface Inside_if(vrfid:0)
Untranslate 192.168.2.82/20000 to 192.168.0.254/20000

Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit tcp any any eq 20000 rule-id 268438530 
access-list CSM_FW_ACL_ remark rule-id 268438530: ACCESS POLICY: Area51 ACP - Mandatory
access-list CSM_FW_ACL_ remark rule-id 268438530: L7 RULE: SFTP-20000
Additional Information:
 This packet will be sent to snort for additional processing where a verdict will be reached
 Forward Flow based lookup yields rule:
 in  id=0x1512f1c14250, priority=12, domain=permit, deny=false
        hits=1, user_data=0x1513064869c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=20000, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none
        input_ifc=any, output_ifc=any

Phase: 5
Type: CONN-SETTINGS
Subtype: 
Result: ALLOW
Config:
class-map class-default
 match any
policy-map global_policy
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
service-policy global_policy global
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e858dc50, priority=7, domain=conn-set, deny=false
        hits=12365, user_data=0x1512e8588fe0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=any

Phase: 6
Type: NAT
Subtype: 
Result: ALLOW
Config:
nat (Inside_if,Outside_if) source static Area51-outside-if Kasperstore service SVC_30064977916 SVC_30064977916
Additional Information:
Static translate 8.8.8.8/20000 to 8.8.8.8/20000
 Forward Flow based lookup yields rule:
 in  id=0x1512f1b90e00, priority=6, domain=nat, deny=false
        hits=1, user_data=0x1512f1c86a60, cs_id=0x0, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=192.168.2.82, mask=255.255.255.255, port=20000, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=Inside_if(vrfid:0)

Phase: 7
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f142f8b0, priority=0, domain=nat-per-session, deny=false
        hits=797708, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=any, output_ifc=any

Phase: 8
Type: IP-OPTIONS
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1690170, priority=0, domain=inspect-ip-options, deny=true
        hits=426601, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=any

Phase: 9
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (Inside_if,Outside_if) source static Area51-outside-if Kasperstore service SVC_30064977916 SVC_30064977916
Additional Information:
 Forward Flow based lookup yields rule:
 out id=0x1512f1ca96d0, priority=6, domain=nat-reverse, deny=false
        hits=2, user_data=0x1512f1c38780, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=192.168.0.254, mask=255.255.255.255, port=20000, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=Inside_if(vrfid:0)

Phase: 10
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Reverse Flow based lookup yields rule:
 in  id=0x1512f142f8b0, priority=0, domain=nat-per-session, deny=false
        hits=797710, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=any, output_ifc=any

Phase: 11
Type: IP-OPTIONS
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Reverse Flow based lookup yields rule:
 in  id=0x1512f1723170, priority=0, domain=inspect-ip-options, deny=true
        hits=423866, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Inside_if(vrfid:0), output_ifc=any

Phase: 12
Type: FLOW-CREATION
Subtype: 
Result: ALLOW
Config:
Additional Information:
New flow created with id 423777, packet dispatched to next module
Module information for forward flow ...
snp_fp_inspect_ip_options
snp_fp_tcp_normalizer
snp_fp_tcp_proxy
snp_fp_snort
snp_fp_tcp_proxy
snp_fp_translate
snp_fp_tcp_normalizer
snp_fp_adjacency
snp_fp_fragment
snp_fp_tracer_drop
snp_ifc_stat

Module information for reverse flow ...
snp_fp_inspect_ip_options
snp_fp_tcp_normalizer
snp_fp_translate
snp_fp_tcp_proxy
snp_fp_snort
snp_fp_tcp_proxy
snp_fp_tcp_normalizer
snp_fp_adjacency
snp_fp_fragment
snp_fp_tracer_drop
snp_ifc_stat

Phase: 13
Type: EXTERNAL-INSPECT
Subtype: 
Result: ALLOW
Config:
Additional Information:
Application: 'SNORT Inspect'

Phase: 14
Type: SNORT
Subtype: 
Result: ALLOW
Config:
Additional Information:
Snort Trace:
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:2453855330, ruleMatch flag:0x5 
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:3561217122, ruleMatch flag:0x5 
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:3561217122, ruleMatch flag:0x5 
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:3561217122, ruleMatch flag:0x5 
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:3561217122, ruleMatch flag:0x5 
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:3561217122, ruleMatch flag:0x5 
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:3561217122, ruleMatch flag:0x5 
MidRecovery data queried. Got session type 2 rule id: 268435467, rule_action:2, rev id:3561217122, ruleMatch flag:0x5 
00:00:00:00:00:00 -&amp;gt; 78:72:5D:CE:BD:A0 0800
8.8.8.8:20000 -&amp;gt; 192.168.0.254:20000 proto 6 AS=0 ID=2 GR=1-1
Packet 15958: TCP ******S*, 07/23-19:39:09.389963, seq 531550506, dsize 0
Session: new snort session
AppID: service: (0), client: (0), payload: (0), misc: (0)
Firewall: trust/fastpath rule, id 268438530, allow
Policies: Network 0, Inspection 0, Detection 3
Verdict: pass
Snort Verdict: (pass-packet) allow this packet

Phase: 15
Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP
Subtype: Resolve Preferred Egress interface
Result: ALLOW
Config:
Additional Information:
Found next-hop 192.168.0.254 using egress ifc  identity(vrfid:0)

Phase: 16
Type: SUBOPTIMAL-LOOKUP
Subtype: suboptimal next-hop
Result: ALLOW
Config:
Additional Information:
Input route lookup returned ifc  identity is not same as existing ifc  Inside_if

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
output-interface: Inside_if(vrfid:0)
output-status: up
output-line-status: up
Action: drop
Drop-reason: (no-adjacency) No valid adjacency, Drop-location: frame 0x000056182be6cf8c flow (NA)/NA&lt;/LI-CODE&gt;&lt;P&gt;Show nat detail:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;gt; show nat detail

Manual NAT Policies (Section 1)
1 (Inside_if) to (Outside_if) source static Area51-outside-if Kasperstore  service SVC_30064977916 SVC_30064977916
    translate_hits = 2, untranslate_hits = 2
    Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32
    Service - Origin: tcp source eq 20000 , Translated: tcp source eq 20000 

Auto NAT Policies (Section 2)
1 (Inside_if) to (Outside_if) source dynamic Area51_inside_nets interface 
    translate_hits = 5333, untranslate_hits = 74
    Source - Origin: 192.168.2.0-192.168.3.255, Translated: 192.168.0.254/24&lt;/LI-CODE&gt;&lt;P&gt;The actually setup.&lt;/P&gt;&lt;P&gt;Inside net, are 192.168.1.0-&amp;gt;192.168.3.0 routed with ospf on L3 switches, and the inside-if on the FTD.&lt;/P&gt;&lt;P&gt;FTD Outside -if are 192.168.0.254 connected to the ISP router on 192.168.0.1, but since I have no control over the routing here, the FTD is working the dynamic nat for the inside network. but this subnet also let me simulate outside traffic, so I have a sftp client on 192.168.2.232 connecting to FTD outside-if on 192.168.0.254:20000 to test the nat. the sftp server is connecting on 192.168.2.82:20000&lt;/P&gt;&lt;P&gt;the Packet capture from FMC when connecting from the sftp client just described:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;13 packets captured

   1: 19:50:06.510074       192.168.0.232.54259 &amp;gt; 192.168.0.254.20000: S 584024581:584024581(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
   2: 19:50:07.521304       192.168.0.232.54259 &amp;gt; 192.168.0.254.20000: S 584024581:584024581(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
   3: 19:50:09.523669       192.168.0.232.54259 &amp;gt; 192.168.0.254.20000: S 584024581:584024581(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
   4: 19:50:13.526034       192.168.0.232.54259 &amp;gt; 192.168.0.254.20000: S 584024581:584024581(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
   5: 19:50:21.530322       192.168.0.232.54259 &amp;gt; 192.168.0.254.20000: S 584024581:584024581(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
   6: 19:50:26.544985       192.168.0.232.17500 &amp;gt; 255.255.255.255.17500:  udp 146 
Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Found next-hop 255.255.255.255 using egress ifc  identity(vrfid:0)

Phase: 4
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
output-interface: NP Identity Ifc
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf402bb flow (NA)/NA


   7: 19:50:26.553483       192.168.0.232.17500 &amp;gt; 255.255.255.255.17500:  udp 146 
Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Found next-hop 255.255.255.255 using egress ifc  identity(vrfid:0)

Phase: 4
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
output-interface: NP Identity Ifc
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf402bb flow (NA)/NA


   8: 19:50:26.553544       192.168.0.232.17500 &amp;gt; 192.168.0.255.17500:  udp 146 
Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: ROUTE-LOOKUP
Subtype: No ECMP load balancing
Result: ALLOW
Config:
Additional Information:
Destination is locally connected. No ECMP load balancing.
Found next-hop 192.168.0.255 using egress ifc  Outside_if(vrfid:0)

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
Action: drop
Drop-reason: (sp-security-failed) Slowpath security checks failed, Drop-location: frame 0x000056182bf4a27b flow (NA)/NA


   9: 19:50:26.555101       192.168.0.232.17500 &amp;gt; 255.255.255.255.17500:  udp 146 
Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Found next-hop 255.255.255.255 using egress ifc  identity(vrfid:0)

Phase: 4
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
output-interface: NP Identity Ifc
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf402bb flow (NA)/NA


  10: 19:50:26.555162       192.168.0.232.17500 &amp;gt; 255.255.255.255.17500:  udp 146 
Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Found next-hop 255.255.255.255 using egress ifc  identity(vrfid:0)

Phase: 4
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
output-interface: NP Identity Ifc
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf402bb flow (NA)/NA


  11: 19:50:32.652996       192.168.0.232.54260 &amp;gt; 192.168.0.254.20000: S 2254202175:2254202175(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
  12: 19:50:33.663616       192.168.0.232.54260 &amp;gt; 192.168.0.254.20000: S 2254202175:2254202175(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
  13: 19:50:35.672221       192.168.0.232.54260 &amp;gt; 192.168.0.254.20000: S 2254202175:2254202175(0) win 65535 &amp;lt;mss 1460,nop,wscale 7,nop,nop,sackOK&amp;gt; 
13 packets shown&lt;/LI-CODE&gt;&lt;P&gt;Br. Kasper&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 19:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4655977#M1092093</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-23T19:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656042#M1092094</link>
      <description>&lt;P&gt;So from what I can see, this is no longer a ACP or NAT issue. From the packet-tracer I can see in the end.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Phase: 16
Type: SUBOPTIMAL-LOOKUP
Subtype: suboptimal next-hop
Result: ALLOW
Config:
Additional Information:
Input route lookup returned ifc  identity is not same as existing ifc  Inside_if

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
output-interface: Inside_if(vrfid:0)
output-status: up
output-line-status: up
Action: drop
Drop-reason: (no-adjacency) No valid adjacency, Drop-location: frame 0x000056182be6cf8c flow (NA)/NA&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;which looks more like a routing problem. It leads me back to&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752" target="_self"&gt;&lt;SPAN class=""&gt;MHM Cisco World&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;comment on enabling "route lookup" on the NAT config. But it is still grayed out. From what I can read in the guides and google, it should be alloved en firewall routing mode, which is the case.&lt;/P&gt;&lt;P&gt;fyi.&amp;nbsp;I can produce the same output with both a manual and auto NAT rule.&lt;/P&gt;&lt;P&gt;Anyone have an idea why it is grayed out?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jul 2022 07:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656042#M1092094</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-24T07:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656198#M1092098</link>
      <description>&lt;P&gt;Could you provide screenshots of the complete NAT configuration (all sections if you please).&amp;nbsp; Also, confirm the following:&lt;/P&gt;
&lt;P&gt;Original source IP -&amp;nbsp;192.168.0.254&lt;/P&gt;
&lt;P&gt;Translated source IP -&amp;nbsp;192.168.2.82&lt;/P&gt;
&lt;P&gt;I highly doubt that route-lookup is the issue here as the NAT will use the the interfaces defined in the NAT configuration to determine which interfaces to send packets to, that is unless you have more than one interface configured in each of those security zones you have configured.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jul 2022 20:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656198#M1092098</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-07-24T20:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656469#M1092110</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690" target="_self"&gt;&lt;SPAN class=""&gt;@Marius Gunnerud&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt; Yes of cause.&lt;/P&gt;&lt;P&gt;These is the lates configs. both the auto and manual rule. they both produce the same output from the packet-tracer.&lt;/P&gt;&lt;P&gt;they both recieve hits, when enabled.&lt;/P&gt;&lt;P&gt;first show nat detailed, is with the manual enabled, 2nd is with disabled, both recieve hits with the packet-tracer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;gt; 
&amp;gt; show nat detail

Manual NAT Policies (Section 1)
1 (Inside_if) to (Outside_if) source static Area51-outside-if Kasperstore  service SVC_30064977916 SVC_30064977916
    translate_hits = 1, untranslate_hits = 1
    Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32
    Service - Origin: tcp source eq 20000 , Translated: tcp source eq 20000 

Auto NAT Policies (Section 2)
1 (Inside_if) to (Outside_if) source static Area51-outside-if Kasperstore  service tcp 20000 20000 
    translate_hits = 0, untranslate_hits = 6
    Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32
    Service - Protocol: tcp Real: 20000 Mapped: 20000 
2 (Inside_if) to (Outside_if) source dynamic Area51_inside_nets interface 
    translate_hits = 83526, untranslate_hits = 2066
    Source - Origin: 192.168.2.0-192.168.3.255, Translated: 192.168.0.254/24
&amp;gt; show nat detail

Manual NAT Policies (Section 1)
1 (Inside_if) to (Outside_if) source static Area51-outside-if Kasperstore  service SVC_30064977916 SVC_30064977916 inactive
    translate_hits = 0, untranslate_hits = 0
    Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32
    Service - Origin: tcp source eq 20000 , Translated: tcp source eq 20000 

Auto NAT Policies (Section 2)
1 (Inside_if) to (Outside_if) source static Area51-outside-if Kasperstore  service tcp 20000 20000 
    translate_hits = 0, untranslate_hits = 7
    Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32
    Service - Protocol: tcp Real: 20000 Mapped: 20000 
2 (Inside_if) to (Outside_if) source dynamic Area51_inside_nets interface 
    translate_hits = 85518, untranslate_hits = 2086
    Source - Origin: 192.168.2.0-192.168.3.255, Translated: 192.168.0.254/24&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Original source IP - 192.168.0.254 -&amp;gt; is the outside-if&lt;/P&gt;&lt;P&gt;Translated source IP - 192.168.2.82 -&amp;gt; is the SFTP-server on port 20000&lt;/P&gt;&lt;P&gt;Br. Kasper&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 06:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656469#M1092110</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-25T06:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656850#M1092119</link>
      <description>&lt;P&gt;Then this looks to be your problem.&lt;/P&gt;
&lt;P&gt;You have the interface IP configured as the original source and the server IP as the translated source.&amp;nbsp; Change these around and test again.&amp;nbsp; If 192.168.0.254 is the interface IP of the FTD you will need to specify interface in the translated section instead of the object.&lt;/P&gt;
&lt;PRE class="lia-code-sample  language-markup"&gt;&lt;CODE&gt;Source - Origin: 192.168.0.254/32, Translated: 192.168.2.82/32&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 13:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656850#M1092119</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-07-25T13:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pat is not working</title>
      <link>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656920#M1092125</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690" target="_self"&gt;&lt;SPAN class=""&gt;Marius Gunnerud&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I think I've already tried this. Now I'm not even reaching Snort engine, and the nat rule is not getting any hits.&lt;/P&gt;&lt;P&gt;edit*&lt;/P&gt;&lt;P&gt;in the former post I have posted the wrong screendumps- I've posted the dynamic NAT ones. So from here on I'll concentrate on the manual NAT rule, and change the orginal &lt;SPAN&gt;source, and translated source. But still it dosn't change anything&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;gt; packet-tracer input Outside_if tcp 192.168.0.232 20000 192.168.2.82 20000 detailed

Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e878da70, priority=13, domain=capture, deny=false
        hits=716207557, user_data=0x1512f18a7b70, cs_id=0x0, l3_type=0x0
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0000.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1688160, priority=1, domain=permit, deny=false
        hits=709439557, user_data=0x0, cs_id=0x0, l3_type=0x8
        src mac=0000.0000.0000, mask=0000.0000.0000
        dst mac=0000.0000.0000, mask=0100.0000.0000
        input_ifc=Outside_if, output_ifc=any

Phase: 3
Type: ROUTE-LOOKUP
Subtype: No ECMP load balancing
Result: ALLOW
Config:
Additional Information:
Destination is locally connected. No ECMP load balancing.
Found next-hop 192.168.2.82 using egress ifc  Inside_if(vrfid:0)

Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit tcp any any eq 20000 rule-id 268438530 
access-list CSM_FW_ACL_ remark rule-id 268438530: ACCESS POLICY: Area51 ACP - Mandatory
access-list CSM_FW_ACL_ remark rule-id 268438530: L7 RULE: SFTP-20000
Additional Information:
 This packet will be sent to snort for additional processing where a verdict will be reached
 Forward Flow based lookup yields rule:
 in  id=0x1512f1c14250, priority=12, domain=permit, deny=false
        hits=22, user_data=0x1513064869c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=20000, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none
        input_ifc=any, output_ifc=any

Phase: 5
Type: CONN-SETTINGS
Subtype: 
Result: ALLOW
Config:
class-map class-default
 match any
policy-map global_policy
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
service-policy global_policy global
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512e858dc50, priority=7, domain=conn-set, deny=false
        hits=16237, user_data=0x1512e8588fe0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=any

Phase: 6
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f142f8b0, priority=0, domain=nat-per-session, deny=false
        hits=1006888, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=any, output_ifc=any

Phase: 7
Type: IP-OPTIONS
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x1512f1690170, priority=0, domain=inspect-ip-options, deny=true
        hits=564137, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=any

Phase: 8
Type: NAT
Subtype: rpf-check
Result: DROP
Config:
nat (Inside_if,Outside_if) source static Kasperstore interface service SVC_30064977916 SVC_30064977916
Additional Information:
 Forward Flow based lookup yields rule:
 out id=0x1512e897fbc0, priority=6, domain=nat-reverse, deny=false
        hits=2, user_data=0x1512f182ff80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=192.168.2.82, mask=255.255.255.255, port=20000, tag=any, dscp=0x0, nsg_id=none
        input_ifc=Outside_if(vrfid:0), output_ifc=Inside_if(vrfid:0)

Result:
input-interface: Outside_if(vrfid:0)
input-status: up
input-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x000056182bf456a5 flow (NA)/NA

&amp;gt; show nat detail

Manual NAT Policies (Section 1)
1 (Inside_if) to (Outside_if) source static Kasperstore interface  service SVC_30064977916 SVC_30064977916
    translate_hits = 0, untranslate_hits = 0
    Source - Origin: 192.168.2.82/32, Translated: 192.168.0.254/24
    Service - Origin: tcp source eq 20000 , Translated: tcp source eq 20000 

Auto NAT Policies (Section 2)
1 (Inside_if) to (Outside_if) source dynamic Area51_inside_nets interface 
    translate_hits = 138968, untranslate_hits = 3856
    Source - Origin: 192.168.2.0-192.168.3.255, Translated: 192.168.0.254/24&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br. Kasper&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 16:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-is-not-working/m-p/4656920#M1092125</guid>
      <dc:creator>Kasper Elsborg</dc:creator>
      <dc:date>2022-07-25T16:24:50Z</dc:date>
    </item>
  </channel>
</rss>

