<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower VTI  to Azure no traffic flow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4669921#M1092717</link>
    <description>&lt;P&gt;Managed to get this issue resolved, problem looked to be with OSPF and BGP&amp;nbsp;redistribution. Removed this element for now to get connectivity to Azure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Thank you again for your help, unfortunately the FMC wouldn't allow the use of route-lookup when using (any,any). In the end NAT rule used was&amp;nbsp;&lt;SPAN&gt;nat (Inside,Outside) source static NetworkGroup_MBInsideVLANS NetworkGroup_MBInsideVLANS destination static NetworkGroup_vnet-hub-uks-01_Subnets NetworkGroup_vnet-hub-uks-01_Subnets&amp;nbsp;no-proxy-arp route-lookup.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Aug 2022 13:00:40 GMT</pubDate>
    <dc:creator>jsalmond</dc:creator>
    <dc:date>2022-08-16T13:00:40Z</dc:date>
    <item>
      <title>Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667135#M1092552</link>
      <description>&lt;P&gt;Afternoon,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have set up route based VPN between our on-premise Firepower appliance (Using FMC) and Azure, the VPN is up and BGP is advertising routes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue we face is that we are unable to ping or RDP to a VM in Azure from the inside networks. ACL are in place and according to Packet Tracer they traffic is allowed but then gets dropped with the reason unexpected-packet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: VTI_MBtoAzure(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (unexpected-packet) Unexpected packet, Drop-location: frame 0x000000aaacc88868 flow (NA)/NA&lt;/P&gt;&lt;P&gt;I can ping the&amp;nbsp; VM from the FTD's CLI using&amp;nbsp;&amp;nbsp;"ping tcp&amp;nbsp; &amp;lt;AzureVM IP&amp;gt; 3389" but not if i specify the source and use an IP address within the inside security zone.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought that the&amp;nbsp;unexpected-packet may be related to NAT rules configured but I have tied the following rules with no luck&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (any,any) source static InsideSubnets&amp;nbsp;InsideSubnets destination static AzureSubnets&amp;nbsp;AzureSubnets NetworkGroup_vnet-hub-uks-01_Subnets&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (Inside,any) source static InsideSubnets&amp;nbsp;InsideSubnets destination static AzureSubnets&amp;nbsp;AzureSubnets NetworkGroup_vnet-hub-uks-01_Subnets&amp;nbsp; route-lookup&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 11:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667135#M1092552</guid>
      <dc:creator>jsalmond</dc:creator>
      <dc:date>2022-08-10T11:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667200#M1092553</link>
      <description>&lt;P&gt;Hello ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;please try the below :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;remove (any, any) and try to use specific names in the nat rules&amp;nbsp;&lt;/P&gt;&lt;P&gt;apply pre-filter on the traffic and see if issue is related to the NAP or snort,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 13:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667200#M1092553</guid>
      <dc:creator>Moh Shakhatreh</dc:creator>
      <dc:date>2022-08-10T13:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667224#M1092555</link>
      <description>&lt;P&gt;do same packet-tracer but with detail may be it give us some hint where the packet is drop&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 13:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667224#M1092555</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-10T13:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667229#M1092556</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1389447"&gt;@Moh Shakhatreh&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply&amp;nbsp;&lt;SPAN&gt;pre-filter are in place and packet&amp;nbsp;tracer shows it as allowed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;FMC doesn't have an option to&amp;nbsp;specify the VTI interface and if I use Inside to Outside the traffic is then not routed out the VTI and over VPN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;James&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 13:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667229#M1092556</guid>
      <dc:creator>jsalmond</dc:creator>
      <dc:date>2022-08-10T13:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667281#M1092563</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply, the results show 12 Phases with result as Allow it not until the results we see&amp;nbsp;Action: drop&lt;BR /&gt;Drop-reason: (unexpected-packet) Unexpected packet, Drop-location: frame 0x000000aaacc88868 flow (NA)/NA&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: VTI_MBtoAzure(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (unexpected-packet) Unexpected packet, Drop-location: frame 0x000000aaacc88868 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 14:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667281#M1092563</guid>
      <dc:creator>jsalmond</dc:creator>
      <dc:date>2022-08-10T14:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667289#M1092564</link>
      <description>&lt;P&gt;Share packet-tracer&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 15:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667289#M1092564</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-10T15:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667360#M1092572</link>
      <description>&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.253.1.2 using egress ifc VTI_MBtoAzure(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static NetworkGroup_MBInsideVLANS NetworkGroup_MBInsideVLANS destination static NetworkGroup_vnet-hub-uks-01_Subnets NetworkGroup_vnet-hub-uks-01_Subnets&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface VTI_MBtoAzure(vrfid:0)&lt;BR /&gt;Untranslate 10.40.0.52/3389 to 10.40.0.52/3389&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced trust ip ifc Inside any object-group FMC_INLINE_dst_rule_268457984 rule-id 268457984 event-log flow-end&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268457984: PREFILTER POLICY: HSD-Prefilter-MB&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268457984: RULE: InsudeDMZ_to_Azure&lt;BR /&gt;object-group network FMC_INLINE_dst_rule_268457984&lt;BR /&gt;description: Auto Generated by FMC from dst of PrefilterRule# 10 (HSD-Prefilter-MB/mandatory)&lt;BR /&gt;network-object 10.40.0.52 255.255.255.255&lt;BR /&gt;network-object object Network_vnet-hub-uks-01_subnet&lt;BR /&gt;group-object NetworkGroup_vnet-hub-uks-01_Subnets&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe5ee0fa0, priority=12, domain=permit, trust&lt;BR /&gt;hits=49, user_data=0x5569fe9900, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=Inside(vrfid:0)&lt;BR /&gt;dst ip/id=10.40.0.52, mask=255.255.255.255, port=0, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe43152d0, priority=7, domain=conn-set, deny=false&lt;BR /&gt;hits=62946262, user_data=0xffe4312eb0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=Inside(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static NetworkGroup_MBInsideVLANS NetworkGroup_MBInsideVLANS destination static NetworkGroup_vnet-hub-uks-01_Subnets NetworkGroup_vnet-hub-uks-01_Subnets&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.3.33/3389 to 192.168.3.33/3389&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe82a5c40, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x5562b69870, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=192.168.3.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.40.0.48, mask=255.255.255.240, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x5578648f40, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=14161433, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x557d59cfa0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=63597554, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=Inside(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static NetworkGroup_MBInsideVLANS NetworkGroup_MBInsideVLANS destination static NetworkGroup_vnet-hub-uks-01_Subnets NetworkGroup_vnet-hub-uks-01_Subnets&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xffe8496de0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x5563c726e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=192.168.3.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.40.0.48, mask=255.255.255.240, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x5578648f40, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=14161435, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe5eb3320, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=2603, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=VTI_MBtoAzure(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 64083484, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.253.1.2 using egress ifc VTI_MBtoAzure(vrfid:0)&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: VTI_MBtoAzure(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (unexpected-packet) Unexpected packet, Drop-location: frame 0x000000aaacc88868 flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 17:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667360#M1092572</guid>
      <dc:creator>jsalmond</dc:creator>
      <dc:date>2022-08-10T17:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667452#M1092581</link>
      <description>&lt;P&gt;&lt;SPAN&gt;nat (any,any) source static NetworkGroup_MBInsideVLANS NetworkGroup_MBInsideVLANS destination static NetworkGroup_vnet-hub-uks-01_Subnets NetworkGroup_vnet-hub-uks-01_Subnets &lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;route-lookup&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 20:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4667452#M1092581</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-10T20:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower VTI  to Azure no traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4669921#M1092717</link>
      <description>&lt;P&gt;Managed to get this issue resolved, problem looked to be with OSPF and BGP&amp;nbsp;redistribution. Removed this element for now to get connectivity to Azure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Thank you again for your help, unfortunately the FMC wouldn't allow the use of route-lookup when using (any,any). In the end NAT rule used was&amp;nbsp;&lt;SPAN&gt;nat (Inside,Outside) source static NetworkGroup_MBInsideVLANS NetworkGroup_MBInsideVLANS destination static NetworkGroup_vnet-hub-uks-01_Subnets NetworkGroup_vnet-hub-uks-01_Subnets&amp;nbsp;no-proxy-arp route-lookup.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2022 13:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-vti-to-azure-no-traffic-flow/m-p/4669921#M1092717</guid>
      <dc:creator>jsalmond</dc:creator>
      <dc:date>2022-08-16T13:00:40Z</dc:date>
    </item>
  </channel>
</rss>

