<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 1010 port forwarding issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786328#M1098317</link>
    <description>&lt;P&gt;Before the Access-list, the UN-NAT phase should be seen. Use the below packet tracer and share the output please,&lt;/P&gt;
&lt;PRE&gt;packet-tracer input outside tcp 8.8.8.8 1194 &amp;lt;outside_interface_IP&amp;gt; 1194 detail&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;phase&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Mar 2023 03:13:41 GMT</pubDate>
    <dc:creator>manabans</dc:creator>
    <dc:date>2023-03-03T03:13:41Z</dc:date>
    <item>
      <title>Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786309#M1098308</link>
      <description>&lt;P&gt;Upgraded from ASA - 1010 firepower - Not able to get port forwarding correctly!&amp;nbsp;&lt;/P&gt;&lt;P&gt;please see attached Access list and NAT -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;firepower# show run nat&lt;BR /&gt;nat (inside_2,outside) source static DSM-OVPN interface service _|NatOrigSvc_07ad74-b908-11ed-aee3-6da23dcef6e5 _|NatMappedSvc_0c77ad74-b908-11ed-aee3-6da23ef6e5&lt;BR /&gt;nat (inside_8,outside) source dynamic any-ipv4 interface&lt;BR /&gt;nat (inside_7,outside) source dynamic any-ipv4 interface&lt;BR /&gt;nat (inside_6,outside) source dynamic any-ipv4 interface&lt;BR /&gt;nat (inside_5,outside) source dynamic any-ipv4 interface&lt;BR /&gt;nat (inside_4,outside) source dynamic any-ipv4 interface&lt;BR /&gt;nat (inside_3,outside) source dynamic any-ipv4 interface&lt;BR /&gt;nat (inside_2,outside) source dynamic any-ipv4 interface&lt;BR /&gt;nat (guest-wifi,outside) source static any-ipv4 interface&lt;BR /&gt;firepower#&lt;/P&gt;&lt;P&gt;firepower# packet-tracer input outside tcp 8.8.8.8 1194 10.206.167.131 1194&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 10.206.167.131 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced deny ip any any rule-id 1&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005573dbf0816f flow (NA)/NA&lt;/P&gt;&lt;P&gt;firepower#&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786309#M1098308</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T02:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786312#M1098309</link>
      <description>&lt;P&gt;as per the packet tracer output, its blocked in ACL. check ACLs again to verify traffic is allowed for required source,destination and ports&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786312#M1098309</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2023-03-03T02:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786314#M1098310</link>
      <description>&lt;P&gt;first correct your packet tracer to see where is problem&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;firepower# packet-tracer input inside_&lt;STRONG&gt;X&lt;/STRONG&gt; tcp 10.206.167.131 1194 8.8.8.8 1194 detail &amp;lt;&amp;lt;- X there are many inside interface select one that 10.206.167.x connect to it&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786314#M1098310</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-03T02:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786315#M1098311</link>
      <description>&lt;P&gt;Here are my access list rules - still confused! if you would point out the issue?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786315#M1098311</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T02:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786318#M1098312</link>
      <description>&lt;P&gt;It is important to ensure that the packet tracer we are using is running the correct one when we want to confirm if the NAT configured gets hit.&lt;BR /&gt;nat (inside_2,outside) source static DSM-OVPN interface service _|NatOrigSvc_07ad74-b908-11ed-aee3-6da23dcef6e5 _|NatMappedSvc_0c77ad74-b908-11ed-aee3-6da23ef6e5&lt;/P&gt;
&lt;PRE&gt;packet-tracer input outside tcp 8.8.8.8 1194 &amp;lt;outside_interface_IP&amp;gt; 1194 detail&lt;/PRE&gt;
&lt;P&gt;Assuming 10.206.167.131 is private, this could be the server IP address that is behind inside_2. Please correct me if my interpretation is incorrect.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786318#M1098312</guid>
      <dc:creator>manabans</dc:creator>
      <dc:date>2023-03-03T02:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786319#M1098313</link>
      <description>&lt;P&gt;10.206.167.131 is a NAS connected to a cisco switch I need to utilize Open VPN so I have to forward the port UDP 1194. My provider ISP is 192.168.100.1 ---------------&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;DSM-OVPN - 10.206.167.131&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786319#M1098313</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T02:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786322#M1098315</link>
      <description>&lt;P&gt;firepower#&lt;BR /&gt;firepower# packet-tracer input outside tcp 8.8.8.8 1194 10.206.167.131 1194 de$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 10.206.167.131 using egress ifc inside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced deny ip any any rule-id 1&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff26e37dc0, priority=12, domain=permit, deny=true&lt;BR /&gt;hits=157, user_data=0x14ff18ecb480, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp= 0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005573dbf0816f flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:56:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786322#M1098315</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T02:56:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786327#M1098316</link>
      <description>&lt;P&gt;firepower# packet-tracer input outside tcp 8.8.8.8 1194 192.168.100.1 1194 det$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 192.168.100.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced deny ip any any rule-id 1&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff26e37dc0, priority=12, domain=permit, deny=true&lt;BR /&gt;hits=161, user_data=0x14ff18ecb480, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005573dbf0816f flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786327#M1098316</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T03:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786328#M1098317</link>
      <description>&lt;P&gt;Before the Access-list, the UN-NAT phase should be seen. Use the below packet tracer and share the output please,&lt;/P&gt;
&lt;PRE&gt;packet-tracer input outside tcp 8.8.8.8 1194 &amp;lt;outside_interface_IP&amp;gt; 1194 detail&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;phase&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786328#M1098317</guid>
      <dc:creator>manabans</dc:creator>
      <dc:date>2023-03-03T03:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786329#M1098318</link>
      <description>&lt;P&gt;firepower# packet-tracer input outside tcp 8.8.8.8 1194 192.168.100.1 1194 de$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 192.168.100.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced deny ip any any rule-id 1&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff26e37dc0, priority=12, domain=permit, deny=true&lt;BR /&gt;hits=162, user_data=0x14ff18ecb480, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x00005573dbf0816f flow (NA)/NA&lt;/P&gt;&lt;P&gt;firepower#&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786329#M1098318</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T03:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786330#M1098319</link>
      <description>&lt;P&gt;If possible, help me with the below outputs to understand this better,&lt;/P&gt;
&lt;PRE&gt;show nat detail&lt;BR /&gt;show ip&lt;/PRE&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786330#M1098319</guid>
      <dc:creator>manabans</dc:creator>
      <dc:date>2023-03-03T03:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786331#M1098320</link>
      <description>&lt;P&gt;firepower# packet-tracer input inside_2 tcp 10.206.167.131 1194 8.8.8.8 1194 d$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff25a4f120, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=882129, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=inside_2, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.100.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust object-group |acSvcg-268435457 ifc inside_2 any ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L5 RULE: Inside_Outside_Rule&lt;BR /&gt;object-group service |acSvcg-268435457&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff26e2d290, priority=12, domain=permit, trust&lt;BR /&gt;hits=16631, user_data=0x14ff18eca580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=inside_2(vrfid:0)&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=outside(vrfid:0), vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_2,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.206.167.131/1194 to 192.168.100.4/1194&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff25d3d590, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=16630, user_data=0x14ff25d39030, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff23ec6500, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=28316, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff250c4fa0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=19089, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust object-group |acSvcg-268435457 ifc inside_2 any ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L5 RULE: Inside_Outside_Rule&lt;BR /&gt;object-group service |acSvcg-268435457&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff26e2d290, priority=12, domain=permit, trust&lt;BR /&gt;hits=16631, user_data=0x14ff18eca580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=inside_2(vrfid:0)&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=outside(vrfid:0), vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_2,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.206.167.131/1194 to 192.168.100.4/1194&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff25d3d590, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=16631, user_data=0x14ff25d39030, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff23ec6500, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=28316, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff250c4fa0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=19089, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust object-group |acSvcg-268435457 ifc inside_2 any ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L5 RULE: Inside_Outside_Rule&lt;BR /&gt;object-group service |acSvcg-268435457&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff26e2d290, priority=12, domain=permit, trust&lt;BR /&gt;hits=16631, user_data=0x14ff18eca580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=inside_2(vrfid:0)&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=outside(vrfid:0), vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_2,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.206.167.131/1194 to 192.168.100.4/1194&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff25d3d590, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=16631, user_data=0x14ff25d39030, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff23ec6500, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=28317, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff250c4fa0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=19089, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust object-group |acSvcg-268435457 ifc inside_2 any ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L5 RULE: Inside_Outside_Rule&lt;BR /&gt;object-group service |acSvcg-268435457&lt;BR /&gt;service-object ip&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff26e2d290, priority=12, domain=permit, trust&lt;BR /&gt;hits=16631, user_data=0x14ff18eca580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=inside_2(vrfid:0)&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=outside(vrfid:0), vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 16&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_2,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.206.167.131/1194 to 192.168.100.4/1194&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff25d3d590, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=16631, user_data=0x14ff25d39030, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 17&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff23ec6500, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=28317, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 18&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff250c4fa0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=19090, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 19&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_2,outside) after-auto source dynamic any-ipv4 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x14ff25d3e220, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=15736, user_data=0x14ff25202590, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=inside_2(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 20&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff23ec6500, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=28318, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 21&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x14ff259205c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=27116, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=outside(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 22&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 97942, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 23&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.100.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 24&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 192.168.100.1 on interface outside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address e04b.a675.7d07 hits 322 reference 122&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside_2(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;firepower#&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:22:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786331#M1098320</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T03:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786334#M1098321</link>
      <description />
      <pubDate>Fri, 03 Mar 2023 03:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786334#M1098321</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T03:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786336#M1098322</link>
      <description>&lt;P&gt;No issue at all&lt;/P&gt;
&lt;P&gt;All phase allow there is no drop&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:26:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786336#M1098322</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-03T03:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786340#M1098323</link>
      <description>&lt;P&gt;Do I need to make any changes to Access List? Still not able to make the port forwarding?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786340#M1098323</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T03:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786342#M1098324</link>
      <description>&lt;P&gt;According to packet tracer there is no issue, what exactly you face in real traffic?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786342#M1098324</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-03T03:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786347#M1098325</link>
      <description>&lt;P&gt;port forwarding was working on ASA5506 but since I replace it with 1010 stopped working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have attached old configuration ASA&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 03:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786347#M1098325</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T03:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786355#M1098326</link>
      <description>&lt;P&gt;You use same IP when merge from ASA to FPR' if Yes&lt;/P&gt;
&lt;P&gt;Clear arp and mac address table in connect devices'&lt;/P&gt;
&lt;P&gt;I think these table still show mac of old asa&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 04:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786355#M1098326</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-03T04:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786453#M1098327</link>
      <description>&lt;P&gt;I have a cisco switch, ISP, and NAS - restored but still same issue not able to port forwarding&amp;nbsp;&lt;/P&gt;&lt;P&gt;since I installed the new 1010 IP changed from 192.XXX.XXX.3 to&amp;nbsp;192.XXX.XXX.4&lt;/P&gt;&lt;P&gt;also, I have forwarded the port from the ISP Provider.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 08:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786453#M1098327</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-03T08:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1010 port forwarding issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786605#M1098330</link>
      <description>&lt;P&gt;put the nat rule in manual nat.&lt;/P&gt;
&lt;P&gt;nat(inside2,outside) after-auto source static DSM-OVPN interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;create the ACL on both direction from inside zone to outside zone where inside zone network will be your DMS-OVPN to any-ipv4 outsidezone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;another rule from outsidezone to insidezone where anyipv4 outside to DSM-OVPN in insidezone.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 11:22:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1010-port-forwarding-issue/m-p/4786605#M1098330</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-03-03T11:22:09Z</dc:date>
    </item>
  </channel>
</rss>

