<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower NAT Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916635#M1103980</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are right about. I tried to ping from internal device and it failed. Anyway, I tried to issue "&lt;STRONG&gt;packet tracer&lt;/STRONG&gt;" command on the FTD using the same internal device IP "192.168.10.1" and the result is "Allow" as shown in the screenshot, but the ping from the same device is &lt;STRONG&gt;failed&lt;/STRONG&gt; (I tried different testing other than Ping as well).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SecurityJumbo_0-1693704585670.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/195988i29E6FC945F389675/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SecurityJumbo_0-1693704585670.png" alt="SecurityJumbo_0-1693704585670.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SecurityJumbo_1-1693704832181.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/195989i5976CB4911EFF862/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SecurityJumbo_1-1693704832181.png" alt="SecurityJumbo_1-1693704832181.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I enabled the NAT again, everything start working fine. when the NAT is disabled, the FTD not passing the traffic through.&lt;/P&gt;&lt;P&gt;I'm familiar with routing and Cisco firewall, but this NAT situation confused me and not sure what is going on.&lt;/P&gt;&lt;P&gt;IS there something need to turn off to resolve that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 03 Sep 2023 01:34:27 GMT</pubDate>
    <dc:creator>SecurityJumbo</dc:creator>
    <dc:date>2023-09-03T01:34:27Z</dc:date>
    <item>
      <title>Firepower NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4915729#M1103932</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I'm trying to understand how the Firepower and NAT are working together. I have Firepower is configured with static and default route. It is working fine if I have the NAT policy configured, but when I remove the NAT rule the Firepower inside interface (inside network) cannot reach out to the internet (outside network) anymore.&lt;/P&gt;&lt;P&gt;I have Allow any any for both directions ( inside to outside ) and (outside to inside)&lt;/P&gt;&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 192.168.1.1 1&amp;nbsp;&lt;BR /&gt;route INSIDE 192.168.10.0 255.255.255.0 2.2.2.1 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FTD1# traceroute 192.168.1.1 source &lt;STRONG&gt;192.168.1.248&lt;/STRONG&gt; (Firepower outside interface)&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Tracing the route to 192.168.1.1&lt;/P&gt;&lt;P&gt;1 192.168.1.1 3 msec 1 msec 1 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;traceroute 192.168.1.1 source &lt;STRONG&gt;2.2.2.2&lt;/STRONG&gt; (Firepower inside interface)&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Tracing the route to 192.168.1.1&lt;/P&gt;&lt;P&gt;1 * * **&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does NAT required ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't thing the NAT is required to pass the traffic through the firewall, but how to fix/avoid need NAT for that ?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2023 21:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4915729#M1103932</guid>
      <dc:creator>SecurityJumbo</dc:creator>
      <dc:date>2023-08-31T21:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916009#M1103937</link>
      <description>&lt;P&gt;You cannot source traffic from the firewall inside interface to an outside address. Instead, use packet-tracer to simulate traffic from some other inside address to the outside destination.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2023 09:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916009#M1103937</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-09-01T09:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916430#M1103961</link>
      <description>&lt;P&gt;The need for NAT depends on if the IPs on the outside interface are private, i.e. routable on the inside network, or if it is the internet / public IPs.&amp;nbsp; If they are public IPs on the outside and private IPs on the inside then you need NAT.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2023 22:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916430#M1103961</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-09-01T22:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916635#M1103980</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are right about. I tried to ping from internal device and it failed. Anyway, I tried to issue "&lt;STRONG&gt;packet tracer&lt;/STRONG&gt;" command on the FTD using the same internal device IP "192.168.10.1" and the result is "Allow" as shown in the screenshot, but the ping from the same device is &lt;STRONG&gt;failed&lt;/STRONG&gt; (I tried different testing other than Ping as well).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SecurityJumbo_0-1693704585670.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/195988i29E6FC945F389675/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SecurityJumbo_0-1693704585670.png" alt="SecurityJumbo_0-1693704585670.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SecurityJumbo_1-1693704832181.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/195989i5976CB4911EFF862/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SecurityJumbo_1-1693704832181.png" alt="SecurityJumbo_1-1693704832181.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I enabled the NAT again, everything start working fine. when the NAT is disabled, the FTD not passing the traffic through.&lt;/P&gt;&lt;P&gt;I'm familiar with routing and Cisco firewall, but this NAT situation confused me and not sure what is going on.&lt;/P&gt;&lt;P&gt;IS there something need to turn off to resolve that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Sep 2023 01:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916635#M1103980</guid>
      <dc:creator>SecurityJumbo</dc:creator>
      <dc:date>2023-09-03T01:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916637#M1103981</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have static route and default route for the network on the FTD. Also, I have a default static route on the gateway device that is connected to the FTD firewall as they are L3 connectivity.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Sep 2023 01:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-nat-question/m-p/4916637#M1103981</guid>
      <dc:creator>SecurityJumbo</dc:creator>
      <dc:date>2023-09-03T01:37:09Z</dc:date>
    </item>
  </channel>
</rss>

