<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepowers are not seeing any return traffic from the internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971191#M1106516</link>
    <description>&lt;P&gt;Can I see packet tracer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Mon, 04 Dec 2023 20:04:43 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-12-04T20:04:43Z</dc:date>
    <item>
      <title>Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971188#M1106515</link>
      <description>&lt;P&gt;Hello, we have a newer environment that we have been adding servers and NAT's to over the last few months. Recently ran into an issue where the servers have internet access until I apply a NAT in the firewall. The servers are in Azure and the firewalls are FTDv in Azure. We have an outbound internet policy allowing all, and I see the traffic is allowed outbound, but there isn't return traffic. I verified this with pcaps as well. Any idea why the traffic isn't coming back to the firewall? The odd thing is, that we have one server with a NAT that does have internet access.&lt;/P&gt;&lt;P&gt;We are in Azure North Central with 2 FTDv's that are active/active. Everything in Azure has internet access and traverses these firewalls, except the 3 new servers that were moved into Azure with a NAT rule. And to add one more thing, my server team provides the Microsoft public IP for me and all 3 of these IP's are in a different subnet. Also have a ticket open with Microsoft on this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971188#M1106515</guid>
      <dc:creator>erics08</dc:creator>
      <dc:date>2023-12-04T20:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971191#M1106516</link>
      <description>&lt;P&gt;Can I see packet tracer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:04:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971191#M1106516</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-04T20:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971214#M1106518</link>
      <description>&lt;P&gt;Here is the packet tracer for a constant ping going to Google. The firewall logs show initiator packet, but no responder traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface: GigabitEthernet0/0&lt;BR /&gt;VLAN ID:&lt;BR /&gt;Protocol: ICMP&lt;BR /&gt;Source Type: IPv4&lt;BR /&gt;Source IP value: 10.20.132.50&lt;BR /&gt;Destination Type: IPv4&lt;BR /&gt;Destination IP value: 8.8.8.8&lt;BR /&gt;ICMP Code: 0&lt;BR /&gt;ICMP ID:&lt;BR /&gt;ICMP Type: 8 (Echo Request)&lt;BR /&gt;Treat simulated packet as IPsec/SSL VPN decrypt: false&lt;BR /&gt;Bypass all security checks for simulated packet: false&lt;BR /&gt;Allow simulated packet to transmit from device: false&lt;BR /&gt;Select Device: AZUCSFPP01&lt;BR /&gt;Run trace on all cluster members: false&lt;/P&gt;&lt;P&gt;Device details&lt;BR /&gt;Name: AZUCSFPP01&lt;BR /&gt;ID: f5e5fc74-beb9-11ed-8233-b0944b225a3d&lt;BR /&gt;Type: Device&lt;/P&gt;&lt;P&gt;Phase 1&lt;BR /&gt;ID: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: Implicit Rule&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b08877e0, priority=1, domain=permit, deny=false hits=60863992910, user_data=0x0, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=AZU_InsideZone, output_ifc=any&lt;BR /&gt;Elapsed Time: 10258 ns&lt;/P&gt;&lt;P&gt;Phase 2&lt;BR /&gt;ID: 2&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found next-hop 10.20.101.49 using egress ifc AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 8920 ns&lt;/P&gt;&lt;P&gt;Phase 3&lt;BR /&gt;ID: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: access-group CSM_FW_ACL_ globalaccess-list CSM_FW_ACL_ advanced permit ip ifc AZU_InsideZone object 10_20_0_0_16 ifc AZU_OutsideZone any rule-id 268447747 access-list CSM_FW_ACL_ remark rule-id 268447747: ACCESS POLICY: AzureNorthCentralAccessControlPolicy - Mandatoryaccess-list CSM_FW_ACL_ remark rule-id 268447747: L7 RULE: ALLOW_INSIDE_OUT&lt;BR /&gt;Additional Information: This packet will be sent to snort for additional processing where a verdict will be reached Forward Flow based lookup yields rule: in id=0x15040bced2a0, priority=12, domain=permit, deny=false hits=128119090, user_data=0x1503dd34a440, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.20.0.0, mask=255.255.0.0, port=0, tag=any, ifc=AZU_InsideZone(vrfid:0) dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=AZU_OutsideZone(vrfid:0), vlan=0, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 1873 ns&lt;/P&gt;&lt;P&gt;Phase 4&lt;BR /&gt;ID: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: class-map class-default match anypolicy-map global_policy class class-default set connection advanced-options UM_STATIC_TCP_MAPservice-policy global_policy global&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b132f940, priority=7, domain=conn-set, deny=false hits=160785440, user_data=0x1503b132acd0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 1873 ns&lt;/P&gt;&lt;P&gt;Phase 5&lt;BR /&gt;ID: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: nat (AZU_InsideZone,AZU_OutsideZone) source static 10_20_132_50 20_221_254_24 description Tekla_2&lt;BR /&gt;Additional Information: Static translate 10.20.132.50/0 to 20.221.254.24/0 Forward Flow based lookup yields rule: in id=0x1503b31a4890, priority=6, domain=nat, deny=false hits=221, user_data=0x1503b2aebbc0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.20.132.50, mask=255.255.255.255, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 1873 ns&lt;/P&gt;&lt;P&gt;Phase 6&lt;BR /&gt;ID: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b03e4440, priority=0, domain=nat-per-session, deny=true hits=163581562, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 1873 ns&lt;/P&gt;&lt;P&gt;Phase 7&lt;BR /&gt;ID: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b088f110, priority=0, domain=inspect-ip-options, deny=true hits=187836233, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 1873 ns&lt;/P&gt;&lt;P&gt;Phase 8&lt;BR /&gt;ID: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: class-map inspection_default match default-inspection-trafficpolicy-map global_policy class inspection_default inspect icmp service-policy global_policy global&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b13106f0, priority=70, domain=inspect-icmp, deny=false hits=16042231, user_data=0x1503b130f110, cs_id=0x0, use_real_addr, flags=0x0, protocol=1 src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 16502 ns&lt;/P&gt;&lt;P&gt;Phase 9&lt;BR /&gt;ID: 9&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b1319530, priority=70, domain=inspect-icmp-error, deny=false hits=16042231, user_data=0x1503b1317f50, cs_id=0x0, use_real_addr, flags=0x0, protocol=1 src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 2230 ns&lt;/P&gt;&lt;P&gt;Phase 10&lt;BR /&gt;ID: 10&lt;BR /&gt;Type: QOS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b13c0100, priority=70, domain=qos-per-class, deny=false hits=313786802, user_data=0x1503b1254ea0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 446 ns&lt;/P&gt;&lt;P&gt;Phase 11&lt;BR /&gt;ID: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: nat (AZU_InsideZone,AZU_OutsideZone) source static 10_20_132_50 20_221_254_24 description Tekla_2&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: out id=0x1503b27b1fa0, priority=6, domain=nat-reverse, deny=false hits=222, user_data=0x1503b1888640, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.20.132.50, mask=255.255.255.255, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 8028 ns&lt;/P&gt;&lt;P&gt;Phase 12&lt;BR /&gt;ID: 12&lt;BR /&gt;Type: QOS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x1503b13c0100, priority=70, domain=qos-per-class, deny=false hits=313786803, user_data=0x1503b1254ea0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 22300 ns&lt;/P&gt;&lt;P&gt;Phase 13&lt;BR /&gt;ID: 13&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x1503b03e4440, priority=0, domain=nat-per-session, deny=true hits=163581564, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 892 ns&lt;/P&gt;&lt;P&gt;Phase 14&lt;BR /&gt;ID: 14&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x1503b0909330, priority=0, domain=inspect-ip-options, deny=true hits=128152450, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_OutsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 446 ns&lt;/P&gt;&lt;P&gt;Phase 15&lt;BR /&gt;ID: 15&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: New flow created with id 160155716, packet dispatched to next moduleModule information for forward flow ...snp_fp_inspect_ip_optionssnp_fp_snortsnp_fp_inspect_icmpsnp_fp_translatesnp_fp_adjacencysnp_fp_fragmentsnp_fp_tracer_dropsnp_ifc_statModule information for reverse flow ...snp_fp_inspect_ip_optionssnp_fp_translatesnp_fp_inspect_icmpsnp_fp_snortsnp_fp_adjacencysnp_fp_fragmentsnp_fp_tracer_dropsnp_ifc_stat&lt;BR /&gt;Elapsed Time: 14718 ns&lt;/P&gt;&lt;P&gt;Phase 16&lt;BR /&gt;ID: 16&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Application: 'SNORT Inspect'&lt;BR /&gt;Elapsed Time: 22746 ns&lt;/P&gt;&lt;P&gt;Phase 17&lt;BR /&gt;ID: 17&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: service: ICMP(3501), client: (0), payload: (0), misc: (0)&lt;BR /&gt;Elapsed Time: 13444 ns&lt;/P&gt;&lt;P&gt;Phase 18&lt;BR /&gt;ID: 18&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: Network 0, Inspection 0, Detection 4, Rule ID 268447747&lt;BR /&gt;Additional Information: Starting rule matching, zone 2 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xffMatched rule ids 268447747 - Allow&lt;BR /&gt;Elapsed Time: 164572 ns&lt;/P&gt;&lt;P&gt;Phase 19&lt;BR /&gt;ID: 19&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found next-hop 10.20.101.49 using egress ifc AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 4014 ns&lt;/P&gt;&lt;P&gt;Phase 20&lt;BR /&gt;ID: 20&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found adjacency entry for Next-hop 10.20.101.49 on interface AZU_OutsideZoneAdjacency :ActiveMAC address 1234.5678.9abc hits 14601632 reference 7284&lt;BR /&gt;Elapsed Time: 446 ns&lt;/P&gt;&lt;P&gt;Result&lt;BR /&gt;Input Interface: AZU_InsideZone(vrfid:0)&lt;BR /&gt;Input Status: up&lt;BR /&gt;Input Line Status: up&lt;BR /&gt;Output Interface: AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Output Status: up&lt;BR /&gt;Output Line Status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 299327 ns&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:32:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971214#M1106518</guid>
      <dc:creator>erics08</dc:creator>
      <dc:date>2023-12-04T20:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971215#M1106519</link>
      <description>&lt;P&gt;Use packet tracer using tcp not ICMP packet.&lt;/P&gt;
&lt;P&gt;Share result here&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971215#M1106519</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-04T20:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971217#M1106520</link>
      <description>&lt;P&gt;Does it matter what port I use? I am not sure how packet tracer works, I don't have a lot of experience with FMC quite yet. Is it just a synthetic transaction that I can use 8.8.8.8 for a destination with https as both source and dest ports? Here is that output:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Interface: GigabitEthernet0/0&lt;BR /&gt;VLAN ID:&lt;BR /&gt;Protocol: TCP&lt;BR /&gt;Source Type: IPv4&lt;BR /&gt;Source IP value: 10.20.132.50&lt;BR /&gt;Source Port: https&lt;BR /&gt;Source SPI:&lt;BR /&gt;Destination Type: IPv4&lt;BR /&gt;Destination IP value: 8.8.8.8&lt;BR /&gt;Destination port: https&lt;BR /&gt;Inline Tag:&lt;BR /&gt;Treat simulated packet as IPsec/SSL VPN decrypt: false&lt;BR /&gt;Bypass all security checks for simulated packet: false&lt;BR /&gt;Allow simulated packet to transmit from device: false&lt;BR /&gt;Select Device: AZUCSFPP01&lt;BR /&gt;Run trace on all cluster members: false&lt;/P&gt;&lt;P&gt;Device details&lt;BR /&gt;Name: AZUCSFPP01&lt;BR /&gt;ID: f5e5fc74-beb9-11ed-8233-b0944b225a3d&lt;BR /&gt;Type: Device&lt;/P&gt;&lt;P&gt;Phase 1&lt;BR /&gt;ID: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found next-hop 10.20.101.49 using egress ifc AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 15164 ns&lt;/P&gt;&lt;P&gt;Phase 2&lt;BR /&gt;ID: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: access-group CSM_FW_ACL_ globalaccess-list CSM_FW_ACL_ advanced permit ip ifc AZU_InsideZone object 10_20_0_0_16 ifc AZU_OutsideZone any rule-id 268447747 access-list CSM_FW_ACL_ remark rule-id 268447747: ACCESS POLICY: AzureNorthCentralAccessControlPolicy - Mandatoryaccess-list CSM_FW_ACL_ remark rule-id 268447747: L7 RULE: ALLOW_INSIDE_OUT&lt;BR /&gt;Additional Information: This packet will be sent to snort for additional processing where a verdict will be reached Forward Flow based lookup yields rule: in id=0x15040bced2a0, priority=12, domain=permit, deny=false hits=128157445, user_data=0x1503dd34a440, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.20.0.0, mask=255.255.0.0, port=0, tag=any, ifc=AZU_InsideZone(vrfid:0) dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=AZU_OutsideZone(vrfid:0), vlan=0, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 2140 ns&lt;/P&gt;&lt;P&gt;Phase 3&lt;BR /&gt;ID: 3&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: class-map class-default match anypolicy-map global_policy class class-default set connection advanced-options UM_STATIC_TCP_MAPservice-policy global_policy global&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b132f940, priority=7, domain=conn-set, deny=false hits=160829310, user_data=0x1503b132acd0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 2140 ns&lt;/P&gt;&lt;P&gt;Phase 4&lt;BR /&gt;ID: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: nat (AZU_InsideZone,AZU_OutsideZone) source static 10_20_132_50 20_221_254_24 description Tekla_2&lt;BR /&gt;Additional Information: Static translate 10.20.132.50/443 to 20.221.254.24/443 Forward Flow based lookup yields rule: in id=0x1503b31a4890, priority=6, domain=nat, deny=false hits=225, user_data=0x1503b2aebbc0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.20.132.50, mask=255.255.255.255, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 2140 ns&lt;/P&gt;&lt;P&gt;Phase 5&lt;BR /&gt;ID: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b03e0d40, priority=0, domain=nat-per-session, deny=false hits=122546743, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 2140 ns&lt;/P&gt;&lt;P&gt;Phase 6&lt;BR /&gt;ID: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b088f110, priority=0, domain=inspect-ip-options, deny=true hits=187884436, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 2140 ns&lt;/P&gt;&lt;P&gt;Phase 7&lt;BR /&gt;ID: 7&lt;BR /&gt;Type: QOS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x1503b13c0100, priority=70, domain=qos-per-class, deny=false hits=313873239, user_data=0x1503b1254ea0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 7582 ns&lt;/P&gt;&lt;P&gt;Phase 8&lt;BR /&gt;ID: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: nat (AZU_InsideZone,AZU_OutsideZone) source static 10_20_132_50 20_221_254_24 description Tekla_2&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: out id=0x1503b27b1fa0, priority=6, domain=nat-reverse, deny=false hits=226, user_data=0x1503b1888640, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.20.132.50, mask=255.255.255.255, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_InsideZone(vrfid:0), output_ifc=AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 3568 ns&lt;/P&gt;&lt;P&gt;Phase 9&lt;BR /&gt;ID: 9&lt;BR /&gt;Type: QOS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x1503b13c0100, priority=70, domain=qos-per-class, deny=false hits=313873240, user_data=0x1503b1254ea0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 15164 ns&lt;/P&gt;&lt;P&gt;Phase 10&lt;BR /&gt;ID: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x1503b03e0d40, priority=0, domain=nat-per-session, deny=false hits=122546745, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 0 ns&lt;/P&gt;&lt;P&gt;Phase 11&lt;BR /&gt;ID: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x1503b0909330, priority=0, domain=inspect-ip-options, deny=true hits=128190980, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=AZU_OutsideZone(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 0 ns&lt;/P&gt;&lt;P&gt;Phase 12&lt;BR /&gt;ID: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: New flow created with id 160199567, packet dispatched to next moduleModule information for forward flow ...snp_fp_inspect_ip_optionssnp_fp_tcp_normalizersnp_fp_snortsnp_fp_translatesnp_fp_tcp_normalizersnp_fp_adjacencysnp_fp_fragmentsnp_fp_tracer_dropsnp_ifc_statModule information for reverse flow ...snp_fp_inspect_ip_optionssnp_fp_tcp_normalizersnp_fp_translatesnp_fp_snortsnp_fp_tcp_normalizersnp_fp_adjacencysnp_fp_fragmentsnp_fp_tracer_dropsnp_ifc_stat&lt;BR /&gt;Elapsed Time: 12488 ns&lt;/P&gt;&lt;P&gt;Phase 13&lt;BR /&gt;ID: 13&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Application: 'SNORT Inspect'&lt;BR /&gt;Elapsed Time: 56196 ns&lt;/P&gt;&lt;P&gt;Phase 14&lt;BR /&gt;ID: 14&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: service: DNS over HTTPS(4624), client: (0), payload: (0), misc: (0)&lt;BR /&gt;Elapsed Time: 16588 ns&lt;/P&gt;&lt;P&gt;Phase 15&lt;BR /&gt;ID: 15&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: Network 0, Inspection 0, Detection 4, Rule ID 268447747&lt;BR /&gt;Additional Information: Starting rule matching, zone 2 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xffMatched rule ids 268447747 - Allow&lt;BR /&gt;Elapsed Time: 632221 ns&lt;/P&gt;&lt;P&gt;Phase 16&lt;BR /&gt;ID: 16&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found next-hop 10.20.101.49 using egress ifc AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Elapsed Time: 4014 ns&lt;/P&gt;&lt;P&gt;Phase 17&lt;BR /&gt;ID: 17&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found adjacency entry for Next-hop 10.20.101.49 on interface AZU_OutsideZoneAdjacency :ActiveMAC address 1234.5678.9abc hits 15361856 reference 7849&lt;BR /&gt;Elapsed Time: 892 ns&lt;/P&gt;&lt;P&gt;Result&lt;BR /&gt;Input Interface: AZU_InsideZone(vrfid:0)&lt;BR /&gt;Input Status: up&lt;BR /&gt;Input Line Status: up&lt;BR /&gt;Output Interface: AZU_OutsideZone(vrfid:0)&lt;BR /&gt;Output Status: up&lt;BR /&gt;Output Line Status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 774577 ns&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971217#M1106520</guid>
      <dc:creator>erics08</dc:creator>
      <dc:date>2023-12-04T20:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971223#M1106522</link>
      <description>&lt;P&gt;Access to clish of ftd (cli)&lt;/P&gt;
&lt;P&gt;Capture traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then select 1 (router)&lt;/P&gt;
&lt;P&gt;Then in option add server Ip as&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Host x.x.x.x&lt;/P&gt;
&lt;P&gt;Then make server ping to 8.8.8.8&lt;/P&gt;
&lt;P&gt;To exit capture do&lt;/P&gt;
&lt;P&gt;Ctrl + C&lt;/P&gt;
&lt;P&gt;Share output here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971223#M1106522</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-04T20:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971228#M1106523</link>
      <description>&lt;P&gt;I believe this is what you're looking for?&lt;BR /&gt;&lt;BR /&gt;show capture&lt;BR /&gt;capture tekla_outside_int%intf=AZU_OutsideZone% type raw-data trace interface AZU_OutsideZone [Stopped - 0 bytes]&lt;BR /&gt;match ip host 10.20.132.50 any&lt;BR /&gt;capture tac type raw-data interface AZU_OutsideZone [Capturing - 0 bytes]&lt;BR /&gt;match icmp host 20.221.254.24 host 8.8.8.8&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971228#M1106523</guid>
      <dc:creator>erics08</dc:creator>
      <dc:date>2023-12-04T20:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971235#M1106524</link>
      <description>&lt;P&gt;From fmc or cli it same&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share result&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 20:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971235#M1106524</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-04T20:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971241#M1106525</link>
      <description>&lt;P&gt;From FMC, I do a pcap with Protocol: IP, the source 8.8.8.8, destination is my public IP that is setup for the NAT and I see packets. I think I'm understanding that correctly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1: 21:08:17.657039 20.221.254.24 &amp;gt; 8.8.8.8 icmp: echo request&lt;BR /&gt;2: 21:08:22.657253 20.221.254.24 &amp;gt; 8.8.8.8 icmp: echo request&lt;BR /&gt;3: 21:08:27.656734 20.221.254.24 &amp;gt; 8.8.8.8 icmp: echo request&lt;BR /&gt;4: 21:08:32.657223 20.221.254.24 &amp;gt; 8.8.8.8 icmp: echo request&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 21:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971241#M1106525</guid>
      <dc:creator>erics08</dc:creator>
      <dc:date>2023-12-04T21:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971245#M1106526</link>
      <description>&lt;P&gt;Sorry if I late in my reply'&lt;/P&gt;
&lt;P&gt;I Solve many issues for other in same time&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This next hop.I dont understand' if the private IP NATing to public IP 20.221 then why next hop is this IP? And the more confuse point it add to OutZone ?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Additional Information: Found next-hop &lt;STRONG&gt;10.20.101.49&lt;/STRONG&gt; using egress ifc AZU_OutsideZone(vrfid:0)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 21:26:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/4971245#M1106526</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-04T21:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firepowers are not seeing any return traffic from the internet</title>
      <link>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/5045632#M1110135</link>
      <description>&lt;P&gt;Sorry for late reply. This was resolved as an issue with Azure, the public IP wasn't being allowed in Azure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 18:34:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepowers-are-not-seeing-any-return-traffic-from-the-internet/m-p/5045632#M1110135</guid>
      <dc:creator>erics08</dc:creator>
      <dc:date>2024-03-20T18:34:15Z</dc:date>
    </item>
  </channel>
</rss>

