<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure vFTD NAT rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081216#M1111780</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&amp;gt; packet-tracer input inside tcp 10. 0.0.6 8443 1.1.1.1 12345 details&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;There nothing wrong as I see form OUT to IN&lt;/P&gt;
&lt;P&gt;Check from IN to OUT&lt;/P&gt;</description>
    <pubDate>Sun, 28 Apr 2024 17:29:22 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-04-28T17:29:22Z</dc:date>
    <item>
      <title>Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081088#M1111759</link>
      <description>&lt;P&gt;We have deployed a vFTD on the Azure environment. The configuration of the firewall is as follows.&lt;/P&gt;
&lt;P&gt;inside interface ip : 10.2.2.4/24&lt;/P&gt;
&lt;P&gt;outside interface ip : 10.2.1.4/24&lt;/P&gt;
&lt;P&gt;internal server ip : 10.0.0.6&lt;/P&gt;
&lt;P&gt;Also the firewall is able to ping to the server from its inside interface.&lt;/P&gt;
&lt;P&gt;Now we want to configure the server to be accessible from the internet. So we have created a NAT rule for it.&lt;/P&gt;
&lt;P&gt;TCP PAT from inside:10.0.0.6 8443-8443 to outside:10.2.1.4 8443-8443&lt;/P&gt;
&lt;P&gt;And also created a Access rule to allow connections from outside towards this server. But still we are unable to access the server from outside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below packet tracer snap.&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input outside tcp 1.1.1.1 8443 10.0.0.6 8443&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 25917 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.2.2.1 using egress ifc inside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 0&lt;BR /&gt;Destination Object Group Match Count: 1&lt;BR /&gt;Object Group Search: 0&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 244 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit tcp ifc outside any ifc inside object Prod_KeyClock object-group 8443_port rule-id 268434437&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434437: ACCESS POLICY: Default Access Control Policy - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434437: L7 RULE: Server_Access&lt;BR /&gt;object-group service 8443_port tcp&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 244 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 244 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 244 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 18093 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 4890 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Prod_KeyClock interface service SVC_4294975244 SVC_4294975244&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 49876 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000558b65312829 flow (NA)/NA&lt;/P&gt;
&lt;P&gt;Also a public IP has been assigned to the firewall in Azure.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 14:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081088#M1111759</guid>
      <dc:creator>amitspanchal</dc:creator>
      <dc:date>2024-04-28T14:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081159#M1111770</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Phase: 8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: rpf-check&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;you have DROP here, can you post relevant config NAT and ACL to look&lt;/P&gt;
&lt;P&gt;check some example :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0000904" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0000904&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081159#M1111770</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-04-28T16:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081161#M1111771</link>
      <description>&lt;P&gt;Wrong packet tracer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;gt; packet-tracer input outside tcp 1.1.1.1 12345 &lt;STRONG&gt;10.2.1.4&lt;/STRONG&gt; 8443 detail&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Share about of above&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081161#M1111771</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T16:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081166#M1111772</link>
      <description>&lt;P&gt;&amp;gt; packet-tracer input outside tcp 1.1.1.1 12345 10.2.1.4 8443&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 21516 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Prod_KeyClock interface service SVC_4294975244 SVC_4294975244&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate 10.2.1.4/8443 to 10.0.0.6/8443&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 0&lt;BR /&gt;Destination Object Group Match Count: 1&lt;BR /&gt;Object Group Search: 0&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit tcp ifc outside any ifc inside object Prod_KeyClock object-group 8443_port rule-id 268434437&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434437: ACCESS POLICY: Default Access Control Policy - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434437: L7 RULE: Server_Access&lt;BR /&gt;object-group service 8443_port tcp&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Prod_KeyClock interface service SVC_4294975244 SVC_4294975244&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 1.1.1.1/12345 to 1.1.1.1/12345&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14670 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 4890 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Prod_KeyClock interface service SVC_4294975244 SVC_4294975244&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 31785 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 489 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 12714 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1360, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Phase: 14&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 42543 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;
&lt;P&gt;Phase: 15&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 229552 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 0, Rule ID 268434437&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 1 -&amp;gt; 2, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268434437 - Allow&lt;/P&gt;
&lt;P&gt;Phase: 16&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19534 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;service: (0), client: (0), payload: (0), misc: (0)&lt;/P&gt;
&lt;P&gt;Phase: 17&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 5868 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.2.2.1 using egress ifc inside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 18&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 1467 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.2.2.1 on interface inside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 1234.5678.9abc hits 26 reference 1&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 386003 ns&lt;/P&gt;
&lt;P&gt;By the way which you said me the result is showing me allow. So what could be the reason that the server is not accessible from outside.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081166#M1111772</guid>
      <dc:creator>amitspanchal</dc:creator>
      <dc:date>2024-04-28T16:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081179#M1111773</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Do test again and share result' some times packet tracer need to run twice to show where packet drop.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do show arp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check is IP-MAC is correct or not&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Last point the next-hop is in different subnet than server ???&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Next-hop &lt;STRONG&gt;10.2.2.1&lt;/STRONG&gt; on interface inside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 1234.5678.9abc hits 26 reference 1&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081179#M1111773</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T16:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081189#M1111775</link>
      <description>&lt;P&gt;Have run the test again and this time also the result showed success.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Also I had done show arp but didn't got any arp entry for that IP. But I am able to ping 10.0.0.6 from the firewall.&lt;/P&gt;
&lt;P&gt;&amp;gt; ping interface inside 10.0.0.6&lt;BR /&gt;Please use 'CTRL+C' to cancel/abort...&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.0.0.6, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;BR /&gt;&amp;gt; show arp&lt;BR /&gt;outside 10.2.1.1 1234.5678.9abc 11273&lt;BR /&gt;inside 10.2.2.1 1234.5678.9abc 3075&lt;BR /&gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;The next hop to the server network is in the same network of the inside interface network.&lt;/P&gt;
&lt;P&gt;&amp;gt; show route 10.0.0.6&lt;/P&gt;
&lt;P&gt;Routing entry for 10.0.0.0 255.255.255.0&lt;BR /&gt;Known via "static", distance 1, metric 0&lt;BR /&gt;Routing Descriptor Blocks:&lt;BR /&gt;* 10.2.2.1, via inside&lt;BR /&gt;Route metric is 0, traffic share count is 1&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 16:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081189#M1111775</guid>
      <dc:creator>amitspanchal</dc:creator>
      <dc:date>2024-04-28T16:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081192#M1111778</link>
      <description>&lt;P&gt;This inside L3 device 10.2.2.1 have defualt route toward FTD?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 17:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081192#M1111778</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T17:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081197#M1111779</link>
      <description>&lt;P&gt;yes it has default route towards firewall&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 17:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081197#M1111779</guid>
      <dc:creator>amitspanchal</dc:creator>
      <dc:date>2024-04-28T17:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081216#M1111780</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;gt; packet-tracer input inside tcp 10. 0.0.6 8443 1.1.1.1 12345 details&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;There nothing wrong as I see form OUT to IN&lt;/P&gt;
&lt;P&gt;Check from IN to OUT&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 17:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081216#M1111780</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T17:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081226#M1111781</link>
      <description>&lt;P&gt;&amp;gt; packet-tracer input inside tcp 10.0.0.6 8443 1.1.1.1 12345 detailed&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 13203 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f89c01be30, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=239, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 17604 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.2.1.1 using egress ifc outside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: OBJECT_GROUP_SEARCH&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Source Object Group Match Count: 1&lt;BR /&gt;Destination Object Group Match Count: 1&lt;BR /&gt;Object Group Search: 1&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group CSM_FW_ACL_ global&lt;BR /&gt;access-list CSM_FW_ACL_ advanced permit ip ifc inside object-group FMC_INLINE_src_rule_268434433 ifc outside any rule-id 268434433&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434433: ACCESS POLICY: Default Access Control Policy - Mandatory&lt;BR /&gt;access-list CSM_FW_ACL_ remark rule-id 268434433: L7 RULE: Internet-rULE&lt;BR /&gt;object-group network FMC_INLINE_src_rule_268434433(hitcnt=138, id=4026531842)&lt;BR /&gt;network-object object Hobasa_Prod_Vnet_Network_1(hitcnt=3)&lt;BR /&gt;network-object object Insideinterface_Network(hitcnt=135)&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f89c7653e0, priority=12, domain=permit, deny=false&lt;BR /&gt;hits=2, user_data=0x14f8e9de1200, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=240.0.0.2, mask=255.255.255.255, port=0, tag=any, ifc object-group id 973&lt;BR /&gt;dst ip/id=240.1.0.2, mask=255.255.255.255, port=0, tag=any, ifc=outside(vrfid:0),&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f89c1cd6c0, priority=7, domain=conn-set, deny=false&lt;BR /&gt;hits=2, user_data=0x14f89c1c37d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=inside(vrfid:0), output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Prod_KeyClock interface service SVC_4294975244 SVC_4294975244&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.0.0.6/8443 to 10.2.1.4/8443&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f89c045d90, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=1, user_data=0x14f89c3277f0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=10.0.0.6, mask=255.255.255.255, port=8443, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=inside(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f8ffa64760, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=583, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 195 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f89c025c80, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=147, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=inside(vrfid:0), output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14181 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f8ffe6ae30, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=37, user_data=0x14f89c06a810, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6357 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Prod_KeyClock interface service SVC_4294975244 SVC_4294975244&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x14f89d7b7680, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=2, user_data=0x14f89c6058e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=10.0.0.6, mask=255.255.255.255, port=8443, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=inside(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 27384 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f8ffe6ae30, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=38, user_data=0x14f89c06a810, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 489 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f8ffa64760, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=585, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 0 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x14f8fff71c30, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=206, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=outside(vrfid:0), output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 10758 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1526, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Phase: 15&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 38142 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;
&lt;P&gt;Phase: 16&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 348582 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 0, Rule ID 268434433&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 2 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff&lt;BR /&gt;Matched rule ids 268434433 - Allow&lt;/P&gt;
&lt;P&gt;Phase: 17&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: appid&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 24540 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;service: (0), client: (0), payload: (0), misc: (0)&lt;/P&gt;
&lt;P&gt;Phase: 18&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 4890 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.2.1.1 using egress ifc outside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 19&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 1956 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.2.1.1 on interface outside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 1234.5678.9abc hits 13 reference 1&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 509061 ns&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This also shows as allow.&lt;/P&gt;
&lt;P&gt;Is there anything that I have to do at Azure end?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 17:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081226#M1111781</guid>
      <dc:creator>amitspanchal</dc:creator>
      <dc:date>2024-04-28T17:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081233#M1111782</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;gt; show arp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;outside 10.2.1.1 1234.5678.9abc 11273&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inside 10.2.2.1 1234.5678.9abc 3075&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Both use same mac if you not change it!!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2024 18:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5081233#M1111782</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-28T18:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vFTD NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5118417#M1113046</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;Thanks for you help, but we have figured out the solution. Actually the NAT rule for the Azure firewall has to configure differently compared to the on-prem firewall. Below NAT rule I have applied and worked for me.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amitspanchal_0-1716894859379.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219330i1440AEDD5F7A88D7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amitspanchal_0-1716894859379.png" alt="amitspanchal_0-1716894859379.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 11:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-vftd-nat-rule/m-p/5118417#M1113046</guid>
      <dc:creator>amitspanchal</dc:creator>
      <dc:date>2024-05-28T11:11:34Z</dc:date>
    </item>
  </channel>
</rss>

