<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT on Firepower FDM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-on-firepower-fdm/m-p/5145934#M1114369</link>
    <description>&lt;P&gt;the static NAT from private IP to Public IP for Server is bidirectional&amp;nbsp;&lt;BR /&gt;you can config static NAT&amp;nbsp;&lt;BR /&gt;1- IN , OUT&amp;nbsp;&lt;BR /&gt;where the source is private IP and translate to public IP&amp;nbsp;&lt;BR /&gt;2- OUT , IN&lt;BR /&gt;where the destination is public IP and translate to private IP&lt;BR /&gt;&lt;BR /&gt;cisco always recommend op1 but you can run both op&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jul 2024 09:16:03 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-07-17T09:16:03Z</dc:date>
    <item>
      <title>NAT on Firepower FDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-firepower-fdm/m-p/5145912#M1114368</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I'm setting up a Firepower (FDM on box) running version 7 as part of a lab environment to prepare for some network changes in our production environment to try to avoid getting stuck late during implementation.&lt;/P&gt;
&lt;P&gt;I was trying to create a simple inbound NAT policy to allow access to an internal server behind a DMZ interface using a public static IP on the outside interface.&lt;/P&gt;
&lt;P&gt;In my experience with SonicWall devices, the public IP is typically the original destination and the private IP is the translated destination. However, I came across a Cisco tutorial suggesting that the FTD configuration would reverse this logic, setting the internal IP as the original packet destination and the public IP as the translated destination.&lt;/P&gt;
&lt;P&gt;I am a bit confused as to why Cisco FTD handles NAT in this way. Is there something I am not getting?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 20:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-firepower-fdm/m-p/5145912#M1114368</guid>
      <dc:creator>qazzapatol</dc:creator>
      <dc:date>2024-07-17T20:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAT on Firepower FDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-firepower-fdm/m-p/5145934#M1114369</link>
      <description>&lt;P&gt;the static NAT from private IP to Public IP for Server is bidirectional&amp;nbsp;&lt;BR /&gt;you can config static NAT&amp;nbsp;&lt;BR /&gt;1- IN , OUT&amp;nbsp;&lt;BR /&gt;where the source is private IP and translate to public IP&amp;nbsp;&lt;BR /&gt;2- OUT , IN&lt;BR /&gt;where the destination is public IP and translate to private IP&lt;BR /&gt;&lt;BR /&gt;cisco always recommend op1 but you can run both op&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 09:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-firepower-fdm/m-p/5145934#M1114369</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-17T09:16:03Z</dc:date>
    </item>
  </channel>
</rss>

