<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTD -  regular translation creation failed for icmp src type 3, code 3 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152020#M1114670</link>
    <description>&lt;P&gt;I am confused, and I have tried to read a lot of this to understand. Please help me understand!&lt;BR /&gt;&lt;BR /&gt;Logs fill with:&amp;nbsp;&lt;BR /&gt;%FTD-3-305006: regular translation creation failed for icmp src Inside:x.x.x.x dst Outside:x.x.x.x (type 3, code 3)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have a manual dynamic nat rule -&lt;BR /&gt;inside -&amp;gt; outside source dynamic (network object for all my local IPv4) interface&lt;BR /&gt;My interface is set with public ipv4 block.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;FTD# show xlate count&lt;BR /&gt;1880 in use, 13244 most used&lt;/P&gt;&lt;P&gt;show asp drop&lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;IPSEC tunnel is down (ipsec-tun-down) 26&lt;BR /&gt;Flow is being freed (flow-being-freed) 701&lt;BR /&gt;Invalid TCP Length (invalid-tcp-hdr-length) 2&lt;BR /&gt;No valid adjacency (no-adjacency) 10703&lt;BR /&gt;No route to host (no-route) 27892&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 326251&lt;BR /&gt;Invalid SPI (np-sp-invalid-spi) 86&lt;BR /&gt;First TCP packet not SYN (tcp-not-syn) 89196&lt;BR /&gt;TCP failed 3 way handshake (tcp-3whs-failed) 6687&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 232722&lt;BR /&gt;TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff) 499&lt;BR /&gt;TCP SYNACK on established conn (tcp-synack-ooo) 193&lt;BR /&gt;TCP packet SEQ past window (tcp-seq-past-win) 1883&lt;BR /&gt;TCP invalid ACK (tcp-invalid-ack) 108&lt;BR /&gt;TCP RST/SYN in window (tcp-rst-syn-in-win) 111&lt;BR /&gt;TCP packet failed PAWS test (tcp-paws-fail) 15&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 1408&lt;BR /&gt;Snort requested to drop the frame (snort-drop) 5423&lt;BR /&gt;Snort instance down not in full proxy (snort-down-not-fp) 1241&lt;BR /&gt;FP L2 rule drop (l2_acl) 32&lt;BR /&gt;Virtual firewall classification failed (ifc-classify) 1&lt;BR /&gt;Interface is down (interface-down) 353&lt;BR /&gt;Dropped pending packets in a closed socket (np-socket-closed) 78890&lt;BR /&gt;Async lock queue limit exceeded (async-lock-queue-limit) 7260&lt;BR /&gt;IKE new SA limit exceeded (ike-sa-rate-limit) 117&lt;BR /&gt;NAT failed (nat-xlate-failed) 5&lt;BR /&gt;TCP Proxy retransmited packet drop (tcp-proxy-retransmit-drop) 1841&lt;BR /&gt;TCP Proxy FP2LW enqueue limit reached (tcp-proxy-fp2lw-enqueue-limit-drop) 726&lt;BR /&gt;TCP Proxy probe reset injected (tcp-proxy-probe-rst-injected) 108180&lt;BR /&gt;TCP Proxy probe receive drop (tcp-proxy-probe-tcp-probe-drop) 59622&lt;BR /&gt;TCP Proxy probe injected packet drop (tcp-proxy-probe-inject-pkt) 1&lt;BR /&gt;Server initiated reset to probe drop (tcp-proxy-probe-server-rst) 23&lt;BR /&gt;Server initiated FIN to Probe drop (tcp-proxy-probe-server-fin) 1449&lt;BR /&gt;Blocked or blacklisted by the firewall preprocessor (firewall) 69383&lt;BR /&gt;Blocked or blacklisted by the stream preprocessor (stream) 72090&lt;BR /&gt;Blocked or blacklisted by the reputation preprocessor (reputation) 20&lt;BR /&gt;Blocked or blacklisted by the IPS preprocessor (ips-preproc) 1&lt;BR /&gt;Packet is blacklisted by snort (snort-blacklist) 132149&lt;BR /&gt;Packet is blocked as requested by snort (snort-block) 829&lt;BR /&gt;Modifies fixed length of data (snort-replace-data-pkt) 4282&lt;BR /&gt;Error during reassembling of packets received from snort (pdts-reassembly-err) 2186&lt;BR /&gt;Dispatch queue tail drops (dispatch-queue-limit) 1838458&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;&lt;P&gt;Flow drop:&lt;BR /&gt;Need to start IKE negotiation (need-ike) 426&lt;BR /&gt;VPN decryption missing (vpn-missing-decrypt) 16&lt;BR /&gt;Inspection failure (inspect-fail) 80&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;U&gt;My ACLs allow ICMP from inside to outside, I've tried enabling icmp inspect, increasing the timeout to a minute...&lt;/U&gt;&lt;BR /&gt;&lt;BR /&gt;FTD# show running-config | i icmp&lt;BR /&gt;icmp unreachable rate-limit 50 burst-size 10&lt;BR /&gt;icmp permit any Outside&lt;BR /&gt;icmp permit any Inside&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:01:00&lt;BR /&gt;inspect icmp error&lt;BR /&gt;inspect icmp&lt;BR /&gt;&lt;BR /&gt;It is confusing, it APPEARS like this is only happening for mac/linux devices.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;TAC suggested just blocking ICMP incoming in the prefilter, and I was like, at least my logs wont be flooded - so I did a prefilter to block any icmp in. ~20 seconds of no translation error, then right back to consistently showing up.&lt;BR /&gt;&lt;BR /&gt;I removed the prefilter rule, and keep reading posts/docs/guides trying to understand.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I tried to create a NAT rule specifically for ICMP, but NAT rules on the FTD managed by FMC, say only TCP/UDP allowed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I did packet captures at the inside interface, outside interface and learned nothing. I checked my connection events surrounding the ICMP message. The connection events say the message was "allowed". from inside to outside.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am confused about what this is telling me,&amp;nbsp;&lt;A href="https://datatracker.ietf.org/doc/html/rfc792" target="_blank"&gt;https://datatracker.ietf.org/doc/html/rfc792&lt;/A&gt;&lt;BR /&gt;ICMP type 3, code 3- Destination Unreachable - Port Unreachable&lt;BR /&gt;&lt;BR /&gt;For example:&lt;BR /&gt;Let's assume&lt;BR /&gt;Internal host 192.168.1.50&lt;BR /&gt;External host 50.10.10.10&lt;BR /&gt;&lt;BR /&gt;Internal host goes to coolwebsite, coolwebsite resolves as 50.10.10.10, Internal tries to http get on port 80, but ports closed, so internal host then sends ICMP 3,3 to 50.10.10.10 -&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Is this how it is supposed to work?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Any advice on understanding the ICMP type 3, code 3 / understanding translation creation failures / any configuration suggestions or where to look would be greatly appreciated.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;FTD 2110 on 7.4.1.1 managed by FMC 1600 on 7.4.1.1&lt;/P&gt;</description>
    <pubDate>Fri, 26 Jul 2024 20:49:50 GMT</pubDate>
    <dc:creator>NA-School</dc:creator>
    <dc:date>2024-07-26T20:49:50Z</dc:date>
    <item>
      <title>FTD -  regular translation creation failed for icmp src type 3, code 3</title>
      <link>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152020#M1114670</link>
      <description>&lt;P&gt;I am confused, and I have tried to read a lot of this to understand. Please help me understand!&lt;BR /&gt;&lt;BR /&gt;Logs fill with:&amp;nbsp;&lt;BR /&gt;%FTD-3-305006: regular translation creation failed for icmp src Inside:x.x.x.x dst Outside:x.x.x.x (type 3, code 3)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have a manual dynamic nat rule -&lt;BR /&gt;inside -&amp;gt; outside source dynamic (network object for all my local IPv4) interface&lt;BR /&gt;My interface is set with public ipv4 block.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;FTD# show xlate count&lt;BR /&gt;1880 in use, 13244 most used&lt;/P&gt;&lt;P&gt;show asp drop&lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;IPSEC tunnel is down (ipsec-tun-down) 26&lt;BR /&gt;Flow is being freed (flow-being-freed) 701&lt;BR /&gt;Invalid TCP Length (invalid-tcp-hdr-length) 2&lt;BR /&gt;No valid adjacency (no-adjacency) 10703&lt;BR /&gt;No route to host (no-route) 27892&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 326251&lt;BR /&gt;Invalid SPI (np-sp-invalid-spi) 86&lt;BR /&gt;First TCP packet not SYN (tcp-not-syn) 89196&lt;BR /&gt;TCP failed 3 way handshake (tcp-3whs-failed) 6687&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 232722&lt;BR /&gt;TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff) 499&lt;BR /&gt;TCP SYNACK on established conn (tcp-synack-ooo) 193&lt;BR /&gt;TCP packet SEQ past window (tcp-seq-past-win) 1883&lt;BR /&gt;TCP invalid ACK (tcp-invalid-ack) 108&lt;BR /&gt;TCP RST/SYN in window (tcp-rst-syn-in-win) 111&lt;BR /&gt;TCP packet failed PAWS test (tcp-paws-fail) 15&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 1408&lt;BR /&gt;Snort requested to drop the frame (snort-drop) 5423&lt;BR /&gt;Snort instance down not in full proxy (snort-down-not-fp) 1241&lt;BR /&gt;FP L2 rule drop (l2_acl) 32&lt;BR /&gt;Virtual firewall classification failed (ifc-classify) 1&lt;BR /&gt;Interface is down (interface-down) 353&lt;BR /&gt;Dropped pending packets in a closed socket (np-socket-closed) 78890&lt;BR /&gt;Async lock queue limit exceeded (async-lock-queue-limit) 7260&lt;BR /&gt;IKE new SA limit exceeded (ike-sa-rate-limit) 117&lt;BR /&gt;NAT failed (nat-xlate-failed) 5&lt;BR /&gt;TCP Proxy retransmited packet drop (tcp-proxy-retransmit-drop) 1841&lt;BR /&gt;TCP Proxy FP2LW enqueue limit reached (tcp-proxy-fp2lw-enqueue-limit-drop) 726&lt;BR /&gt;TCP Proxy probe reset injected (tcp-proxy-probe-rst-injected) 108180&lt;BR /&gt;TCP Proxy probe receive drop (tcp-proxy-probe-tcp-probe-drop) 59622&lt;BR /&gt;TCP Proxy probe injected packet drop (tcp-proxy-probe-inject-pkt) 1&lt;BR /&gt;Server initiated reset to probe drop (tcp-proxy-probe-server-rst) 23&lt;BR /&gt;Server initiated FIN to Probe drop (tcp-proxy-probe-server-fin) 1449&lt;BR /&gt;Blocked or blacklisted by the firewall preprocessor (firewall) 69383&lt;BR /&gt;Blocked or blacklisted by the stream preprocessor (stream) 72090&lt;BR /&gt;Blocked or blacklisted by the reputation preprocessor (reputation) 20&lt;BR /&gt;Blocked or blacklisted by the IPS preprocessor (ips-preproc) 1&lt;BR /&gt;Packet is blacklisted by snort (snort-blacklist) 132149&lt;BR /&gt;Packet is blocked as requested by snort (snort-block) 829&lt;BR /&gt;Modifies fixed length of data (snort-replace-data-pkt) 4282&lt;BR /&gt;Error during reassembling of packets received from snort (pdts-reassembly-err) 2186&lt;BR /&gt;Dispatch queue tail drops (dispatch-queue-limit) 1838458&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;&lt;P&gt;Flow drop:&lt;BR /&gt;Need to start IKE negotiation (need-ike) 426&lt;BR /&gt;VPN decryption missing (vpn-missing-decrypt) 16&lt;BR /&gt;Inspection failure (inspect-fail) 80&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;U&gt;My ACLs allow ICMP from inside to outside, I've tried enabling icmp inspect, increasing the timeout to a minute...&lt;/U&gt;&lt;BR /&gt;&lt;BR /&gt;FTD# show running-config | i icmp&lt;BR /&gt;icmp unreachable rate-limit 50 burst-size 10&lt;BR /&gt;icmp permit any Outside&lt;BR /&gt;icmp permit any Inside&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:01:00&lt;BR /&gt;inspect icmp error&lt;BR /&gt;inspect icmp&lt;BR /&gt;&lt;BR /&gt;It is confusing, it APPEARS like this is only happening for mac/linux devices.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;TAC suggested just blocking ICMP incoming in the prefilter, and I was like, at least my logs wont be flooded - so I did a prefilter to block any icmp in. ~20 seconds of no translation error, then right back to consistently showing up.&lt;BR /&gt;&lt;BR /&gt;I removed the prefilter rule, and keep reading posts/docs/guides trying to understand.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I tried to create a NAT rule specifically for ICMP, but NAT rules on the FTD managed by FMC, say only TCP/UDP allowed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I did packet captures at the inside interface, outside interface and learned nothing. I checked my connection events surrounding the ICMP message. The connection events say the message was "allowed". from inside to outside.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am confused about what this is telling me,&amp;nbsp;&lt;A href="https://datatracker.ietf.org/doc/html/rfc792" target="_blank"&gt;https://datatracker.ietf.org/doc/html/rfc792&lt;/A&gt;&lt;BR /&gt;ICMP type 3, code 3- Destination Unreachable - Port Unreachable&lt;BR /&gt;&lt;BR /&gt;For example:&lt;BR /&gt;Let's assume&lt;BR /&gt;Internal host 192.168.1.50&lt;BR /&gt;External host 50.10.10.10&lt;BR /&gt;&lt;BR /&gt;Internal host goes to coolwebsite, coolwebsite resolves as 50.10.10.10, Internal tries to http get on port 80, but ports closed, so internal host then sends ICMP 3,3 to 50.10.10.10 -&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Is this how it is supposed to work?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Any advice on understanding the ICMP type 3, code 3 / understanding translation creation failures / any configuration suggestions or where to look would be greatly appreciated.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;FTD 2110 on 7.4.1.1 managed by FMC 1600 on 7.4.1.1&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2024 20:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152020#M1114670</guid>
      <dc:creator>NA-School</dc:creator>
      <dc:date>2024-07-26T20:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD -  regular translation creation failed for icmp src type 3, co</title>
      <link>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152030#M1114671</link>
      <description>&lt;P&gt;#show nat pool&lt;/P&gt;
&lt;P&gt;Share this please&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2024 22:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152030#M1114671</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-26T22:25:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTD -  regular translation creation failed for icmp src type 3, co</title>
      <link>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152034#M1114672</link>
      <description>&lt;P&gt;&amp;gt; show nat pool&lt;BR /&gt;TCP PAT pool Outside, address x.x.x.146, range 1-1023, allocated 0&lt;BR /&gt;TCP PAT pool Outside, address x.x.x.146, range 1024-65535, allocated 741&lt;BR /&gt;UDP PAT pool Outside, address x.x.x.146, range 1-1023, allocated 1&lt;BR /&gt;UDP PAT pool Outside, address x.x.x.146, range 1024-65535, allocated 1066&lt;BR /&gt;ICMP PAT pool Outside, address x.x.x.146, range 1-65535, allocated 6&lt;BR /&gt;UDP PAT pool Inside, address 172.16.254.254, range 1-1023, allocated 1&lt;BR /&gt;UDP PAT pool Inside, address 172.16.254.254, range 1024-65535, allocated 2&lt;BR /&gt;TCP PAT pool Inside, address 172.16.254.254, range 1-1023, allocated 1&lt;BR /&gt;TCP PAT pool Inside, address 172.16.254.254, range 1024-65535, allocated 0&lt;BR /&gt;&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2024 23:32:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152034#M1114672</guid>
      <dc:creator>NA-School</dc:creator>
      <dc:date>2024-07-26T23:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD -  regular translation creation failed for icmp src type 3, co</title>
      <link>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152559#M1114698</link>
      <description>&lt;P&gt;The pool not exhaust&amp;nbsp; from share show nat pool&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For example:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Let's assume&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Internal host 192.168.1.50&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;External host 50.10.10.10&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Internal host goes to coolwebsite, coolwebsite resolves as 50.10.10.10, Internal tries to http get on port 80, but ports closed, so internal host then sends ICMP 3,3 to 50.10.10.10 -&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Is this how it is supposed to work?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;No&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The icmp send when there is no port allocate for client' as I see there is no exhaust.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Mac OS can I know the source and destiantion port ? Did you capture the traffic?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 23:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152559#M1114698</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-28T23:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD -  regular translation creation failed for icmp src type 3, co</title>
      <link>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152886#M1114714</link>
      <description>&lt;P&gt;This is wrong: "The icmp send when there is no port allocate for client' as I see there is no exhaust". Actually the 305006 is sent because ASA/FTD doesn't support PAT for ICMP error messages like ICMP Port Unreachable. This is actually a design bug: &lt;SPAN class=""&gt;CSCvv46474&lt;/SPAN&gt; &lt;SPAN class=""&gt;Implement PAT for ICMP error messages on ASA&lt;/SPAN&gt;. There is also a DOC bug: CSCvv55387. Read them, they explain everything pretty well.&lt;/P&gt;&lt;P&gt;In other to understand why exactly you see such messages you need to collect packet captures. Typically, if you see "%FTD-3-305006: regular translation creation failed for icmp src Inside:x.x.x.x dst Outside:y.y.y.y (type 3, code 3)", there was a UDP connection request from Outside:y.y.y.y to Inside:x.x.x.x, but x.x.x.x doesn't listen on the UDP port and hence sends back ICMP Port Unreachable which firewalll fails to PAT. TAC should be able to assist, instead of giving stupid recommendations to block ICMP.&lt;/P&gt;&lt;P&gt;Also, it is possible to block syslog message 305006 or decrease its severity, instead of blocking ICMP altogether.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 14:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152886#M1114714</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-29T14:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTD -  regular translation creation failed for icmp src type 3, co</title>
      <link>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152960#M1114722</link>
      <description>&lt;P&gt;the error is for icmp or other traffic ?&lt;BR /&gt;this need to check&amp;nbsp;&lt;BR /&gt;it can the FTD terminate the traffic on client and send reset but the server dont receive the reset and try connect to host and the xlate is remove the hence the icmp send from FTD to server&amp;nbsp;&lt;BR /&gt;so capture and show conn &amp;lt;ip appear in log&amp;gt; show xlate&amp;nbsp;&lt;BR /&gt;to see what type of traffic this&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (800).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/224758i8810C7BDE44FD8E7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (800).png" alt="Screenshot (800).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 18:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-regular-translation-creation-failed-for-icmp-src-type-3-code/m-p/5152960#M1114722</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-29T18:11:20Z</dc:date>
    </item>
  </channel>
</rss>

