<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD NAT Issue on UDP port 500 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164833#M1115282</link>
    <description>&lt;P&gt;IPSEC Worked with dyanmic NAT. Static NAT not needed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;NAT-T was needed on SRX along with local and remote identity command.&lt;BR /&gt;Local identity as External IP of FTD ( Not private IP of SRX)&lt;BR /&gt;Remote identity as Remote VPN Peer&lt;/P&gt;</description>
    <pubDate>Fri, 23 Aug 2024 06:20:01 GMT</pubDate>
    <dc:creator>ahmad82pkn</dc:creator>
    <dc:date>2024-08-23T06:20:01Z</dc:date>
    <item>
      <title>FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155448#M1114829</link>
      <description>&lt;P&gt;Hi Team.&lt;/P&gt;&lt;P&gt;I have a host on LAN that is trying to build IPSEC VPN with remote site.&lt;BR /&gt;I am using Dynamic PAT for all traffic.&lt;BR /&gt;&lt;BR /&gt;I believe it should work.&lt;BR /&gt;&lt;BR /&gt;But interestingly, I see all traffic getting NAT but not UDP 500.&lt;BR /&gt;&lt;BR /&gt;Any idea why? Ideally i want UDP 500 and 4500 to NAT as well.&lt;BR /&gt;&lt;BR /&gt;Packet Tracer for random UDP port 400 shows NAT happening, but port 500 shows not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show conn | include 172.18.6.&lt;BR /&gt;UDP Guest 172.18.6.11:500 outside 54.226.109.1:500, idle 0:00:08, bytes 899668, flags - N1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;NOT Triggering any NAT example&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input Guest udp 172.18.6.11 500 54.226.109.1 500 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 34140 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb8216890, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=21273705388, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=Guest, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8535 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found flow with id 511784475, using existing flow&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 9104 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Verdict: (fast-forward) fast forward this flow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Guest(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 51779 ns&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;#################&lt;BR /&gt;NAT Seems working on RANDOM UDP Ports others than 500&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; packet-tracer input Guest udp 172.18.6.11 400 54.226.109.1 400 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 19915 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb8216890, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=21273715225, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=Guest, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 23898 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 50.225.18.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6828 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group ACL_ global&lt;BR /&gt;access-list ACL_ advanced permit ip any any rule-id 268459024&lt;BR /&gt;access-list ACL_ remark rule-id 268459024: ACCESS POLICY: Guest - Mandatory&lt;BR /&gt;access-list ACL_ remark rule-id 268459024: L7 RULE: Block_Torrent&lt;BR /&gt;Additional Information:&lt;BR /&gt;This packet will be sent to snort for additional processing where a verdict will be reached&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffc069ea80, priority=12, domain=permit, deny=false&lt;BR /&gt;hits=66398194, user_data=0x55877bb780, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6828 ns&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection advanced-options UM_STATIC_TCP_MAP&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe06465f0, priority=7, domain=conn-set, deny=false&lt;BR /&gt;hits=424743281, user_data=0xffe063d220, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=Guest(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6828 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (Guest,outside) source dynamic Guest_Subnet interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 172.18.6.11/400 to 50.225.18.158/58959&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffe423ee70, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=3781633, user_data=0x559fb853b0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.18.0.0, mask=255.255.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=Guest(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6828 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x55a30f7fa0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=423356137, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 6828 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb821cb40, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=432490956, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=Guest(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 35278 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (Guest,outside) source dynamic Guest_Subnet interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xffe423fb60, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1718262, user_data=0x559e514bc0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.18.0.0, mask=255.255.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=Guest(vrfid:0), output_ifc=outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 38692 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x55a30f7fa0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=423356139, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 1138 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xffc441f5b0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=584189667, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=outside(vrfid:0), output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 38123 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 512380988, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_snort&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 9673 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Application: 'SNORT Inspect'&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 137129 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Snort Trace:&lt;BR /&gt;Firewall: starting AC rule matching, zone 9 -&amp;gt; 9, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 61, icmpCode 13&lt;BR /&gt;Firewall: starting AC rule matching, zone 9 -&amp;gt; 9, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 138, icmpCode 109&lt;BR /&gt;Firewall: starting AC rule matching, zone 9 -&amp;gt; 9, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 42, icmpCode 38&lt;BR /&gt;Packet: UDP&lt;BR /&gt;Session: new snort session&lt;BR /&gt;AppID: service unknown (0), application unknown (0)&lt;BR /&gt;Firewall: starting AC rule matching, zone 7 -&amp;gt; 9, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 0, icmpCode 0&lt;BR /&gt;Firewall: pending rule-matching, id 268459024, pending AppID&lt;BR /&gt;Snort id 3, NAP id 2, IPS id 0, Verdict PASS, Blocked by SSL&lt;BR /&gt;Snort Verdict: (pass-packet) allow this packet&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: ECMP load balancing&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 8535 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;ECMP load balancing&lt;BR /&gt;Found next-hop 50.225.18.1 using egress ifc outside(vrfid:0)&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 3414 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 50.225.18.1 on interface outside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address e85c.0a7d.5084 hits 2663213 reference 383&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Guest(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 349935 ns&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 10:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155448#M1114829</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-03T10:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155451#M1114831</link>
      <description>&lt;P&gt;I think these port reserved for ipsec&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So you need static NAT (port forward) not dynamic NAT&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 10:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155451#M1114831</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-03T10:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155465#M1114832</link>
      <description>&lt;P&gt;nat (Guest,outside) source dynamic Guest_Subnet interface&lt;BR /&gt;&lt;BR /&gt;I dont want to create static NAT. As I dont have any Public IP other than WAN Interface with public IP.&lt;BR /&gt;&lt;BR /&gt;Thats what I have&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 11:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155465#M1114832</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-03T11:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155466#M1114833</link>
      <description>&lt;P&gt;&lt;SPAN&gt;add new NAT&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;nat (Guest,outside) source static interface &amp;lt;&lt;STRONG&gt;object&lt;/STRONG&gt; &lt;STRONG&gt;service&lt;/STRONG&gt;&amp;gt;&lt;BR /&gt;&lt;/SPAN&gt;in object service list both 500 and 4500 service&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure this new NAT is in top list of NAT&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 11:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155466#M1114833</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-03T11:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155473#M1114835</link>
      <description>&lt;P&gt;But why all other ports are natting with my existing NAT statement and not only 500 and 4500?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 11:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155473#M1114835</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-03T11:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155474#M1114836</link>
      <description>&lt;P&gt;these port is reserved cannot use for dynamic NAT&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 12:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155474#M1114836</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-03T12:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155559#M1114838</link>
      <description>&lt;P&gt;what is the problem with random udp ports ? typically the ike 500 and 4500 are reserved to the box for ipsec..&lt;/P&gt;
&lt;P&gt;the source port for IKE traffic can be any UDP port.. only the destination needs to be 500/4500.&lt;/P&gt;
&lt;P&gt;are you having an issue with a outbound IPSEC connection using a non 500/4500 source port ?&lt;/P&gt;
&lt;P&gt;Please elaborate .. what client or device are you using behind the firewall and having issues?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 21:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155559#M1114838</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-03T21:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155594#M1114839</link>
      <description>&lt;P&gt;You are correct.&lt;BR /&gt;&lt;BR /&gt;First let me clarify. There was existing connection in Show conn | include IP&lt;BR /&gt;That is why packet trace was not showing correct information and going to fast path..&lt;BR /&gt;&lt;BR /&gt;Clearing Conn entry . I can see its now doing proper NAT in packet tracer.&amp;nbsp; ( So packet tracer is working fine. We can forget about it )&lt;BR /&gt;&lt;BR /&gt;Actual issue is . "I have an SRX router with private IP in my LAN behind Cisco FTD and want to build a VPN with remote Palo Alto"&lt;BR /&gt;&lt;BR /&gt;SRX(private IP)--&amp;gt;FTD(Public IPS IP)---&amp;gt;Internet--&amp;gt;Remote Palo Alto&lt;BR /&gt;&lt;BR /&gt;I am trying to Build IPSEC VPN between SRX and PA.&lt;BR /&gt;&lt;BR /&gt;But its stuck in phase 1 and when I do show conn. It doesnt show NAT happening. So i was wondering if its NAT issue.&amp;nbsp; But Packet capture shows correct NAT happening. But show conn donot show NAT IP.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show conn | include 172.18.6.11&lt;BR /&gt;UDP Guest 172.18.6.11:500 outside 54.226.109.1:500, idle 0:00:05, bytes 2189796, flags - N1&lt;/P&gt;</description>
      <pubDate>Sun, 04 Aug 2024 03:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155594#M1114839</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-04T03:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155596#M1114840</link>
      <description>&lt;P&gt;I think, I have found the problem.&lt;BR /&gt;&lt;BR /&gt;NAT is working fine as per Packet tracer after clearing connection in FTD.&lt;BR /&gt;&lt;BR /&gt;Why SRX not able to build VPN and not showing nat in show conn command is probably due to below misconfig.&lt;BR /&gt;&lt;BR /&gt;SRX has this config.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;set security ike gateway gw-vpn-xxxx no-nat-traversal&lt;BR /&gt;&lt;BR /&gt;I have asked requester(SRX Owner) to remove to enable nat-traversal on SRX and try establish VPN again.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Aug 2024 04:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155596#M1114840</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-04T04:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155597#M1114841</link>
      <description>&lt;P&gt;show conn will not show NAT..&lt;/P&gt;
&lt;P&gt;you have to either do show local-host or show xlate&lt;/P&gt;
&lt;P&gt;show local-host &amp;lt;local ip address of srx&amp;gt;&lt;/P&gt;
&lt;P&gt;i would suggest taking packet captures on both the inside and outside of the ftd.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-with-firepower-threat-defense-f.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-with-firepower-threat-defense-f.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;put the source ip of the srx(private ip addres) and palo as destatnation&lt;/P&gt;
&lt;P&gt;do on both inside and outside that will show you the nated ip address.&lt;/P&gt;
&lt;P&gt;Also run pre-filter as ftd does not need to send this to snort (more issues and wasted resources)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/pre-filter-policy-configuration-on-firepower-threat-defense/ba-p/4671187" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/pre-filter-policy-configuration-on-firepower-threat-defense/ba-p/4671187&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also run debugs on palo and srx to see why there are failing...&lt;/P&gt;</description>
      <pubDate>Sun, 04 Aug 2024 04:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155597#M1114841</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-04T04:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155599#M1114842</link>
      <description>&lt;P&gt;yes most likely.. NAT will work no matter what... but nat traversal will not be used. so IKE negotiation will go through and&lt;/P&gt;
&lt;P&gt;then ipsec ESP will try to get transmitted and FTD will drop as by default it doesnt allow ipsec pass-through.. ASA has the command.. ftd may have to do with flexconfig..&lt;/P&gt;
&lt;P&gt;regardless, yes make sure nat-traversal and run debugs on both sides and see where does it fail...&lt;/P&gt;
&lt;P&gt;Also, implement pre-filter on FTD for best performance.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Aug 2024 04:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155599#M1114842</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-04T04:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155601#M1114843</link>
      <description>&lt;P&gt;SRX must enable nat-t and in ftd you need static NAT.&lt;/P&gt;
&lt;P&gt;Ipsec not work with dynamic NAT.&lt;/P&gt;
&lt;P&gt;""Ipsec detect there is NAT but not detect random port""&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 04 Aug 2024 06:36:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155601#M1114843</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-04T06:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155681#M1114847</link>
      <description>&lt;P&gt;It looks like the problem you're having is with UDP port 500 not being NATed. This can happen if NAT Traversal (NAT-T) is not being set off. IPsec data is usually wrapped in UDP 4500 by NAT-T so that it can get through NAT devices. Because you're using Dynamic PAT, UDP 500 is probably not being blocked by NAT. This is because it's often used for ISAKMP data, which may be handled differently because of security rules. To fix this, make sure that NAT-T is turned on in your VPN settings. This will wrap the traffic in UDP 4500 and let it be NATed properly. Also, make sure that your firewall rules and NAT settings clearly allow NAT for both UDP 500 and 4500.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Aug 2024 15:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155681#M1114847</guid>
      <dc:creator>Aina William</dc:creator>
      <dc:date>2024-08-04T15:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155712#M1114848</link>
      <description>&lt;P&gt;There is no need for STATIC nat if SRX is the initiator ...only if the SRX is the responder, then it needs static NAT..&lt;/P&gt;
&lt;P&gt;hundreds of customers have IPSEC endpoint behind PAT and the work with fine as it is the inititiator .. only the headend (responder) would be need static PAT/NAT..&lt;/P&gt;</description>
      <pubDate>Sun, 04 Aug 2024 19:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5155712#M1114848</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-04T19:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164832#M1115281</link>
      <description>&lt;P&gt;This is not correct . Site to site VPN can work with PAT. Static NAT not needed&lt;BR /&gt;&lt;BR /&gt;I have working setup now. Actual problem was not at FTD but SRX sitting behind FTD with private IP had config issue.&lt;BR /&gt;&lt;BR /&gt;Here is my working PAT config it helps someone.&lt;BR /&gt;&lt;BR /&gt;nat (Guest,carrier-outside) source dynamic IPv4-Private-ObjectGroupA interface&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 06:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164832#M1115281</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-23T06:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164833#M1115282</link>
      <description>&lt;P&gt;IPSEC Worked with dyanmic NAT. Static NAT not needed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;NAT-T was needed on SRX along with local and remote identity command.&lt;BR /&gt;Local identity as External IP of FTD ( Not private IP of SRX)&lt;BR /&gt;Remote identity as Remote VPN Peer&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 06:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164833#M1115282</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-23T06:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164834#M1115283</link>
      <description>&lt;P&gt;Correct&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 06:21:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164834#M1115283</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-23T06:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Issue on UDP port 500</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164837#M1115284</link>
      <description>&lt;P&gt;Issue is resolved after enabling NAT-T on SRX&lt;BR /&gt;Updating local identity and remote identity&amp;nbsp;&lt;BR /&gt;local identity Egress public IP of FTD&lt;/P&gt;&lt;P&gt;remote identity public IP of remote peer&lt;BR /&gt;&lt;BR /&gt;Also SRX Egress interface had IKE system service enabled on untrust zone. But then on interface level it didnt have ike enabled. Which overrides IKE setting enabled on unturst zone level.&lt;BR /&gt;&lt;BR /&gt;Adding ike under interface level was last nail that fixed the issue along with above changes.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;security-zone untrust {&lt;BR /&gt;screen untrust-screen;&lt;BR /&gt;host-inbound-traffic {&lt;BR /&gt;system-services {&lt;BR /&gt;ike;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;interfaces {&lt;BR /&gt;ge-0/0/0.0 {&lt;BR /&gt;host-inbound-traffic {&lt;BR /&gt;system-services {&lt;BR /&gt;&lt;STRONG&gt;ike;&lt;/STRONG&gt;&lt;BR /&gt;dhcp;&lt;BR /&gt;tftp;&lt;BR /&gt;https;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 06:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-issue-on-udp-port-500/m-p/5164837#M1115284</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2024-08-23T06:25:59Z</dc:date>
    </item>
  </channel>
</rss>

