<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 2130 - Current NAT rules failover check. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205803#M1116404</link>
    <description>&lt;P&gt;You run ASA on Firepower&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So there is only one NAT' the NAT in lina of ASA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no NAT in firepower&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2024 14:12:42 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-10-09T14:12:42Z</dc:date>
    <item>
      <title>Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205720#M1116393</link>
      <description>&lt;P&gt;We have a Firepower 2130 that has all it's NAT rules/policies as being imported from our old ASA 5525. The ASA is still in production for a different purpose.&amp;nbsp; While I can see the NAT rules on the Firepower, I can't edit them unless it's done on the ASA.&amp;nbsp; That being said I'm unable to determine if the ASA were to go down would the NAT rules go down with it or are the NAT rules on the FP still locked in until the ASA would be restored?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 11:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205720#M1116393</guid>
      <dc:creator>Mogwai</dc:creator>
      <dc:date>2024-10-09T11:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205789#M1116399</link>
      <description>&lt;P&gt;It's unclear from your question how the 2130 is not currently receiving traffic but...&lt;/P&gt;
&lt;P&gt;If traffic switches over to flow via your Firepower 2130, it would work pretty much the same as your ASA - assuming you migrated the configuration correctly.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 13:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205789#M1116399</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-10-09T13:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205799#M1116403</link>
      <description>&lt;P&gt;I'm confused as I don't think that answers my concern... All I'm concerned about is if the ASA were to go down if the NAT rules on the FP will go down with them &amp;amp; where to check or confirm this?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205799#M1116403</guid>
      <dc:creator>Mogwai</dc:creator>
      <dc:date>2024-10-09T14:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205803#M1116404</link>
      <description>&lt;P&gt;You run ASA on Firepower&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So there is only one NAT' the NAT in lina of ASA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no NAT in firepower&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205803#M1116404</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-09T14:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205807#M1116405</link>
      <description>&lt;P&gt;We have both an ASA&amp;nbsp; and a FP in our setup for separate purposes. Boh are physical devices. Only the NAT policies on the FP appear to be pulling from the ASA.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205807#M1116405</guid>
      <dc:creator>Mogwai</dc:creator>
      <dc:date>2024-10-09T14:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205818#M1116406</link>
      <description>&lt;P&gt;Sorry again' how it pulling?&lt;/P&gt;
&lt;P&gt;You use some kind of migrate tool?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205818#M1116406</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-09T14:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205828#M1116407</link>
      <description>&lt;P&gt;Not sure, this was configured years before our team came in.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205828#M1116407</guid>
      <dc:creator>Mogwai</dc:creator>
      <dc:date>2024-10-09T14:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205833#M1116409</link>
      <description>&lt;P&gt;There is no such thing as a device running FTD actively "pulling" rules (NAT or otherwise) from an ASA.&lt;/P&gt;
&lt;P&gt;ASA configuration can be migrated to FTD but that is a one time action using the separate migration tool.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205833#M1116409</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-10-09T14:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205857#M1116412</link>
      <description>&lt;P&gt;Odd then, as this is what I'm running into.&amp;nbsp;&lt;/P&gt;&lt;P&gt;On FMC&lt;/P&gt;&lt;P&gt;Devices &amp;gt; NAT &amp;gt; [Selected NAT Policy] &amp;gt; Can see the NAT rules, but unable to edit or modify them.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I click on the pencil icon to edit the rule the option to enable/disable the rule is grey'd out. There is also a banner which states "Policy created from ASA with hostname *ASA*"&lt;/P&gt;&lt;P&gt;When I login to the ASA I can view &amp;amp; then subsequently edit the same rules.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 15:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205857#M1116412</guid>
      <dc:creator>Mogwai</dc:creator>
      <dc:date>2024-10-09T15:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205937#M1116415</link>
      <description>&lt;P&gt;If the NAT policy edit icon is greyed out, it would most likely be a user privilege level issue. The banner you mention is just a description field which one can optionally enter for a NAT or Access Control policy to provide additional information about it. &lt;/P&gt;
&lt;P&gt;Are you logging in an admin user or username with admin level privilege?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 17:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5205937#M1116415</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-10-09T17:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2130 - Current NAT rules failover check.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5206050#M1116424</link>
      <description>&lt;P&gt;Admin User &amp;amp; I can edit some of the rules, that I know I created locally on the FTD, just not any of the previously existing NAT rules that also on the ASA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 18:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2130-current-nat-rules-failover-check/m-p/5206050#M1116424</guid>
      <dc:creator>Mogwai</dc:creator>
      <dc:date>2024-10-09T18:56:53Z</dc:date>
    </item>
  </channel>
</rss>

