<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 1140 FTD additional public IP range in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219853#M1117306</link>
    <description>&lt;P&gt;No need this any more.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Mon, 04 Nov 2024 17:28:25 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-11-04T17:28:25Z</dc:date>
    <item>
      <title>Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218011#M1117166</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am struggling to get my head around how to get an additional public ip range working through a cisco 1140 ftd.&lt;/P&gt;
&lt;P&gt;I had asked previously and was told there arent alias interfaces or suchlike on the FTD like there is on Sophos and was told to just use static nat.&lt;/P&gt;
&lt;P&gt;Ive watched a ton of videos and looked online and I keep finding different suggestions. (I cant get any to work anyway)&lt;/P&gt;
&lt;P&gt;Below is a bad diagram of what my setup looks like (ive used made up public ips just for an example).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peat_0-1730373151009.png" style="width: 796px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232816iFD5A3ABFBCBB004C/image-dimensions/796x359?v=v2" width="796" height="359" role="button" title="peat_0-1730373151009.png" alt="peat_0-1730373151009.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;What i want to do is&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp; traffic from the internet to the web server for http, https, udp 59221, tcp 59221 using the public ip 205.20.111.36&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp; rdp to the rdp server using the public ip 205.20.111.33 but port 45456&lt;/P&gt;
&lt;P&gt;3) have the public ip of 205.20.111.38 work on the internal router.&lt;/P&gt;
&lt;P&gt;For 2) I have tried just doing a normal static nat with and without RDP port in destination port fields (ive also got it disabled at the moment but when testing i have enabled the status)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peat_1-1730373518313.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232817i6258588EE856ACB6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="peat_1-1730373518313.png" alt="peat_1-1730373518313.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peat_2-1730373554147.png" style="width: 590px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232818i79BB0FE075704735/image-dimensions/590x174?v=v2" width="590" height="174" role="button" title="peat_2-1730373554147.png" alt="peat_2-1730373554147.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For info, internet out is working fine and i can remote onto the firewall fine too. so those basics are all ok.&amp;nbsp; Oh i also forgot on my diagram i have an inside interface on subnet 192.168.1.x and also another interface on 192.168.3.x&lt;/P&gt;
&lt;P&gt;If anyone could help it would be gratefully received.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 11:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218011#M1117166</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-10-31T11:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218158#M1117179</link>
      <description>&lt;P&gt;After watching more videos and learning that static nat is bidirectional and you control the direction via ACL I have tried my NAT this way. which still doesnt work.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peat_0-1730385284100.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232834iBB94EBBE0E4DCA55/image-size/medium?v=v2&amp;amp;px=400" role="button" title="peat_0-1730385284100.png" alt="peat_0-1730385284100.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 14:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218158#M1117179</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-10-31T14:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218177#M1117182</link>
      <description>&lt;P&gt;the interface is correct&amp;nbsp;&lt;BR /&gt;the rule must be manual NAT&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;that it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 15:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218177#M1117182</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-31T15:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218476#M1117201</link>
      <description>&lt;P&gt;Changed it to manual but rule still doesnt work.&amp;nbsp; Did a packet tracer and its looking like its hitting the default deny access rule and not being allowed by my access rule.&amp;nbsp; What is wrong with the access rule I have done?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 09:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218476#M1117201</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-01T09:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218482#M1117202</link>
      <description>&lt;P&gt;Share last config of NAT and ACP&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 09:33:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218482#M1117202</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-01T09:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218487#M1117204</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peat_0-1730453721924.png" style="width: 596px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232906iA3F6A375063F920D/image-dimensions/596x538?v=v2" width="596" height="538" role="button" title="peat_0-1730453721924.png" alt="peat_0-1730453721924.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peat_1-1730453788212.png" style="width: 630px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232907iF9D4DB9411525F13/image-dimensions/630x348?v=v2" width="630" height="348" role="button" title="peat_1-1730453788212.png" alt="peat_1-1730453788212.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 09:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218487#M1117204</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-01T09:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218515#M1117205</link>
      <description>&lt;P&gt;Let's focus on requirement number 2, the others would have same concept and setup. In your last NAT screenshot you have configured the translated source address to be the outside interface. This should be changed with the RDP public IP&amp;nbsp;205.20.111.33, so you can create an object with that public IP and select it instead of the outside interface. If not if you leave the translated source as the outside interface it would mean the RDP server IP will be translated to the firewall outside interface IP.&lt;/P&gt;
&lt;P&gt;Also, if you want the RDP traffic to be served on port 45456/tcp, then also here you have to change the translated source port to be port 45456/tcp. Finally on the access list you will have to change the destination port from the traditional RDP port 3389/tcp to 45456/tcp because port 45456/tcp will be the port exposed to the external world, so anyone that will try to RDP to the RDP server will be using port 45456/tcp.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 10:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218515#M1117205</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-01T10:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218537#M1117206</link>
      <description>&lt;P&gt;Thanks, sorry ive wasted your time a bit there.&amp;nbsp; To try and get it working in the simplest way my latest attempt is to get RDP working on the actual public ip of 205.20.102.222 using just the standard rdp port of 3389.&amp;nbsp; Thats what my latest screenshot attempts were.&lt;/P&gt;
&lt;P&gt;I thought if i could get it working in the simplest form then afterwards i could introduce each additional step one at a time (as in the 45456 port and then getting it to the other public ip)&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 11:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218537#M1117206</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-01T11:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218651#M1117212</link>
      <description>&lt;P&gt;No worries and what you're saying makes sense. Could you please try to create an object with the public IP&amp;nbsp;&lt;SPAN&gt;205.20.111.33 and change the translated source IP to this one rather than the interface and see if that works? if not, then please run some packet capture on the outside interface filtering with RDP port while you are testing RDP connection. This will allow us to see if you actually receive any traffic from the source. Alternatively, please run packet tracer simulating some traffic from one of the allowed sources with the public IP&amp;nbsp;205.20.111.33 and RDP port as destinations.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 15:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218651#M1117212</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-01T15:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218743#M1117237</link>
      <description>&lt;P&gt;public IP is not attach directly to any FTD interfaces&amp;nbsp;&lt;BR /&gt;so you need two steps&amp;nbsp;&lt;BR /&gt;1- use object host&amp;nbsp;&lt;SPAN&gt;205.20.111.38 instead of using interface in ACL and NAT&amp;nbsp;&lt;BR /&gt;2- use static route for this IP point to OUT interface&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 18:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5218743#M1117237</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-01T18:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219734#M1117291</link>
      <description>&lt;P&gt;I am reading this as its not hitting the acl and just hitting the default deny all acl?&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input outside tcp x.x.x.x 3389 x.x.x.x 3389&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14848 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 11776 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static RDPserver interface service _|NatOrigSvc_dbf4c634-97ae-11ef-8448-d18b8885a4a7 _|NatMappedSvc_dbf4c634-97ae-11ef-8448-d18b8885a4a7&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate x.x.x.x/3389 to 192.168.1.10/3389&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 6656 ns&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced deny ip any any rule-id 1&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 33280 ns&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000561737636518 flow (NA)/NA&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;BR /&gt;&amp;gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 14:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219734#M1117291</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-04T14:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219757#M1117292</link>
      <description>&lt;P&gt;This good' now NAT working as we want.&lt;/P&gt;
&lt;P&gt;For ACL you need to specify &lt;STRONG&gt;ANY&lt;/STRONG&gt; under source network' why ypu use object-group for network??&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 15:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219757#M1117292</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-04T15:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219780#M1117295</link>
      <description>&lt;P&gt;We have to lock down the RDP access to just the IT support&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 15:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219780#M1117295</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-04T15:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219785#M1117296</link>
      <description>&lt;P&gt;Ok, just make it any to check&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do packet-tracer or do real connect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If traffic will not pass then we need to look for other reason&lt;/P&gt;
&lt;P&gt;It temporarily for troubleshooting&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 15:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219785#M1117296</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-04T15:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219787#M1117297</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The port that you specify after the source IP in the packet tracer command would be the source port. Don't worry much about that port as it could be anything like 12345, however, the second port that you specify after the destination IP is the port that should be accessed from outside. Did you specify one of the source allowed IP addresses on packet tracer command? if so, you might need to double check the access list rules and see why is not matching the right rule that would allow this traffic from outside to inside.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 15:47:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219787#M1117297</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-04T15:47:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219822#M1117301</link>
      <description>&lt;P&gt;yeah i just have left rdp at 3389 for the moment for testing but will change that once it all works.&lt;/P&gt;
&lt;P&gt;yeah i had the source IP on packet tracer as the one thats the allowed IP on the ACL.&amp;nbsp; &amp;nbsp;Ill remove that from the acl and test again&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 16:34:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219822#M1117301</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-04T16:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219829#M1117302</link>
      <description>&lt;P&gt;Well this is odd.&amp;nbsp; Its failing the deployment when i try and remove the support IP from the RDP rule.&amp;nbsp; So I have gone on the cli and the rdp rule is not there.&amp;nbsp; But its showing on the FTD Gui.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peat_1-1730739029213.png" style="width: 932px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/233124iC709111ABF95ADB0/image-dimensions/932x338?v=v2" width="932" height="338" role="button" title="peat_1-1730739029213.png" alt="peat_1-1730739029213.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435460: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435460: L5 RULE: DNAT_Sig&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435460 ifc outside any ifc inside object SigServer_INT rule-id 268435460 event-log flow-end&lt;/P&gt;
&lt;P&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L7 RULE: Inside_Outside_Rule&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435457 ifc inside any ifc outside any rule-id 268435457 event-log both&lt;/P&gt;
&lt;P&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435464: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435464: L5 RULE: WAN_internalPubrange&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435464 ifc outside object any-ipv4 object Internal_Pub_IP_range rule-id 268435464 event-log flow-end&lt;/P&gt;
&lt;P&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435458: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435458: L7 RULE: Prod_WAN&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435458 ifc prod any ifc outside any rule-id 268435458&lt;/P&gt;
&lt;P&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 1: L5 RULE: DefaultActionRule&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced deny ip any any rule-id 1&lt;/P&gt;
&lt;P&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435462: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435462: L5 RULE: LAN_Prod&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435462 ifc inside any ifc prod any rule-id 268435462&lt;/P&gt;
&lt;P&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435463: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435463: L5 RULE: Prod_LAN&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced permit object-group |acSvcg-268435463 ifc prod any ifc inside any rule-id 268435463&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 16:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219829#M1117302</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-04T16:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219851#M1117305</link>
      <description>&lt;P&gt;Could be a software bug and this could be why it was showing no match on any rule but the default one when you ran packet tracer. Could you please try to add a replica of the DNAT_RDP rule, deploy and test again?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 17:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219851#M1117305</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-04T17:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219853#M1117306</link>
      <description>&lt;P&gt;No need this any more.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 17:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219853#M1117306</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-04T17:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 1140 FTD additional public IP range</title>
      <link>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219856#M1117308</link>
      <description>&lt;P&gt;Thats got it.&amp;nbsp; shame I cant get rid of that ghost bugged rule but its working now thats the main thing.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 17:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-1140-ftd-additional-public-ip-range/m-p/5219856#M1117308</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2024-11-04T17:27:08Z</dc:date>
    </item>
  </channel>
</rss>

