<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTD NAT Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258305#M1119414</link>
    <description>&lt;P&gt;I’m trying create a configuration where a firewall with a single public IP address can forward incoming connections to an internal server. While this seems straightforward, I’m encountering issues and would appreciate any guidance.&lt;/P&gt;&lt;P&gt;The best documentation I've seen on this is:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!t_providing_access_to_an_inside_web_server.html" target="_blank" rel="noopener"&gt;Managing Firewall Threat Defense with Cloud-delivered Firewall Management Center in Cisco Security Cloud Control&lt;/A&gt;&amp;nbsp;section&amp;nbsp;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!g_part_interfaces-settings.html" target="_blank" rel="noopener"&gt;Interfaces and Device Settings&lt;/A&gt;&lt;SPAN class=""&gt; &amp;gt; &lt;/SPAN&gt;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!g_nat_for_threat_defense.html" target="_blank" rel="noopener"&gt;Network Address Translation&lt;/A&gt;&lt;SPAN class=""&gt; &amp;gt; &lt;/SPAN&gt;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!c_examples_for_nat.html" target="_blank" rel="noopener"&gt;Examples for NAT&lt;/A&gt;&lt;SPAN class=""&gt; &amp;gt; &lt;/SPAN&gt;&lt;SPAN&gt;Providing Access to an Inside Web Server (Static Auto NAT)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FTD 1010&lt;/LI&gt;&lt;LI&gt;Firewall Management: Secure Cloud Control / cdFMC&lt;/LI&gt;&lt;LI&gt;Firewall Version: 7.6.0&lt;/LI&gt;&lt;LI&gt;Interfaces:&lt;UL&gt;&lt;LI&gt;eth1 (OUTSIDEzone): Single static public IP from ISP (e.g., 77.88.99.10)&lt;/LI&gt;&lt;LI&gt;eth2 &amp;amp; eth3 form a port channel carrying several VLANs&lt;/LI&gt;&lt;LI&gt;VLAN3 (INSIDEzone) is 10.3.3.1/24 and the default gateway for this network&lt;/LI&gt;&lt;LI&gt;Internal Server: SSH server at 10.3.3.140/24&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;STRONG&gt;Current Status:&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;A simple Security Policy and &amp;nbsp;NAT policy is configured for outbound traffic. Internal hosts can successfully initiate connections to the Internet hiding behind the firewall’s public IP.&lt;/LI&gt;&lt;LI&gt;Internally, the SSH server is up and reachable, &lt;FONT face="andale mono,times"&gt;ssh -v&lt;/FONT&gt;&amp;nbsp;shows:&lt;BR /&gt;&lt;PRE&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3 FreeBSD-20240701&lt;BR /&gt;&lt;BR /&gt;debug1: compat_banner: match: OpenSSH_9.3 FreeBSD-20240701 pat OpenSSH* compat 0x04000000&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;When I follow&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!t_providing_access_to_an_inside_web_server.html" target="_blank" rel="noopener"&gt; the steps in the guide&lt;/A&gt; to configure Static Auto NAT for inbound access, external SSH connections&amp;nbsp;&lt;EM&gt;go directly to the firewall itself&lt;/EM&gt; instead of being translated to the internal SSH server:&lt;BR /&gt;&lt;PRE&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_9.1 PKIX[13.5]&lt;BR /&gt;&lt;BR /&gt;debug1: compat_banner: match: OpenSSH_9.1 PKIX[13.5] pat OpenSSH* compat 0x0400000&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;In additional testing I configured the NAT rule to translate the external port 2222 to the internal server on port 22. The result was&amp;nbsp;&lt;FONT face="andale mono,times"&gt;ssh -p2222 77.88.99.10&amp;nbsp;&lt;/FONT&gt;&amp;nbsp;would simply time out.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So not only am I not seeing the desired result, when I connect to port 22 I’m able to log into the FTD CLI via SSH from the Internet, which is not acceptable — I do not want infrastructure login ports exposed directly on the Internet under any circumstances.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuration Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Attached screenshots show the Access Policy rule and a copy of `show nat detail` output.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;What am I missing in my NAT or firewall configuration that would prevent incoming connections from being properly forwarded to the internal SSH server? Any insights or suggestions would be greatly appreciated.&lt;/P&gt;</description>
    <pubDate>Sat, 08 Feb 2025 23:42:35 GMT</pubDate>
    <dc:creator>show run all</dc:creator>
    <dc:date>2025-02-08T23:42:35Z</dc:date>
    <item>
      <title>FTD NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258305#M1119414</link>
      <description>&lt;P&gt;I’m trying create a configuration where a firewall with a single public IP address can forward incoming connections to an internal server. While this seems straightforward, I’m encountering issues and would appreciate any guidance.&lt;/P&gt;&lt;P&gt;The best documentation I've seen on this is:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!t_providing_access_to_an_inside_web_server.html" target="_blank" rel="noopener"&gt;Managing Firewall Threat Defense with Cloud-delivered Firewall Management Center in Cisco Security Cloud Control&lt;/A&gt;&amp;nbsp;section&amp;nbsp;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!g_part_interfaces-settings.html" target="_blank" rel="noopener"&gt;Interfaces and Device Settings&lt;/A&gt;&lt;SPAN class=""&gt; &amp;gt; &lt;/SPAN&gt;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!g_nat_for_threat_defense.html" target="_blank" rel="noopener"&gt;Network Address Translation&lt;/A&gt;&lt;SPAN class=""&gt; &amp;gt; &lt;/SPAN&gt;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!c_examples_for_nat.html" target="_blank" rel="noopener"&gt;Examples for NAT&lt;/A&gt;&lt;SPAN class=""&gt; &amp;gt; &lt;/SPAN&gt;&lt;SPAN&gt;Providing Access to an Inside Web Server (Static Auto NAT)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FTD 1010&lt;/LI&gt;&lt;LI&gt;Firewall Management: Secure Cloud Control / cdFMC&lt;/LI&gt;&lt;LI&gt;Firewall Version: 7.6.0&lt;/LI&gt;&lt;LI&gt;Interfaces:&lt;UL&gt;&lt;LI&gt;eth1 (OUTSIDEzone): Single static public IP from ISP (e.g., 77.88.99.10)&lt;/LI&gt;&lt;LI&gt;eth2 &amp;amp; eth3 form a port channel carrying several VLANs&lt;/LI&gt;&lt;LI&gt;VLAN3 (INSIDEzone) is 10.3.3.1/24 and the default gateway for this network&lt;/LI&gt;&lt;LI&gt;Internal Server: SSH server at 10.3.3.140/24&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;STRONG&gt;Current Status:&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;A simple Security Policy and &amp;nbsp;NAT policy is configured for outbound traffic. Internal hosts can successfully initiate connections to the Internet hiding behind the firewall’s public IP.&lt;/LI&gt;&lt;LI&gt;Internally, the SSH server is up and reachable, &lt;FONT face="andale mono,times"&gt;ssh -v&lt;/FONT&gt;&amp;nbsp;shows:&lt;BR /&gt;&lt;PRE&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3 FreeBSD-20240701&lt;BR /&gt;&lt;BR /&gt;debug1: compat_banner: match: OpenSSH_9.3 FreeBSD-20240701 pat OpenSSH* compat 0x04000000&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;When I follow&lt;A href="https://docs.defenseorchestrator.com/cdfmc/index.html#!t_providing_access_to_an_inside_web_server.html" target="_blank" rel="noopener"&gt; the steps in the guide&lt;/A&gt; to configure Static Auto NAT for inbound access, external SSH connections&amp;nbsp;&lt;EM&gt;go directly to the firewall itself&lt;/EM&gt; instead of being translated to the internal SSH server:&lt;BR /&gt;&lt;PRE&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_9.1 PKIX[13.5]&lt;BR /&gt;&lt;BR /&gt;debug1: compat_banner: match: OpenSSH_9.1 PKIX[13.5] pat OpenSSH* compat 0x0400000&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;In additional testing I configured the NAT rule to translate the external port 2222 to the internal server on port 22. The result was&amp;nbsp;&lt;FONT face="andale mono,times"&gt;ssh -p2222 77.88.99.10&amp;nbsp;&lt;/FONT&gt;&amp;nbsp;would simply time out.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So not only am I not seeing the desired result, when I connect to port 22 I’m able to log into the FTD CLI via SSH from the Internet, which is not acceptable — I do not want infrastructure login ports exposed directly on the Internet under any circumstances.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuration Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Attached screenshots show the Access Policy rule and a copy of `show nat detail` output.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;What am I missing in my NAT or firewall configuration that would prevent incoming connections from being properly forwarded to the internal SSH server? Any insights or suggestions would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Feb 2025 23:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258305#M1119414</guid>
      <dc:creator>show run all</dc:creator>
      <dc:date>2025-02-08T23:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258695#M1119442</link>
      <description>&lt;P&gt;Please remove that rule and recreate it as a manual rule and make sure the translated port is set to port 2222 and the original port is set to 22.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 12:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258695#M1119442</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-02-10T12:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258800#M1119452</link>
      <description>&lt;P&gt;Thank you for replying. &amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried what you suggest here (also in screenshots)...&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;U&gt;Interface Objects&lt;BR /&gt;&lt;/U&gt;Source interface objects:&amp;nbsp;&lt;EM&gt;any&lt;/EM&gt; (default)&lt;BR /&gt;Destination interface objects: OUTSIDEzone&lt;U&gt;&lt;BR /&gt;Original Packet&lt;/U&gt;&lt;BR /&gt;Original source: Internal_SSH (host real IP: 10.3.3.140)&lt;BR /&gt;Original destination: &amp;nbsp;Address (default) / [empty] (default)&lt;BR /&gt;Original Source Port: [empty] (default)&lt;BR /&gt;Original Destination Port: &amp;nbsp;SSH (tcp/22)&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;U&gt;Translated Packet&lt;/U&gt;&lt;BR /&gt;Translated Source: Destination Interface IP&lt;BR /&gt;Translated Destination: [empty] (default)&lt;BR /&gt;Translated Source Port: [empty] (default)&lt;BR /&gt;Translated Destination Port: SSHon2222 (tcp/2222)&lt;/P&gt;&lt;P&gt;And my result was timeouts connecting to 2222 from outside the firewall. &amp;nbsp;Inside the firewall, tcpdump on the SSH server saw no packets arrive inbound.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 17:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258800#M1119452</guid>
      <dc:creator>show run all</dc:creator>
      <dc:date>2025-02-10T17:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258817#M1119453</link>
      <description>&lt;P&gt;I have found success! &amp;nbsp;My settings are &lt;STRONG&gt;very&lt;/STRONG&gt;&amp;nbsp;different from what is given in the documentation (but they do seem logical according to the user interface):&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;U&gt;Interface Objects&lt;BR /&gt;&lt;/U&gt;Source interface objects:&amp;nbsp;OUTSIDEzone&lt;BR /&gt;Destination interface objects:&amp;nbsp;INSIDEzone&lt;U&gt;&lt;BR /&gt;Original Packet&lt;/U&gt;&lt;BR /&gt;Original source: any&lt;BR /&gt;Original destination: &amp;nbsp;Source Interface IP&lt;BR /&gt;Original Source Port: [empty] (default)&lt;BR /&gt;Original Destination Port: &amp;nbsp;SSHon2222 (tcp/2222)&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;U&gt;Translated Packet&lt;/U&gt;&lt;BR /&gt;Translated Source: Destination Interface IP&lt;BR /&gt;Translated Destination: Internal_SSH (host:10.3.3.140)&lt;BR /&gt;Translated Source Port: [empty] (default)&lt;BR /&gt;Translated Destination Port:&amp;nbsp;SSH (tcp/22)&lt;/P&gt;&lt;P&gt;Once I deployed this configuration I was immediately able to ssh -p 2222 &amp;lt;my public IP&amp;gt; ...&amp;nbsp;&lt;EM&gt;however&lt;/EM&gt; when I changed the "Original Destination Port" to 22, SSH connections on that port were&amp;nbsp;&lt;U&gt;not&lt;/U&gt; translated/forwarded to the internal host and I still connected directly to the FTD.&lt;BR /&gt;&lt;BR /&gt;Any insights on how to (a) make connections to port 22 translate to an internal host and (b) stop the FTD from responding to SSH connections from the upstream-side?&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 17:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258817#M1119453</guid>
      <dc:creator>show run all</dc:creator>
      <dc:date>2025-02-10T17:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258829#M1119455</link>
      <description>&lt;P&gt;Makes sense the way you configured the NAT rule. Regarding port 22, it seems that you are allowing SSH to the device via its platform settings? You can check that by going into Devices &amp;gt; Platform Settings &amp;gt; Secure Shell. In case you find it enabled, please ensure that you don't need that access before turning it off. I don't believe cdFMC needs SSH as I think the ports required would be 443/tcp and 8305/tcp. Once that is removed port 22/tcp should start working for your custom NAT rule. Alternatively, if you happen to have another public IP you can use that one instead of using the public IP of the outside interface.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 18:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258829#M1119455</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-02-10T18:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258867#M1119465</link>
      <description>&lt;P&gt;Many thanks! &amp;nbsp;I now remember enabling the SSH setting and after removing the OUTSIDEzone interface from the list the NAT works as intended. &amp;nbsp; It all makes so much sense now. &amp;nbsp;Thank you for taking the time to reply.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 20:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5258867#M1119465</guid>
      <dc:creator>show run all</dc:creator>
      <dc:date>2025-02-10T20:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5259037#M1119474</link>
      <description>&lt;P&gt;You are very welcome.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 09:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat-problem/m-p/5259037#M1119474</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-02-11T09:22:21Z</dc:date>
    </item>
  </channel>
</rss>

