<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/5287057#M1120839</link>
    <description>&lt;P&gt;We are facing the exact issue, can anyone pls help me with the solution...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have a cisco ftd 3105 version 7.3.1 and we also seen the same thine in the asp drop...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 22:32:01.294921&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.12.xxx.x8.64912 &amp;gt; 139.7x.xxx.xx.443: SWE 2059963915:2059963915(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; Drop-reason: (nat-xlate-pool-exhausted) NAT failed due to pool exhaustion, Drop-location: frame 0x0000556a1beecf51 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 22:32:04.301055&amp;nbsp; &amp;nbsp; &amp;nbsp; 10.12.xxx.x8.64912 &amp;gt; 139.7x.xxx.xx.443: SWE 2059963915:2059963915(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; Drop-reason: (nat-xlate-pool-exhausted) NAT failed due to pool exhaustion, Drop-location: frame 0x0000556a1beecf51 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 02 May 2025 00:13:49 GMT</pubDate>
    <dc:creator>adity</dc:creator>
    <dc:date>2025-05-02T00:13:49Z</dc:date>
    <item>
      <title>FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724118#M1095154</link>
      <description>&lt;P&gt;We have an Firepower 4110 running 7.0.4 managed by an FMCv running 7.0.4. We've been dealing with a nat exhaustion problem recently, so I've been watching asp drops to make sure the issue is resolved. In the meantime, I've noticed the firewall is reporting around 100 packets/sec for asp&amp;nbsp;nat-no-xlate-to-pat-pool. Over half of these have the FIN or RST flag set, so I'm not worried about these, and it's possible the rate isn't considered excessive anyway. The remaining drops are actual data traffic that probably belonged to a flow as shown below. I'm not hearing any reports about issues the past few days, but I'd appreciate someone weighing in as to whether or not this is significant and what could be the resolution.&amp;nbsp;&lt;/P&gt;&lt;P&gt;393: 12:56:37.624494 146.112.240.72.443 &amp;gt; our_public_ip.52645: . ack 2168596390 win 83 Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate, Drop-location: frame 0x0000562d24140aa7 flow (NA)/NA&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 19:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724118#M1095154</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2022-11-18T19:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724128#M1095156</link>
      <description>&lt;P&gt;&lt;A href="https://itecnotes.com/network/cisco-regarding-the-manual-nat-in-cisco-asa/" target="_blank"&gt;https://itecnotes.com/network/cisco-regarding-the-manual-nat-in-cisco-asa/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I think you need to rearrange the NAT order&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 19:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724128#M1095156</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-18T19:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724138#M1095157</link>
      <description>&lt;P&gt;I don't understand how this would help. There are already xlate and connection entries - it's as if the translations timed out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 19:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724138#M1095157</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2022-11-18T19:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724280#M1095167</link>
      <description>&lt;P&gt;Firewall would never drop the frame with this ASP drop code if there is a conn and xlate for it. If traffic rate isn't high, you can try to collect regular capture and ASP drop capture simultaneously to better understand what's going on with the connection.&lt;/P&gt;&lt;P&gt;In general, this drop code was introduced in ASA 9.0 software. E.g. after the change it's no longer possible to FTP from 172.16.0.1 (dmz) to 10.0.0.1 (inside) with this NAT configured:&lt;/P&gt;&lt;P&gt;nat (inside, dmz) source static obj-10.0.0.0 obj-10.0.0.0 destination static obj-172.16.0.0&amp;nbsp;obj-172.16.0.0 service http-80 http-8080&lt;/P&gt;&lt;P&gt;Instead you need to configure:&lt;/P&gt;&lt;P&gt;nat (inside, dmz) source static obj-10.0.0.0 obj-10.0.0.0 destination static obj-172.16.0.0&amp;nbsp;obj-172.16.0.0&lt;/P&gt;&lt;P&gt;So, this drop is most typical for NAT configs with ports. And the root cause is that mapped IP is added to PAT pool which is created by the system behind the scenes. In other words, below config:&lt;/P&gt;&lt;P&gt;object network my-ftp-server&lt;BR /&gt;&amp;nbsp;host &amp;lt;real-server&amp;gt;&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static &amp;lt;mapped-server&amp;gt; ftp ftp&lt;/P&gt;&lt;P&gt;is now equivalent to:&lt;/P&gt;&lt;P&gt;object network my-ftp-server&lt;BR /&gt;&amp;nbsp;host &amp;lt;real-server&amp;gt;&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static &amp;lt;mapped-server&amp;gt; ftp ftp&lt;/P&gt;&lt;P&gt;object network &amp;lt;internal&amp;gt;&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic &amp;lt;mapped-server&amp;gt;&lt;/P&gt;&lt;P&gt;There can be other scenarios when traffic is hit a pool IP, but xlate doesn't exist for it (probably your case).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2022 10:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724280#M1095167</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2022-11-19T10:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724293#M1095169</link>
      <description>&lt;P&gt;I will try lab it today&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2022 10:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4724293#M1095169</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-19T10:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725277#M1095190</link>
      <description>&lt;P&gt;I understand exactly what you are saying,&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399" target="_self"&gt;&lt;SPAN class=""&gt;tvotna&lt;/SPAN&gt;&lt;/A&gt;, but what you describe would affect the SYN packets. What I'm saying is that practically none of these are SYN packets - they are packets in the middle or end of a session. I also don't think they're bogus, because the asp-drop below is an ACK from MS Office. I don't think they should be dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;315: 08:17:40.060787 52.109.20.82.443 &amp;gt; 192.231.91.9.45101: . 2004346402:2004347782(1380) ack 3945935767 win 2044 Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate, Drop-location: frame 0x0000562d24140aa7 flow (NA)/NA&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 14:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725277#M1095190</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2022-11-21T14:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725294#M1095191</link>
      <description>&lt;P&gt;what I need to Lab and until that time you can check some point&amp;nbsp;&lt;BR /&gt;the traffic have ACK and RST so it TCP traffic&amp;nbsp;&lt;BR /&gt;Inside-FW-Outside&amp;nbsp;&lt;BR /&gt;if Inside initiate traffic to Out then&amp;nbsp;&lt;BR /&gt;A- FW will add Conn&amp;nbsp;&lt;BR /&gt;B- FW will add Xlate entry&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;each Conn and Xlate have timeout, Conn also can immediate end when client or Server send FIN.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115992-long-asa-xlate-idle-values-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115992-long-asa-xlate-idle-values-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;can you check the log message is for delete Conn traffic or not ?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 15:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725294#M1095191</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-21T15:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725312#M1095193</link>
      <description>&lt;P&gt;Is it possible that connection was torn down right before the ACK packet arrived?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 15:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725312#M1095193</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2022-11-21T15:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725318#M1095194</link>
      <description>&lt;P&gt;I presume you're correct - the session probably did time out, but let me watch the logs for this. Thanks for the ideas.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 15:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725318#M1095194</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2022-11-21T15:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725998#M1095236</link>
      <description>&lt;P&gt;The problem appears to be caused by "timeout pat-xlate 0:00:30," so the translation is timing out. Thanks for your assistance with this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 16:18:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/4725998#M1095236</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2022-11-22T16:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: FTD showing several nat-no-xlate-to-pat-pool for asp drops</title>
      <link>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/5287057#M1120839</link>
      <description>&lt;P&gt;We are facing the exact issue, can anyone pls help me with the solution...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have a cisco ftd 3105 version 7.3.1 and we also seen the same thine in the asp drop...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 22:32:01.294921&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.12.xxx.x8.64912 &amp;gt; 139.7x.xxx.xx.443: SWE 2059963915:2059963915(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; Drop-reason: (nat-xlate-pool-exhausted) NAT failed due to pool exhaustion, Drop-location: frame 0x0000556a1beecf51 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 22:32:04.301055&amp;nbsp; &amp;nbsp; &amp;nbsp; 10.12.xxx.x8.64912 &amp;gt; 139.7x.xxx.xx.443: SWE 2059963915:2059963915(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; Drop-reason: (nat-xlate-pool-exhausted) NAT failed due to pool exhaustion, Drop-location: frame 0x0000556a1beecf51 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2025 00:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-showing-several-nat-no-xlate-to-pat-pool-for-asp-drops/m-p/5287057#M1120839</guid>
      <dc:creator>adity</dc:creator>
      <dc:date>2025-05-02T00:13:49Z</dc:date>
    </item>
  </channel>
</rss>

