<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT behavior on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330329#M1122719</link>
    <description>&lt;P&gt;Hello Experts ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I have some strange behavior on FTD as below :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have nat statement from inside to dmz1 :&lt;BR /&gt;nat (inside,dmz1) source static obj_10.1.1.11 obj_192.168.2.28&lt;BR /&gt;and with packet tracer i can confirm traffic sourced from 192.168.2.138 to&amp;nbsp;192.168.2.28 it hits the nat and translate the destination to&amp;nbsp;10.1.1.11 as below :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;firepower# packet-tracer input dmz1 tcp 192.168.2.138 123 192.168.2.28 25 $&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 25590 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xff6d9b6d90, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=27620208, user_data=0xffeeeafcc0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 25590 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb02034b0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=853214246, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 20472 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,dmz1) source static obj_10.1.1.11 obj_192.168.2.28&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate 192.168.2.28/25 to 10.1.1.11/25&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14671 ns&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14671 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,dmz1) source static obj_10.1.1.11 obj_192.168.2.28&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.2.138/123 to 192.168.2.138/123&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xff94151bf0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=440, user_data=0xff9d183c60, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=192.168.2.28, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=dmz1(vrfid:0), output_ifc=inside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14671 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xfff07b2310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=74979312, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;.......&lt;BR /&gt;.......&lt;BR /&gt;.......&lt;BR /&gt;.......&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 18&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 4265 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.1.1.225 on interface inside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 0000.0c07.ace2 hits 40022292 reference 5479&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz1(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 408846 ns&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;however when running the packet tracer from different source on same subnet 192.168.2.38 to 192.168.2.28 , it does not hit the nat and traffic being dropped as below :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;firepower# packet-tracer input dmz1 tcp 192.168.2.38 123 192.168.2.28 25 d$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 22178 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xff6d9b6d90, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=27790330, user_data=0xffeeeafcc0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 22178 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb02034b0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=853299007, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 34120 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 192.168.2.28 using egress ifc dmz1(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 15567 ns&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 15567 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xfff07b2310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=75006731, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 52886 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xfff07b2310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=75006733, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 15&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 17913 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.2.28 using egress ifc dmz1(vrfid:0)&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz1(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz1(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 381738 ns&lt;BR /&gt;Drop-reason: (no-v4-adjacency) No valid V4 adjacency. Check ARP table (show arp) has entry for nexthop., Drop-location: frame 0x000000aaace1485c flow (NA)/NA&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The nat statement should accept any source from DMZ1 interface to 192.168.2.28 , so why one source works and the other does not work ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Sep 2025 21:28:31 GMT</pubDate>
    <dc:creator>qsosan20</dc:creator>
    <dc:date>2025-09-15T21:28:31Z</dc:date>
    <item>
      <title>NAT behavior on FTD</title>
      <link>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330329#M1122719</link>
      <description>&lt;P&gt;Hello Experts ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I have some strange behavior on FTD as below :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have nat statement from inside to dmz1 :&lt;BR /&gt;nat (inside,dmz1) source static obj_10.1.1.11 obj_192.168.2.28&lt;BR /&gt;and with packet tracer i can confirm traffic sourced from 192.168.2.138 to&amp;nbsp;192.168.2.28 it hits the nat and translate the destination to&amp;nbsp;10.1.1.11 as below :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;firepower# packet-tracer input dmz1 tcp 192.168.2.138 123 192.168.2.28 25 $&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 25590 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xff6d9b6d90, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=27620208, user_data=0xffeeeafcc0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 25590 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb02034b0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=853214246, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 20472 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,dmz1) source static obj_10.1.1.11 obj_192.168.2.28&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside(vrfid:0)&lt;BR /&gt;Untranslate 192.168.2.28/25 to 10.1.1.11/25&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14671 ns&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14671 ns&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,dmz1) source static obj_10.1.1.11 obj_192.168.2.28&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.2.138/123 to 192.168.2.138/123&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xff94151bf0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=440, user_data=0xff9d183c60, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=192.168.2.28, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=dmz1(vrfid:0), output_ifc=inside(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 14671 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xfff07b2310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=74979312, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;.......&lt;BR /&gt;.......&lt;BR /&gt;.......&lt;BR /&gt;.......&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 18&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 4265 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.1.1.225 on interface inside&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 0000.0c07.ace2 hits 40022292 reference 5479&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz1(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 408846 ns&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;however when running the packet tracer from different source on same subnet 192.168.2.38 to 192.168.2.28 , it does not hit the nat and traffic being dropped as below :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;firepower# packet-tracer input dmz1 tcp 192.168.2.38 123 192.168.2.28 25 d$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 22178 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xff6d9b6d90, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=27790330, user_data=0xffeeeafcc0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 22178 ns&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xffb02034b0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=853299007, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=dmz1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 34120 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 192.168.2.28 using egress ifc dmz1(vrfid:0)&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 15567 ns&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 15567 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xfff07b2310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=75006731, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 52886 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xfff07b2310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=75006733, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any,&lt;BR /&gt;src nsg_id=none, dst nsg_id=none&lt;BR /&gt;dscp=0x0, input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 15&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Elapsed time: 17913 ns&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 192.168.2.28 using egress ifc dmz1(vrfid:0)&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz1(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz1(vrfid:0)&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 381738 ns&lt;BR /&gt;Drop-reason: (no-v4-adjacency) No valid V4 adjacency. Check ARP table (show arp) has entry for nexthop., Drop-location: frame 0x000000aaace1485c flow (NA)/NA&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The nat statement should accept any source from DMZ1 interface to 192.168.2.28 , so why one source works and the other does not work ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 21:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330329#M1122719</guid>
      <dc:creator>qsosan20</dc:creator>
      <dc:date>2025-09-15T21:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: NAT behavior on FTD</title>
      <link>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330333#M1122720</link>
      <description>&lt;P&gt;&lt;SPAN&gt;firepower# packet-tracer input dmz1 tcp 192.168.2.138 123 192.168.2.28 25 $ &amp;lt;&amp;lt;- this wrong&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1- how both IP in same subnet??? 192.168.2.0/xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2- you use 192.168.2.138 as source IP inbound to inside interface where your nat is clear show 192.168.2.28 is connect to inside interface??&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 21:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330333#M1122720</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-15T21:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT behavior on FTD</title>
      <link>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330337#M1122721</link>
      <description>&lt;P&gt;Hello MHM,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please check the nat again :&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,dmz1) source static obj_10.1.1.11 obj_192.168.2.28&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Inside subnet is 10.1.1.0/24 and dmz subnet is 192.168.2.0/24, what is wrong in such nat??&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 22:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330337#M1122721</guid>
      <dc:creator>qsosan20</dc:creator>
      <dc:date>2025-09-15T22:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT behavior on FTD</title>
      <link>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330339#M1122722</link>
      <description>&lt;P&gt;&lt;SPAN&gt;10.1.1.0/24 &amp;lt;&amp;lt;- you need to use this IP then in packet tracer&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Traffic inbound as 10.1.1.0/24 and NAT to 192.168.2.28 to connect to host 192.168.2.138&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Run above packet tracer and check&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 22:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330339#M1122722</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-15T22:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: NAT behavior on FTD</title>
      <link>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330540#M1122728</link>
      <description>&lt;P&gt;The idea of this nat is to forward dmz subnet clients to inside server 192.168.2.28 , so the traffic direction will be from dmz to inside ,&lt;/P&gt;
&lt;P&gt;Can you please double check both packet-tracer and check why first one is working fine and the second does not work ?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 11:41:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330540#M1122728</guid>
      <dc:creator>qsosan20</dc:creator>
      <dc:date>2025-09-16T11:41:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT behavior on FTD</title>
      <link>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330541#M1122729</link>
      <description>&lt;P&gt;Friend I know that&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet tracer can run in two way&lt;/P&gt;
&lt;P&gt;From inside to dmz1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here you need to use inside interface and use 10.1.1.0/24 IP as source and 192.168.2.138 as destiantion&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From dmz1 to inside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here you need to use dmz1 interface and select 192.168.2.138 as source and 192.168.2.28 as destiantion&lt;/P&gt;
&lt;P&gt;Run above packet tracer and share result&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 11:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-behavior-on-ftd/m-p/5330541#M1122729</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-16T11:45:48Z</dc:date>
    </item>
  </channel>
</rss>

