<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks, I totally forgot in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040608#M145372</link>
    <description>&lt;P&gt;Thanks, I totally forgot about packet-tracer being back.. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And of course, packet-tracer is telling me, there is no route:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input diagnostic udp 192.168.100.254 12312 8.8.8.8 53&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: diagnostic&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;A trace from the inside interface finds it's way to the internet...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've added a screenshot of the mgmt interface config but of course, there is not much to it... I've also tried it with a manual gateway (IP of the inside interface) but this gives me the same packet-tracer output&lt;/P&gt;</description>
    <pubDate>Thu, 30 Mar 2017 09:00:38 GMT</pubDate>
    <dc:creator>ammann9113</dc:creator>
    <dc:date>2017-03-30T09:00:38Z</dc:date>
    <item>
      <title>FTD Registration Problem</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040596#M145353</link>
      <description>&lt;P&gt;Hello everyone&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm currently encountering a problem which really bugs me...&lt;/P&gt;
&lt;P&gt;I have a 5506-X running with the FTD image (6.2) and everything (as far as I can tell) looks well. Except for one thing; the Smart License registration. I always get a error message, telling me I need to check my internet connectivity (for the mangement interface). I am able to access the internet through the ASA, I can ping Google from the ASA CLI, updates are being downloaded and installed every other day...&lt;/P&gt;
&lt;P&gt;I've tried "Use the Data Interfaces as the Gateway" and a unique gateway for the management interface, all with the same result..&lt;/P&gt;
&lt;P&gt;I need help.. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I don't even know where to find logs...&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here's the full error msg:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The device was unable to connect to the Smart Licensing server. This might indicate a gateway problem for the management interface. Please select Evaluation Mode for now. Then, after completing setup, go to Device &amp;gt; System Settings &amp;gt; Management Interface and verify the management address and gateway configuration. There must be a path from the management IP address to the Internet to complete Smart License registration. You can then go to Device &amp;gt; Smart License and try registering again.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040596#M145353</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2019-03-12T09:08:44Z</dc:date>
    </item>
    <item>
      <title>Does the 5506-X MANAGEMENT</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040597#M145356</link>
      <description>&lt;P&gt;Does the 5506-X MANAGEMENT interface have internet access? Simply reaching the Internet from the ASA isn't enough as that will normally use the outside interface.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 15:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040597#M145356</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-29T15:19:17Z</dc:date>
    </item>
    <item>
      <title>well the mgmt interface isnt</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040598#M145357</link>
      <description>&lt;P&gt;well the mgmt interface isnt cabled if you mean that. as far as i understood this is not necessary?&lt;/P&gt;
&lt;P&gt;i ve tried both options, routing the mgmt interface through the inside interface (i dont remember the actual wording on this one, its the option where i dont have to configure anything else) and i ve tried pointing it to the next hop directly, both with the same result - no connectivity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when i entered the gateway for the mgmt interface manually, i pointed it to the "outside next hop", maybe i should try to point it to the inside interface of the asa itself?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 17:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040598#M145357</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-29T17:35:00Z</dc:date>
    </item>
    <item>
      <title>Get your management interface</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040599#M145359</link>
      <description>&lt;P&gt;Get your management interface into the same VLAN as your inside interface. Assign an ip address to it and set the gateway for your management interface to your inside interface.&lt;/P&gt;
&lt;P&gt;This should do the trick.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 20:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040599#M145359</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2017-03-29T20:45:02Z</dc:date>
    </item>
    <item>
      <title>Just did that.. and no trick</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040600#M145360</link>
      <description>&lt;P&gt;Just did that.. and no trick done.. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Management interface is now on the same VLAN as the inside interface. LAN connectivity is present. I've tried with "use data interface as gateway" and entering the gateway (IP of inside interface) manually. Always the same result; not able to contact the Smart Licensing server...&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 06:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040600#M145360</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T06:47:37Z</dc:date>
    </item>
    <item>
      <title>If you can, please share the</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040601#M145362</link>
      <description>&lt;P&gt;If you can, please share the output of "show network" from the FTD cli shell.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is the DNS server that you have setup on the management interface reachable?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 07:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040601#M145362</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T07:16:06Z</dc:date>
    </item>
    <item>
      <title>DNS server is reachable and</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040602#M145364</link>
      <description>&lt;P&gt;DNS server is reachable and seems to be working correctly.. Here you go:&lt;/P&gt;
&lt;P&gt;&amp;gt; show network&lt;BR /&gt;===============[ System Information ]===============&lt;BR /&gt;Hostname :&amp;nbsp;&amp;lt;cut&amp;gt;&lt;BR /&gt;DNS Servers : 195.186.4.162&lt;BR /&gt; 195.186.1.162&lt;BR /&gt;Management port : 8305&lt;BR /&gt;IPv4 Default route&lt;BR /&gt; Gateway : 192.168.100.1&lt;/P&gt;
&lt;P&gt;======================[ br1 ]=======================&lt;BR /&gt;State : Enabled&lt;BR /&gt;Channels : Management &amp;amp; Events&lt;BR /&gt;Mode : Non-Autonegotiation&lt;BR /&gt;MDI/MDIX : Auto/MDIX&lt;BR /&gt;MTU : 1500&lt;BR /&gt;MAC Address : 00:6B:F1:78:B7:03&lt;BR /&gt;----------------------[ IPv4 ]----------------------&lt;BR /&gt;Configuration : Manual&lt;BR /&gt;Address : 192.168.100.254&lt;BR /&gt;Netmask : 255.255.255.0&lt;BR /&gt;Broadcast : 192.168.100.255&lt;BR /&gt;----------------------[ IPv6 ]----------------------&lt;BR /&gt;Configuration : Disabled&lt;/P&gt;
&lt;P&gt;===============[ Proxy Information ]================&lt;BR /&gt;State : Disabled&lt;BR /&gt;Authentication : Disabled&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 07:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040602#M145364</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T07:40:48Z</dc:date>
    </item>
    <item>
      <title>That all seems OK.</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040603#M145365</link>
      <description>&lt;P&gt;That all seems OK.&lt;/P&gt;
&lt;P&gt;Have you included the 192.168.1.0/24 subnet in your NAT rules?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 08:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040603#M145365</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T08:01:40Z</dc:date>
    </item>
    <item>
      <title>Did you mean 192.168.100.0/24</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040604#M145366</link>
      <description>&lt;P&gt;Did you mean 192.168.&lt;STRONG&gt;100&lt;/STRONG&gt;.0/24?&lt;/P&gt;
&lt;P&gt;I've noticed, that I only had the inside interface in my NAT rule. I changed that to "any" interface (with the 192.168.100.0/24 network), but nothing changed....&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 08:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040604#M145366</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T08:14:41Z</dc:date>
    </item>
    <item>
      <title>Yes - sorry I did mean 192</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040605#M145368</link>
      <description>&lt;P&gt;Yes - sorry I did mean 192.168.100.0/24.&lt;/P&gt;
&lt;P&gt;It seems everything is in order.&lt;/P&gt;
&lt;P&gt;Is it possible to open a TAC case or is this a lab / NFR device without support?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 08:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040605#M145368</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T08:24:58Z</dc:date>
    </item>
    <item>
      <title>Yes it is a lab device... is</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040606#M145369</link>
      <description>&lt;P&gt;Yes it is a lab device... is there any more detailed log I can look at? Since the "expert"-mode on CLI looks very Linux-ish, so I thought there has to be some log file hidden somewhere?&lt;/P&gt;
&lt;P&gt;Well, since it is just a lab device and the config is done in like 15 minutes, I guess I'll save some time to factory reset the whole thing the next few days...&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 08:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040606#M145369</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T08:41:00Z</dc:date>
    </item>
    <item>
      <title>Given that it's 6.2, you</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040607#M145370</link>
      <description>&lt;P&gt;Given that it's 6.2, you should be able to use packet-tracer on it.&lt;/P&gt;
&lt;P&gt;The syntax is pretty much the same as on the classic ASA code:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/dr.html#wp1842444451&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 08:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040607#M145370</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T08:44:18Z</dc:date>
    </item>
    <item>
      <title>Thanks, I totally forgot</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040608#M145372</link>
      <description>&lt;P&gt;Thanks, I totally forgot about packet-tracer being back.. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And of course, packet-tracer is telling me, there is no route:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input diagnostic udp 192.168.100.254 12312 8.8.8.8 53&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: diagnostic&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;A trace from the inside interface finds it's way to the internet...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've added a screenshot of the mgmt interface config but of course, there is not much to it... I've also tried it with a manual gateway (IP of the inside interface) but this gives me the same packet-tracer output&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 09:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040608#M145372</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T09:00:38Z</dc:date>
    </item>
    <item>
      <title>I would expect the input</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040609#M145373</link>
      <description>&lt;P&gt;I would expect the input interface to be "inside" unless you have named it something different.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 09:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040609#M145373</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T09:05:49Z</dc:date>
    </item>
    <item>
      <title>Well, the mgmt interface's</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040610#M145376</link>
      <description>&lt;P&gt;Well, the mgmt interface's logical name is diagnostic? I can run packet-tracer from the inside interface (same if I just enter "inside" rather than the sub interface):&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input inside_vlan_900 udp 192.168.100.254 12312 8.8.8.8 53&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 83.173.235.245 using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust ip ifc inside_vlan_900 any ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L5 RULE: Inside_Outside_Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,outside) source dynamic obj_net_192.168.100.0 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.100.254/12312 to 83.173.235.246/12312&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,outside) source dynamic obj_net_192.168.100.0 interface&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 509, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside_vlan_900&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (inspect-dns-invalid-pak) DNS Inspect invalid packet&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt; packet-tracer input management udp 192.168.100.254 12312 8.8.8.8 53&lt;/P&gt;
&lt;P&gt;packet-tracer input management udp 192.168.100.254 12312 8.8.8.8 53&lt;BR /&gt; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;BR /&gt;&amp;gt; packet-tracer input diagnostic udp 192.168.100.254 12312 8.8.8.8 53&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: diagnostic&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;BR /&gt;&amp;gt; packet-tracer input diagnostic udp 192.168.100.254 12312 8.8.8.8 53&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: diagnostic&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input inside_vlan_900 udp 192.168.100.254 12312 8.8.8.8 53&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 83.173.235.245 using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;BR /&gt;access-list NGFW_ONBOX_ACL advanced trust ip ifc inside_vlan_900 any ifc outside any rule-id 268435457 event-log both&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: ACCESS POLICY: NGFW_Access_Policy&lt;BR /&gt;access-list NGFW_ONBOX_ACL remark rule-id 268435457: L5 RULE: Inside_Outside_Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,outside) source dynamic obj_net_192.168.100.0 interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.100.254/12312 to 83.173.235.246/12312&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,outside) source dynamic obj_net_192.168.100.0 interface&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 669, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside_vlan_900&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (inspect-dns-invalid-pak) DNS Inspect invalid packet&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 09:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040610#M145376</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T09:17:57Z</dc:date>
    </item>
    <item>
      <title>The diagnostic interface is</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040611#M145378</link>
      <description>&lt;P&gt;The diagnostic interface is the original source but the packet should arrive on the data plane via your "inside_vlan_900 interface" and flow throught the FTD (or not) based on the policies configured.&lt;/P&gt;
&lt;P&gt;It is really odd (possibly a bug?) that we see "&lt;SPAN&gt;Drop-reason: (inspect-dns-invalid-pak) DNS Inspect invalid packet&lt;/SPAN&gt;" even though the details showed the LINA (ASA code bits) inspection rules passed the packet.I wonder what would happen if you went in and disabled dns inspection - something like&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;policy-map global_policy&lt;BR /&gt;   class inspection_default&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; no inspect dns&lt;BR /&gt;&lt;BR /&gt;This should be possible with a flex-config.&lt;/PRE&gt;</description>
      <pubDate>Thu, 30 Mar 2017 09:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040611#M145378</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T09:29:15Z</dc:date>
    </item>
    <item>
      <title>I did a "configure inspection</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040612#M145379</link>
      <description>&lt;P&gt;I did a "configure inspection dns disable", now the packet-tracer command from above runs without an error.&lt;/P&gt;
&lt;P&gt;The license registration still fails though...&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 09:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040612#M145379</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T09:45:24Z</dc:date>
    </item>
    <item>
      <title>I have a 5506-X that I've</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040613#M145380</link>
      <description>&lt;P&gt;I have a 5506-X that I've been meaning to update to Smart license vs the eval mode it had been in.&lt;/P&gt;
&lt;P&gt;I will lab it up as soon as I get some time and let you know my results.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 10:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040613#M145380</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T10:01:39Z</dc:date>
    </item>
    <item>
      <title>Thanks a lot, Marvin! Have a</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040614#M145381</link>
      <description>&lt;P&gt;Thanks a lot, Marvin! Have a good day!&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 10:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040614#M145381</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-03-30T10:51:07Z</dc:date>
    </item>
    <item>
      <title>For anybody, that might be</title>
      <link>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040615#M145382</link>
      <description>&lt;P&gt;For anybody, that might be interested...&lt;/P&gt;
&lt;P&gt;I finally found the time to re-image my ASA. And with that, the problem was gone. Same version, same settings but I finally was able to register my device.&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 14:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-registration-problem/m-p/3040615#M145382</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-05-15T14:57:28Z</dc:date>
    </item>
  </channel>
</rss>

