<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What does &amp;quot;ret_val 5&amp;quot; mean when using SSH and NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403996#M307947</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could not find what it means either, however I can see from out to in you configured a "pass" action and from inside to outside a inspect action.&lt;/P&gt;&lt;P&gt;You need to either configure pass for both directions or configure inspect in the direction the connection is started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt; class type inspect OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt;no&amp;nbsp; pass &lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Dec 2013 18:01:55 GMT</pubDate>
    <dc:creator>lcambron</dc:creator>
    <dc:date>2013-12-03T18:01:55Z</dc:date>
    <item>
      <title>What does "ret_val 5" mean when using SSH and NAT</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403995#M307944</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a CIsco 2921 running IOS 15.3-3.M1.&amp;nbsp; I am trying to create a zone based firewall rule to permit ssh traffic from any host outside my network to use NAT to forward port 8222 to 22 to connect to a specific server inside my network (192.168.10.10).&amp;nbsp; The GigabitEthernet 0/0 address of my 2921 is 123.123.123.93 (I've modified the first 3 octets for this post) with netmask 255.255.255.252.&amp;nbsp; Our Comcast modem is at IP address 123.123.123.94.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My class-map, policy-map and zone information are:&lt;/P&gt;&lt;P&gt;class-map type inspect match-any OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt; description Outside to Inside traffic&lt;/P&gt;&lt;P&gt; match access-group name outside_to_inside&lt;/P&gt;&lt;P&gt;class-map type inspect match-any INSIDE_TO_OUTSIDE&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt; description Outside to Inside traffic&lt;/P&gt;&lt;P&gt; class type inspect OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE_TO_OUTSIDE&lt;/P&gt;&lt;P&gt; description Inside to Outside traffic&lt;/P&gt;&lt;P&gt; class type inspect INSIDE_TO_OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security INSIDE&lt;/P&gt;&lt;P&gt; description Office LAN&lt;/P&gt;&lt;P&gt;zone security OUTSIDE&lt;/P&gt;&lt;P&gt; description Internet&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE_TO_INSIDE source OUTSIDE destination INSIDE&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt;zone-pair security INSIDE_TO_OUTSIDE source INSIDE destination OUTSIDE&lt;/P&gt;&lt;P&gt; service-policy type inspect INSIDE_TO_OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My interface configuration is:&lt;/P&gt;&lt;P&gt;interface Embedded-Service-Engine0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description $FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; ip address 123.123.123.93 255.255.255.252&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; zone-member security OUTSIDE&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description $FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; zone-member security INSIDE&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; description $FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; zone-member security INSIDE&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; no mop enabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My NAT information is:&lt;/P&gt;&lt;P&gt;ip nat inside source list 101 interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.10 22 interface GigabitEthernet0/0 8222&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 123.123.123.94&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My access-list information is:&lt;/P&gt;&lt;P&gt;ip access-list extended outside_to_inside&lt;/P&gt;&lt;P&gt; permit tcp any any eq 8222&lt;/P&gt;&lt;P&gt; permit tcp any eq 8222 any&lt;/P&gt;&lt;P&gt; permit tcp any any eq 22&lt;/P&gt;&lt;P&gt; permit tcp any eq 22 any&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to ssh to 123.123.123.93 using the command "telnet 123.123.123.93 8222", I receive the following error on the router:&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 2 23:09:36.191: FIREWALL*: NEW PAK 30948028 (0:123.123.123.94:45648) (0:192.168.10.10:22) tcp&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 2 23:09:36.191: FIREWALL*: PASS 0x1B feature object found&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 2 23:09:36.191: FIREWALL*: ret_val 5 is not PASS_PAK&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 2 23:09:36.607: FIREWALL: FW CCE got packet 0x306BD97C in process path&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 2 23:09:36.607: FIREWALL: ret_val 0 is not PASS_PAK&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 2 23:09:36.607: FIREWALL: Router gen or router destined pak 0x306BD97C, let it pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration looks good:&lt;/P&gt;&lt;P&gt;dts2921#sho ip nat trans&lt;/P&gt;&lt;P&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;/P&gt;&lt;P&gt;tcp 123.123.123.93:8222 192.168.10.10:22&amp;nbsp;&amp;nbsp; 123.123.123.94:45649 123.123.123.94:45649&lt;/P&gt;&lt;P&gt;tcp 123.123.123.93:8222 192.168.10.10:22&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;/P&gt;&lt;P&gt;tcp 123.123.123.93:1723 192.168.10.10:1723 ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, the telnet returns without connecting to the 192.168.10.10 server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not found anything helpful to determine what this means when searching Google.&amp;nbsp; Can someone please help me understand this and also how to configure my firewall to make this work.&amp;nbsp; Any help will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Paul Bratach Pasted the actual interface configuration, since I pasted the map and zone information twice by mistake.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403995#M307944</guid>
      <dc:creator>pbratach1</dc:creator>
      <dc:date>2019-03-12T03:11:40Z</dc:date>
    </item>
    <item>
      <title>What does "ret_val 5" mean when using SSH and NAT</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403996#M307947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could not find what it means either, however I can see from out to in you configured a "pass" action and from inside to outside a inspect action.&lt;/P&gt;&lt;P&gt;You need to either configure pass for both directions or configure inspect in the direction the connection is started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt; class type inspect OUTSIDE_TO_INSIDE&lt;/P&gt;&lt;P&gt;no&amp;nbsp; pass &lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 18:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403996#M307947</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2013-12-03T18:01:55Z</dc:date>
    </item>
    <item>
      <title>What does "ret_val 5" mean when using SSH and NAT</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403997#M307949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Felipe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&amp;nbsp; I was able to get it working by changing my access list from:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;ip access-list extended outside_to_inside&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;permit tcp any any eq 8222&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;permit tcp any eq 8222 any&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;permit tcp any any eq 22&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;permit tcp any eq 22 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;ip access-list extended outside_to_inside&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;permit tcp any host 192.168.10.10 eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 21:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403997#M307949</guid>
      <dc:creator>pbratach1</dc:creator>
      <dc:date>2013-12-09T21:14:41Z</dc:date>
    </item>
    <item>
      <title>What does "ret_val 5" mean when using SSH and NAT</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403998#M307950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was going to suggest you that :&lt;/P&gt;&lt;P&gt;" Remove the ACL and create a new one pointing to the private address space as ZBFW checks any NAT and ACL before the Inspection"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said it should also have worked before as you had:&lt;/P&gt;&lt;P&gt;permit tcp any any eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which matches the traffic but the FW might got a weird behavior with the configuration you posted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At least you know now, always point to the private one &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the question as answered&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 01:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-ret-val-5-quot-mean-when-using-ssh-and-nat/m-p/2403998#M307950</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-10T01:03:10Z</dc:date>
    </item>
  </channel>
</rss>

