<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic portmap translation creation failed for udp src inside dst insid in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329173#M343376</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lukasz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this scenarios what we usually see is that the ASA is not seeing the full exchange of packets. (Asymetric routing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case we have not even reach that part as we are handeling with the NAT at this point &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before any change on the configuration, what's the requirement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the 192.168.10.0 needs to talk to the 10.1.0.0 but do the 10.1.0.0 have to talk to the 192??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 07 Sep 2013 06:33:31 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-09-07T06:33:31Z</dc:date>
    <item>
      <title>portmap translation creation failed for udp src inside dst inside</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329172#M343371</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I have a problem with allowing traffic to UC500 subnets on ASA 5505 inside interface.&lt;/P&gt;&lt;P&gt;My asa is a main router with addres 192.168.1.1&lt;/P&gt;&lt;P&gt;UC500 voip box is connected to ASA's inside interface through UC500 WAN port with UC500 with 192.168.1.2 address.&lt;/P&gt;&lt;P&gt;Firewall and NAT on UC500 is disable&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;UC500 sip traffic works fine. voipbox creates its subnets for data and voip - 192.168.10.0 and 10.1.1.0. another important address is 10.1.10.1 which is UC500 CUE.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;My problem is that from within ASA local network (192.168.1.0) i cannot reach UC500 subnets, neither can I reach ASA's local network from the UC subnets.&lt;/P&gt;&lt;P&gt;the log says&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Sep 07 2013&lt;/TD&gt;&lt;TD&gt;00:21:49&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;DC&lt;/TD&gt;&lt;TD&gt;53&lt;/TD&gt;&lt;TD&gt;PBXCUE&lt;/TD&gt;&lt;TD&gt;32901&lt;/TD&gt;&lt;TD&gt;portmap translation creation failed for udp src inside:DC/53 dst inside:PBXCUE/32901&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried exempting uc500 subnets on ASA but that didn;t work.&lt;/P&gt;&lt;P&gt;Funny thing is that I CAN reach the UC500 subnets when connecting with VPN to ASA...&lt;/P&gt;&lt;P&gt;Please help! I am not familiar with CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I configured static route to 10.1.10.0 and since then I was able to ping 10.1.10.1 thorugh ASA;s VPN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I would be grateful for ideas.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lukasz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https IIS https netmask 255.255.255.255&amp;nbsp; dns tcp 200 200 udp 200 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www IIS www netmask 255.255.255.255&amp;nbsp; dns tcp 200 200 udp 200 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp IIS smtp netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface pop3 IIS pop3 netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface domain RenBetPBX domain netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface 5061 RenBetPBX 5061 netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface sip RenBetPBX sip netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 13000 SQL 13000 netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x&lt;/P&gt;&lt;P&gt;route inside PBXCUE-network 255.255.255.0 RenBetPBX 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329172#M343371</guid>
      <dc:creator>lukaszzyla</dc:creator>
      <dc:date>2019-03-12T02:35:06Z</dc:date>
    </item>
    <item>
      <title>portmap translation creation failed for udp src inside dst insid</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329173#M343376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lukasz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this scenarios what we usually see is that the ASA is not seeing the full exchange of packets. (Asymetric routing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case we have not even reach that part as we are handeling with the NAT at this point &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before any change on the configuration, what's the requirement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the 192.168.10.0 needs to talk to the 10.1.0.0 but do the 10.1.0.0 have to talk to the 192??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Sep 2013 06:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329173#M343376</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-07T06:33:31Z</dc:date>
    </item>
    <item>
      <title>portmap translation creation failed for udp src inside dst insid</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329174#M343379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio!&lt;/P&gt;&lt;P&gt;Thank you for interest and your reply.&lt;/P&gt;&lt;P&gt;I might have not been very clear in describing what I would like to achieve after spending a weekend trying to configure my UC540 device and ASA5505...&lt;/P&gt;&lt;P&gt;The network topology looks like this:&lt;/P&gt;&lt;P&gt;i. ASA5505 (192.168.1.0 as my main network, ASA ip 192.168.1.1)&lt;/P&gt;&lt;P&gt;ii. UC540 (WAN connection, WAN ip: 192.168.1.2) UC540 creates 2 subnets: 192.168.10.0 - data subnet and 10.1.1.0 - voice subnet. UC540 is connected to 192.168.1.0 network through WAN port and is given static ip of 192.168.1.2/255.255.255.0 with default gateway set to ASA (192.168.1.1). Firewall and NAT on UC540 are both disabled.&lt;/P&gt;&lt;P&gt;UC540 creates another network with CUCM(E) service module at 10.1.10.1 and also creates loopback interface with ip 10.1.10.2 which is being used as CUCM(E) gateway.&lt;/P&gt;&lt;P&gt;UC540 has its radio device (2SSID - one for 192.168.10.0 and second for 10.1.1.0).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am trying to achieve:&lt;/P&gt;&lt;P&gt;1. to be able to reach 10.1.1.0 and 10.1.10.0 from within ASA main network (192.168.1.0) - and also to be able to reach 192.168.1.0 from both 10.x.x.x networks. I need that for attaching another IP phones from within a switch that only operates on 192.168.1.0 network.I also need that for configuring SMTP notification service on CUCME (10.1.10.1) which would communicate with my exchange on 192,168.1.0 network.&lt;/P&gt;&lt;P&gt;2. Be able to configure UC540 radios to allow access to 192.168.1.0 ASA's network and not 192.168.10.0 UCdata network which it does in its current configuration. at the moment UC540 wifi clients can only access 192.168.10.0 network which means they do not have access to my main 192.168.1.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this explanation sounds more reasobable &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Once again thank you for your interest and I am looking forward to hearing from you.&lt;/P&gt;&lt;P&gt;I was working on my CLI skills recently and I am getting more used to it - I hope that with your help I will be able to reach my goals.&lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;P&gt;Lukasz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 20:58:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329174#M343379</guid>
      <dc:creator>lukaszzyla</dc:creator>
      <dc:date>2013-09-10T20:58:00Z</dc:date>
    </item>
    <item>
      <title>portmap translation creation failed for udp src inside dst insid</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329175#M343384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lukas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Way better description.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is asymetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my recommendation would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Configure Idendity NAT from inside to inside for this subnets&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Create a tcp state bypass policy for this traffic&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And let us know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 21:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329175#M343384</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-10T21:17:03Z</dc:date>
    </item>
    <item>
      <title>portmap translation creation failed for udp src inside dst insid</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329176#M343387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julio!&lt;/P&gt;&lt;P&gt;Thank you for your advice.&lt;/P&gt;&lt;P&gt;I have managed to solve my main problem by reconfiguring my switches vlans - enabling trunk port configs for required ports and allowing them access to both vlans.&lt;/P&gt;&lt;P&gt;Now I can see everything from all of my inside networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I continue my ASA adventures - I have managed to configure L2TP client access for my windows users, RADIUS authentication for domain users and yesterday night I have managed to configure site to site VPN with my RV120W router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am only an enthusiast but my recent successes have given me apetite for more...&lt;/P&gt;&lt;P&gt;I keep reading forums and trying to solve most of my problems myself but I have faced another one now and thought that maybe you could give me another tip on where to look for the issue:&lt;/P&gt;&lt;P&gt;I still have one problem with my L2TP VPN config - I have configured split tunnel on the group policy to tunnel only 192.168.1.0 network requests.&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My network at home is 192.168.2.0 but it still tunnels everything (when I check my ip after connecting to VPN my home laptop still identifies with ASA gateway(!) address .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any interface outside object-group DM_INLINE_ICMP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 23456 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group DM_INLINE_NETWORK_1 any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 13000 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside range 8001 8016 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp x.x.x.x 255.255.255.0 interface outside eq ssh &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.1.240 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any PBXVOIP-network 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any PBXCUE-network 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 igolomska-network 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp object-group DM_INLINE_NETWORK_2 any object-group DM_INLINE_UDP_1 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip host IIS any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip host RBSTORE_NAS any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny udp any any object-group DM_INLINE_UDP_2 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 5432 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any host PBXCUE eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host PBXCUE any eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host RBCAMSTORE_NAS host EXCH-MBX eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host RBSTORE_NAS host EXCH-MBX eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host RENBETUPS host EXCH-MBX eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host RenBetPBX host EXCH-MBX eq smtp &lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 igolomska-network 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route print shows:&lt;/P&gt;&lt;P&gt;and 192.168.1.240 is my VPN IP - its metric has higher priority than the local gateway.&lt;/P&gt;&lt;P&gt;How do I change it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Active Routes:&lt;/P&gt;&lt;P&gt;Network Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Netmask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface&amp;nbsp; Metric&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4250&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.240&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 21&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80.51.24.22&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4251&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.1&amp;nbsp;&amp;nbsp; 4531&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.1&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.1&amp;nbsp;&amp;nbsp; 4531&lt;/P&gt;&lt;P&gt;&amp;nbsp; 127.255.255.255&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.1&amp;nbsp;&amp;nbsp; 4531&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 169.254.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp; 169.254.104.126&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp; 169.254.255.255&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.240&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.240&amp;nbsp;&amp;nbsp;&amp;nbsp; 276&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.255&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 224.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 240.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.1&amp;nbsp;&amp;nbsp; 4531&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 224.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 240.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 224.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 240.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.240&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 21&lt;/P&gt;&lt;P&gt;&amp;nbsp; 255.255.255.255&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.1&amp;nbsp;&amp;nbsp; 4531&lt;/P&gt;&lt;P&gt;&amp;nbsp; 255.255.255.255&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.126&amp;nbsp;&amp;nbsp; 4506&lt;/P&gt;&lt;P&gt;&amp;nbsp; 255.255.255.255&amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On-link&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.240&amp;nbsp;&amp;nbsp;&amp;nbsp; 276&lt;/P&gt;&lt;P&gt;===========================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am starting to feel like I am using a bit too much of your friendliness ...&lt;/P&gt;&lt;P&gt;Best Regards and have a great day!&lt;/P&gt;&lt;P&gt;Lukasz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 18:41:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329176#M343387</guid>
      <dc:creator>lukaszzyla</dc:creator>
      <dc:date>2013-09-12T18:41:17Z</dc:date>
    </item>
    <item>
      <title>portmap translation creation failed for udp src inside dst insid</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329177#M343390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lukasz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; It's always a pleasure to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I always recommend using a different address range on the other side of the connection for routing/arp weird issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Split tunnel access-list looks good&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the group-policy and tunnel-group setup cause at the moment you should only have that route to the internal subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 18:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329177#M343390</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-12T18:59:07Z</dc:date>
    </item>
    <item>
      <title>portmap translation creation failed for udp src inside dst insid</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329178#M343396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the group policy I use for L2TP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup_1 internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup_1 attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10 8.8.8.8&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol l2tp-ipsec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value BETONOWA.local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and tunnel group settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool install_pool&lt;/P&gt;&lt;P&gt; authentication-server-group BETONOWA-DC LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup_1&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; radius-sdi-xauth&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt; authentication pap&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 20:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329178#M343396</guid>
      <dc:creator>lukaszzyla</dc:creator>
      <dc:date>2013-09-12T20:35:36Z</dc:date>
    </item>
    <item>
      <title>portmap translation creation failed for udp src inside dst insid</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329179#M343398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lukasz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest with you I have not played that much with L2TP but configuration speaking it should be the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you use a different Pool subnet for the VPn traffic (different than 192.168.1.0)&amp;nbsp; Make sure you use the rigth NAT0 configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to check if that makes a difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 21:48:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-creation-failed-for-udp-src-inside-dst/m-p/2329179#M343398</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-12T21:48:45Z</dc:date>
    </item>
  </channel>
</rss>

