<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic regular translation creation failed for protocol 46 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243883#M357489</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have set both video conferencing units to use the fixed port 3230, but they also use 5060 and 1720.&amp;nbsp; I will work on the captures as well but wanted to go ahead and post the other information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My video device is 192.168.16.179&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; This is a stripped down configuration from the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;multicast-routing&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description INTERFACE TO LAN&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description INTERFACE TO ETHERNET 0/1 AND LAN&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.16.4 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; description INTERFACE TO ETHERNET 0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.1 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list Outside_Access_In extended permit tcp any host 1.1.1.1 eq sip &lt;BR /&gt;access-list Outside_Access_In extended permit tcp any host 1.1.1.1 eq 3230 &lt;BR /&gt;access-list Outside_Access_In extended permit tcp any host 1.1.1.1 eq h323 &lt;BR /&gt;access-list Outside_Access_In extended permit udp any host 1.1.1.1 eq sip &lt;BR /&gt;access-list Outside_Access_In extended permit udp any host 1.1.1.1 eq 3230 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3230 192.168.16.179 3230 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 3230 192.168.16.179 3230 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface sip 192.168.16.179 sip netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface sip 192.168.16.179 sip netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface h323 192.168.16.179 h323 netmask 255.255.255.255 &lt;BR /&gt;access-group Outside_Access_In in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.16.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.16.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ip-options router&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; nop action allow&lt;BR /&gt;&amp;nbsp; router-alert action allow&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ip-options router &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 May 2013 17:52:08 GMT</pubDate>
    <dc:creator>Christie Brinker</dc:creator>
    <dc:date>2013-05-29T17:52:08Z</dc:date>
    <item>
      <title>regular translation creation failed for protocol 46</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243881#M357487</link>
      <description>&lt;P&gt;Can anyone assist with this error message?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regular translation creation failed for protocol 46 src inside: 172.16.16.179 dst outside: 192.168.1.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attempting to make a video call with a Polycom unit. I have a Cisco ASA and the remote unit has a Cisco 800 series router. I am not sure why the 192.168.1.50 IP of the remote device shows up since I am calling it's public IP address.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243881#M357487</guid>
      <dc:creator>Christie Brinker</dc:creator>
      <dc:date>2019-03-12T01:48:50Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 46</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243882#M357488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Christie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post some more details like what protocol is used to make voice call ex SIP?&lt;/P&gt;&lt;P&gt;Can you post the 'show run' from ASA (hide public IP detail if you want) along with complete logs for a call attempt instead of only message which showed up above?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP protocol 46 is RSVP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://en.wikipedia.org/wiki/Resource_Reservation_Protocol"&gt;http://en.wikipedia.org/wiki/Resource_Reservation_Protocol&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be inside device is picking up IP of remote router from layer 7 header of frames travelling on control channel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you get bidirectional captures on inside and outside of ASA for this flow? Here are the commands to do it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l cpi permit ip host 172.16.16.179 any&lt;/P&gt;&lt;P&gt;access-l cpi permit ip any host 172.16.16.179&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capi int inside access-l cpi buffer 3123456&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l cpo permit ip host mapped_IP_of_172.16.16.179 host Public_IP_of_remote_device&lt;/P&gt;&lt;P&gt;access-l cpo permit ip host Public_IP_of_remote_device host Mapped_IP_of_172.16.16.179 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capi int inside access-l cpi buffer 3123456&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Download captures from a machine which has ASDM access using browser as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://IP_OF_ASA/capture/capi/pcap"&gt;https://IP_OF_ASA/capture/capi/pcap&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;- Save file as inside.pcap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://IP_OF_ASA/capture/capo/pcap"&gt;https://IP_OF_ASA/capture/capo/pcap&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;- Save file as outside.pcap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 19:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243882#M357488</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-24T19:57:03Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 46</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243883#M357489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have set both video conferencing units to use the fixed port 3230, but they also use 5060 and 1720.&amp;nbsp; I will work on the captures as well but wanted to go ahead and post the other information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My video device is 192.168.16.179&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; This is a stripped down configuration from the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;multicast-routing&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description INTERFACE TO LAN&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description INTERFACE TO ETHERNET 0/1 AND LAN&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.16.4 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; description INTERFACE TO ETHERNET 0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.1 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list Outside_Access_In extended permit tcp any host 1.1.1.1 eq sip &lt;BR /&gt;access-list Outside_Access_In extended permit tcp any host 1.1.1.1 eq 3230 &lt;BR /&gt;access-list Outside_Access_In extended permit tcp any host 1.1.1.1 eq h323 &lt;BR /&gt;access-list Outside_Access_In extended permit udp any host 1.1.1.1 eq sip &lt;BR /&gt;access-list Outside_Access_In extended permit udp any host 1.1.1.1 eq 3230 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3230 192.168.16.179 3230 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 3230 192.168.16.179 3230 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface sip 192.168.16.179 sip netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface sip 192.168.16.179 sip netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface h323 192.168.16.179 h323 netmask 255.255.255.255 &lt;BR /&gt;access-group Outside_Access_In in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.16.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.16.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ip-options router&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; nop action allow&lt;BR /&gt;&amp;nbsp; router-alert action allow&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ip-options router &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 17:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243883#M357489</guid>
      <dc:creator>Christie Brinker</dc:creator>
      <dc:date>2013-05-29T17:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: regular translation creation failed for protocol 46</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243884#M357490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Christie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, device is using SIP (5060) and H323 (1720). Generally inspection is needed on ASA to fix the SIP and H323 headers to make these protocol work through (since ASA does NAT). So, I would recommend that you enable the inspection for both protocols and see if that makes a difference, if not, get us the captures and we will troubleshoot this further. With the limited info that we have, I would recommend that you add following to the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hostname(config)# policy-map global_policy&lt;/P&gt;&lt;P&gt;Hostname(config-pmap)# class inspection_default&lt;/P&gt;&lt;P&gt;Hostname(config-pmap-c)# inspect sip&lt;/P&gt;&lt;P&gt;Hostname(config-pmap-c)# inspect h323 h225&lt;/P&gt;&lt;P&gt;Hostname(config-pmap-c)# inspect h323 ras&lt;/P&gt;&lt;P&gt;Hostname(config-pmap-c)# end&lt;/P&gt;&lt;P&gt;Hostname#&amp;nbsp; write memory&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check these links for more understanding on what above inspect statements do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1743169" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1743169&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1735531" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1735531&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 19:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-46/m-p/2243884#M357490</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-29T19:31:53Z</dc:date>
    </item>
  </channel>
</rss>

